Loading ...

Play interactive tourEdit tour

Windows Analysis Report CI_PL_BL_ 4100675407_xls.exe

Overview

General Information

Sample Name:CI_PL_BL_ 4100675407_xls.exe
Analysis ID:530857
MD5:94cb19d0951996cdb8b4cb914248763e
SHA1:fa319fb54dfb0b1f715a19924087cacef22ccbcf
SHA256:4ff14d83a926458439f039ea2e756a646b2bb63be4fd22ed8559138214efcaf8
Infos:

Most interesting Screenshot:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
GuLoader behavior detected
Yara detected GuLoader
Hides threads from debuggers
Tries to detect Any.run
C2 URLs / IPs found in malware configuration
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
Tries to load missing DLLs
Contains functionality to read the PEB
Uses code obfuscation techniques (call, push, ret)
Checks if the current process is being debugged
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Abnormal high CPU Usage

Classification

Process Tree

  • System is w10x64native
  • CI_PL_BL_ 4100675407_xls.exe (PID: 5884 cmdline: "C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe" MD5: 94CB19D0951996CDB8B4CB914248763E)
    • CI_PL_BL_ 4100675407_xls.exe (PID: 2904 cmdline: "C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe" MD5: 94CB19D0951996CDB8B4CB914248763E)
  • cleanup

Malware Configuration

Threatname: GuLoader

{"Payload URL": "https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    00000009.00000000.410577418495.0000000000560000.00000040.00000001.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      Sigma Overview

      No Sigma rule has matched

      Jbx Signature Overview

      Click to jump to signature section

      Show All Signature Results

      AV Detection:

      barindex
      Found malware configurationShow sources
      Source: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmpMalware Configuration Extractor: GuLoader {"Payload URL": "https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin"}
      Multi AV Scanner detection for submitted fileShow sources
      Source: CI_PL_BL_ 4100675407_xls.exeReversingLabs: Detection: 35%
      Source: CI_PL_BL_ 4100675407_xls.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED

      Networking:

      barindex
      C2 URLs / IPs found in malware configurationShow sources
      Source: Malware configuration extractorURLs: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin
      Source: Joe Sandbox ViewASN Name: MICROSOFT-CORP-MSN-AS-BLOCKUS MICROSOFT-CORP-MSN-AS-BLOCKUS
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49864
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49842
      Source: unknownNetwork traffic detected: HTTP traffic on port 49842 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49862
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49860
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49880
      Source: unknownNetwork traffic detected: HTTP traffic on port 49873 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49871 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49877 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49860 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49868 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49879
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49877
      Source: unknownNetwork traffic detected: HTTP traffic on port 49866 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49864 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49873
      Source: unknownNetwork traffic detected: HTTP traffic on port 49862 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49871
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49870
      Source: unknownNetwork traffic detected: HTTP traffic on port 49870 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49879 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49880 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49868
      Source: unknownNetwork traffic detected: HTTP traffic on port 49867 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49867
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49866
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190843867.0000000000871000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/-
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/1e03818b-e8b8-45f4-bd74-707e0f15a35d
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/3
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/8-45f4-bd74-707e0f15a35d0
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.414337489537.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.413334480795.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZY6
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411329776637.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin#
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binF
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411329776637.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binJ
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binLMEMH
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bindvmbusRFCOMM
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.414337489537.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binn
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bins
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binws
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190843867.0000000000871000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/Hostbgre
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/N
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/R
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411664281397.0000000000889000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/g
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.413334480795.000000000083C000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/n
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/nidaho.com/:
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.414337489537.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.413334480795.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpString found in binary or memory: https://bgreenidaho.com/ocal
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmpString found in binary or memory: https://bgreenidaho.com/v
      Source: unknownDNS traffic detected: queries for: bgreenidaho.com
      Source: CI_PL_BL_ 4100675407_xls.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTornf2.exe vs CI_PL_BL_ 4100675407_xls.exe
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000000.410573892705.0000000000423000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameTornf2.exe vs CI_PL_BL_ 4100675407_xls.exe
      Source: CI_PL_BL_ 4100675407_xls.exeBinary or memory string: OriginalFilenameTornf2.exe vs CI_PL_BL_ 4100675407_xls.exe
      Source: CI_PL_BL_ 4100675407_xls.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025230D52_2_025230D5
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025229492_2_02522949
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251C7222_2_0251C722
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251CBBB2_2_0251CBBB
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02521E5B2_2_02521E5B
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0252186B2_2_0252186B
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02523EFB2_2_02523EFB
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025214FD2_2_025214FD
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251A7492_2_0251A749
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251CF702_2_0251CF70
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025105002_2_02510500
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251FF332_2_0251FF33
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02520BDF2_2_02520BDF
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025213B92_2_025213B9
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02522949 NtWriteVirtualMemory,LoadLibraryA,NtProtectVirtualMemory,2_2_02522949
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251C722 NtWriteVirtualMemory,CreateFileA,LoadLibraryA,2_2_0251C722
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251CBBB NtWriteVirtualMemory,NtAllocateVirtualMemory,LoadLibraryA,2_2_0251CBBB
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02523EFB NtWriteVirtualMemory,2_2_02523EFB
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025214FD NtWriteVirtualMemory,2_2_025214FD
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02510500 NtWriteVirtualMemory,2_2_02510500
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02520BDF NtWriteVirtualMemory,LoadLibraryA,2_2_02520BDF
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess Stats: CPU usage > 98%
      Source: CI_PL_BL_ 4100675407_xls.exeReversingLabs: Detection: 35%
      Source: CI_PL_BL_ 4100675407_xls.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe "C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe"
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess created: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe "C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe"
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess created: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe "C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe" Jump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeFile created: C:\Users\user\AppData\Local\Temp\~DF3A963BF3568977ED.TMPJump to behavior
      Source: classification engineClassification label: mal88.troj.evad.winEXE@3/1@1/1

      Data Obfuscation:

      barindex
      Yara detected GuLoaderShow sources
      Source: Yara matchFile source: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000009.00000000.410577418495.0000000000560000.00000040.00000001.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_004074C8 push 713BC6CEh; iretd 2_2_004074D6
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_00406CDB push esi; ret 2_2_00406CDC
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_004095C1 push 74E4E9CEh; iretd 2_2_004095C6
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_00407DA1 push E5AD70CEh; retf 2_2_00407DA6
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0040966A pushad ; iretd 2_2_0040979D
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_00405E18 push eax; retf 2_2_00405E19
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_00407A19 push ADDCA7CEh; iretd 2_2_00407A1E
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0040968D pushad ; iretd 2_2_0040979D
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02514E4E push es; iretd 2_2_02514E4F
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251282C push FFFFFFABh; ret 2_2_02512879
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025154AB push cs; iretd 2_2_025154F8
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02516B55 push eax; iretd 2_2_02516B9C
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02516B58 push eax; iretd 2_2_02516B9C
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025127C7 push FFFFFFABh; ret 2_2_02512879
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_02515396 push edi; ret 2_2_02515397
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 9_2_00565431 push edx; iretd 9_2_0056543E
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 9_2_00560B05 push ebp; ret 9_2_00560B06
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion:

      barindex
      Tries to detect Any.runShow sources
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeFile opened: C:\Program Files\Qemu-ga\qemu-ga.exeJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeFile opened: C:\Program Files\qga\qga.exeJump to behavior
      Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192208833.0000000002400000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=HTTPS://BGREENIDAHO.COM/CRUR/BIN_TLIGMZYC180.BIN
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410579874074.00000000006B4000.00000004.00000020.sdmpBinary or memory string: \??\C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE(LK
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410579874074.00000000006B4000.00000004.00000020.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXETW
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410581253187.0000000002530000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192208833.0000000002400000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXE
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410581253187.0000000002530000.00000004.00000001.sdmpBinary or memory string: NTDLLKERNEL32USER32C:\PROGRAM FILES\QEMU-GA\QEMU-GA.EXEC:\PROGRAM FILES\QGA\QGA.EXEPSAPI.DLLMSI.DLLPUBLISHERWININET.DLLMOZILLA/5.0 (WINDOWS NT 6.1; WOW64; TRIDENT/7.0; RV:11.0) LIKE GECKOSHELL32ADVAPI32TEMP=WINDIR=\SYSWOW64\MSVBVM60.DLL
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeSystem information queried: ModuleInformationJump to behavior
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Shutdown Service
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410581253187.0000000002530000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=windir=\syswow64\msvbvm60.dll
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Remote Desktop Virtualization Service
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410579874074.00000000006B4000.00000004.00000020.sdmpBinary or memory string: \??\C:\Program Files\Qemu-ga\qemu-ga.exe(Lk
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: vmicshutdown
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Volume Shadow Copy Requestor
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V PowerShell Direct Service
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Time Synchronization Service
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: vmicvss
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410579874074.00000000006B4000.00000004.00000020.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exeTw
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411664281397.0000000000889000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411330415050.0000000000889000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415191031458.0000000000889000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411329776637.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411664281397.0000000000889000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411330415050.0000000000889000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415191031458.0000000000889000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAWfY3
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410581253187.0000000002530000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192208833.0000000002400000.00000004.00000001.sdmpBinary or memory string: C:\Program Files\Qemu-ga\qemu-ga.exe
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Data Exchange Service
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192208833.0000000002400000.00000004.00000001.sdmpBinary or memory string: ntdllkernel32user32C:\Program Files\Qemu-ga\qemu-ga.exeC:\Program Files\qga\qga.exepsapi.dllMsi.dllPublisherwininet.dllMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Geckoshell32advapi32TEMP=https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Heartbeat Service
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000002.00000002.410582792755.0000000003359000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: Hyper-V Guest Service Interface
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415192346753.0000000002589000.00000004.00000001.sdmpBinary or memory string: vmicheartbeat

      Anti Debugging:

      barindex
      Hides threads from debuggersShow sources
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0252186B mov eax, dword ptr fs:[00000030h]2_2_0252186B
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251F77C mov eax, dword ptr fs:[00000030h]2_2_0251F77C
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025201AD mov eax, dword ptr fs:[00000030h]2_2_025201AD
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess queried: DebugPortJump to behavior
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_0251CA0C LdrInitializeThunk,2_2_0251CA0C
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeCode function: 2_2_025230D5 RtlAddVectoredExceptionHandler,2_2_025230D5
      Source: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exeProcess created: C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe "C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe" Jump to behavior
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415191786426.0000000000FF1000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415191786426.0000000000FF1000.00000002.00020000.sdmpBinary or memory string: Progman
      Source: CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415191786426.0000000000FF1000.00000002.00020000.sdmpBinary or memory string: Program ManagerM

      Stealing of Sensitive Information:

      barindex
      GuLoader behavior detectedShow sources
      Source: Initial fileSignature Results: GuLoader behavior

      Mitre Att&ck Matrix

      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationDLL Side-Loading1Process Injection12Virtualization/Sandbox Evasion21OS Credential DumpingSecurity Software Discovery311Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumEncrypted Channel12Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsDLL Side-Loading1Process Injection12LSASS MemoryVirtualization/Sandbox Evasion21Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothNon-Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)DLL Side-Loading1Security Account ManagerProcess Discovery1SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationApplication Layer Protocol12Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Obfuscated Files or Information1NTDSSystem Information Discovery2Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud

      Behavior Graph

      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      windows-stand

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      SourceDetectionScannerLabelLink
      CI_PL_BL_ 4100675407_xls.exe36%ReversingLabsWin32.Trojan.Shelsy

      Dropped Files

      No Antivirus matches

      Unpacked PE Files

      No Antivirus matches

      Domains

      SourceDetectionScannerLabelLink
      bgreenidaho.com0%VirustotalBrowse

      URLs

      SourceDetectionScannerLabelLink
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binF0%Avira URL Cloudsafe
      https://bgreenidaho.com/R0%Avira URL Cloudsafe
      https://bgreenidaho.com/ocal0%Avira URL Cloudsafe
      https://bgreenidaho.com/v0%Avira URL Cloudsafe
      https://bgreenidaho.com/30%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin#0%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZY60%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binws0%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binLMEMH0%Avira URL Cloudsafe
      https://bgreenidaho.com/0%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bins0%Avira URL Cloudsafe
      https://bgreenidaho.com/Hostbgre0%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binn0%Avira URL Cloudsafe
      https://bgreenidaho.com/1e03818b-e8b8-45f4-bd74-707e0f15a35d0%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bindvmbusRFCOMM0%Avira URL Cloudsafe
      https://bgreenidaho.com/g0%Avira URL Cloudsafe
      https://bgreenidaho.com/8-45f4-bd74-707e0f15a35d00%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binJ0%Avira URL Cloudsafe
      https://bgreenidaho.com/N0%Avira URL Cloudsafe
      https://bgreenidaho.com/-0%Avira URL Cloudsafe
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin0%Avira URL Cloudsafe
      https://bgreenidaho.com/nidaho.com/:0%Avira URL Cloudsafe

      Domains and IPs

      Contacted Domains

      NameIPActiveMaliciousAntivirus DetectionReputation
      bgreenidaho.com
      20.124.109.2
      truetrueunknown

      Contacted URLs

      NameMaliciousAntivirus DetectionReputation
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bintrue
      • Avira URL Cloud: safe
      unknown

      URLs from Memory and Binaries

      NameSourceMaliciousAntivirus DetectionReputation
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binFCI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/RCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/ocalCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.414337489537.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.413334480795.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/vCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/3CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bin#CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411329776637.0000000000853000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZY6CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.414337489537.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.413334480795.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binwsCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binLMEMHCI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmptrue
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binsCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/HostbgreCI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190843867.0000000000871000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binnCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.414337489537.000000000083C000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190502650.000000000083C000.00000004.00000020.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/1e03818b-e8b8-45f4-bd74-707e0f15a35dCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.bindvmbusRFCOMMCI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/gCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411664281397.0000000000889000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/8-45f4-bd74-707e0f15a35d0CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/Crur/bin_TLiGMZYC180.binJCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412999941834.0000000000852000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.411329776637.0000000000853000.00000004.00000001.sdmp, CI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.412331704432.000000000083C000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/NCI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://bgreenidaho.com/nCI_PL_BL_ 4100675407_xls.exe, 00000009.00000003.413334480795.000000000083C000.00000004.00000001.sdmpfalse
        unknown
        https://bgreenidaho.com/-CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190843867.0000000000871000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        https://bgreenidaho.com/nidaho.com/:CI_PL_BL_ 4100675407_xls.exe, 00000009.00000002.415190634335.0000000000853000.00000004.00000001.sdmpfalse
        • Avira URL Cloud: safe
        unknown

        Contacted IPs

        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs

        Public

        IPDomainCountryFlagASNASN NameMalicious
        20.124.109.2
        bgreenidaho.comUnited States
        8075MICROSOFT-CORP-MSN-AS-BLOCKUStrue

        General Information

        Joe Sandbox Version:34.0.0 Boulder Opal
        Analysis ID:530857
        Start date:30.11.2021
        Start time:03:38:04
        Joe Sandbox Product:CloudBasic
        Overall analysis duration:0h 12m 6s
        Hypervisor based Inspection enabled:false
        Report type:full
        Sample file name:CI_PL_BL_ 4100675407_xls.exe
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
        Run name:Suspected Instruction Hammering
        Number of analysed new started processes analysed:20
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • HDC enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Detection:MAL
        Classification:mal88.troj.evad.winEXE@3/1@1/1
        EGA Information:Failed
        HDC Information:Failed
        HCA Information:
        • Successful, ratio: 66%
        • Number of executed functions: 22
        • Number of non-executed functions: 17
        Cookbook Comments:
        • Adjust boot time
        • Enable AMSI
        • Found application associated with file extension: .exe
        Warnings:
        Show All
        • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.54.122.82
        • Excluded domains from analysis (whitelisted): wd-prod-cp-eu-north-1-fe.northeurope.cloudapp.azure.com, client.wns.windows.com, wdcpalt.microsoft.com, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, wdcp.microsoft.com, arc.msn.com, wd-prod-cp.trafficmanager.net
        • Report size getting too big, too many NtQueryValueKey calls found.

        Simulations

        Behavior and APIs

        No simulations

        Joe Sandbox View / Context

        IPs

        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
        20.124.109.2BL_CI_PL.exeGet hashmaliciousBrowse

          Domains

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          bgreenidaho.comBL_CI_PL.exeGet hashmaliciousBrowse
          • 20.124.109.2

          ASN

          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
          MICROSOFT-CORP-MSN-AS-BLOCKUSUpdated Proposal and Statements.docxGet hashmaliciousBrowse
          • 52.109.8.20
          t6rrqsi3BpGet hashmaliciousBrowse
          • 20.50.41.254
          iapc1nXqL0.exeGet hashmaliciousBrowse
          • 52.101.24.0
          t2yFh0lOxM.exeGet hashmaliciousBrowse
          • 52.101.24.0
          9hyE41yNDBGet hashmaliciousBrowse
          • 40.105.241.198
          D403yCH5ghGet hashmaliciousBrowse
          • 20.187.1.20
          UkuCbysP6TGet hashmaliciousBrowse
          • 13.64.146.115
          7OoLG7JkFCGet hashmaliciousBrowse
          • 40.111.155.152
          BL_CI_PL.exeGet hashmaliciousBrowse
          • 20.124.109.2
          BL_CI_PL.exeGet hashmaliciousBrowse
          • 52.109.88.174
          d2REPCiUoqGet hashmaliciousBrowse
          • 22.129.233.98
          zsnJiVlhgN.exeGet hashmaliciousBrowse
          • 20.68.110.75
          7JflEyuQmzGet hashmaliciousBrowse
          • 52.155.149.221
          m269vSiInuGet hashmaliciousBrowse
          • 52.125.142.71
          NkvaVLGroWGet hashmaliciousBrowse
          • 40.113.32.125
          MA4UA3e5xeGet hashmaliciousBrowse
          • 52.96.135.139
          n6sOKP0EjJGet hashmaliciousBrowse
          • 143.64.39.221
          3kzcNn1JUrGet hashmaliciousBrowse
          • 13.78.147.147
          p4o9OIbPjxGet hashmaliciousBrowse
          • 20.136.249.210
          81RFAzyp8nGet hashmaliciousBrowse
          • 20.110.162.9

          JA3 Fingerprints

          No context

          Dropped Files

          No context

          Created / dropped Files

          C:\Users\user\AppData\Local\Temp\~DF3A963BF3568977ED.TMP
          Process:C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe
          File Type:Composite Document File V2 Document, Cannot read section info
          Category:dropped
          Size (bytes):16384
          Entropy (8bit):0.8889429216618719
          Encrypted:false
          SSDEEP:12:rl3lKFQCb77aqWPp8aFW3gJH6OXkDgIOJefKadcMqpwbmHZbGzJzzz/jP5prGI:rQYH6OCgLAMibm5bGzJzX/
          MD5:E114AD50630A185807BCDFF5F7DACEF6
          SHA1:5091C562986C0A729FF4AC836083EFFBB4257977
          SHA-256:8C0B8DE53510102223758C6543D9EB102BC7423B83BDF902975FB221AB77E945
          SHA-512:F8C4FA0ABA5BD5CE8246A9C2A0A525129B5461E90634FE406A1704F8E42240174C6D1D8CCBC42EBE14EE777F79A5C7E32618CC2ED532CA6264D614337840BF1A
          Malicious:false
          Reputation:low
          Preview: ......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................

          Static File Info

          General

          File type:PE32 executable (GUI) Intel 80386, for MS Windows
          Entropy (8bit):6.045005360835647
          TrID:
          • Win32 Executable (generic) a (10002005/4) 99.15%
          • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
          • Generic Win/DOS Executable (2004/3) 0.02%
          • DOS Executable Generic (2002/1) 0.02%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:CI_PL_BL_ 4100675407_xls.exe
          File size:143360
          MD5:94cb19d0951996cdb8b4cb914248763e
          SHA1:fa319fb54dfb0b1f715a19924087cacef22ccbcf
          SHA256:4ff14d83a926458439f039ea2e756a646b2bb63be4fd22ed8559138214efcaf8
          SHA512:b06b3df9de83932c9f5013ce90720710ba9645c5bcce4b46dd377c541343b8095742a7923634805a61214ba1eda4ac3ecaaee935b73942c53c27190e792dc007
          SSDEEP:1536:5oDAE4euYT88tnh07k177v10aeb/by8W1hgW3rAITGLKy:ZEvuYT8CQm/v10aeixxCKy
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7b..s...s...s.......r...<!..v...E%..r...Richs...........................PE..L......G.....................0....................@

          File Icon

          Icon Hash:28f0da9af0f0f034

          Static PE Info

          General

          Entrypoint:0x4016a4
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
          DLL Characteristics:
          Time Stamp:0x47BEE20B [Fri Feb 22 14:54:03 2008 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:9b824bd6da8a9367fa6d96e7ab5dc79d

          Entrypoint Preview

          Instruction
          push 00402498h
          call 00007F757093ABD5h
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          xor byte ptr [eax], al
          add byte ptr [eax], al
          cmp byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          enter 59CEh, 8Ah

          Data Directories

          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x201240x28.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x230000xf3e.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2380x20
          IMAGE_DIRECTORY_ENTRY_IAT0x10000x21c.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

          Sections

          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x1f7cc0x20000False0.547492980957data6.30287654494IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
          .data0x210000x19ec0x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
          .rsrc0x230000xf3e0x1000False0.27490234375data3.55639650835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

          Resources

          NameRVASizeTypeLanguageCountry
          CUSTOM0x239c00x57eMS Windows icon resource - 1 icon, 16x16, 8 bits/pixelEnglishUnited States
          RT_ICON0x234580x568GLS_BINARY_LSB_FIRST
          RT_GROUP_ICON0x234440x14data
          RT_VERSION0x231400x304dataEnglishUnited States

          Imports

          DLLImport
          MSVBVM60.DLL__vbaVarTstGt, _CIcos, _adj_fptan, __vbaHresultCheck, __vbaAryMove, __vbaFreeVar, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, _adj_fprem1, __vbaStrCat, __vbaHresultCheckObj, __vbaLenBstrB, _adj_fdiv_m32, __vbaAryVar, __vbaAryDestruct, __vbaObjSet, __vbaOnError, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, __vbaVarTstLt, _CIsin, __vbaChkstk, __vbaFileClose, EVENT_SINK_AddRef, __vbaGenerateBoundsError, __vbaStrCmp, __vbaGet3, __vbaVarTstEq, __vbaAryConstruct2, __vbaObjVar, _adj_fpatan, __vbaStrR8, EVENT_SINK_Release, __vbaUI1I2, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaStrVarVal, __vbaVarCat, _CIlog, __vbaErrorOverflow, __vbaFileOpen, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaVarDup, __vbaFpI4, _CIatan, __vbaStrMove, __vbaAryCopy, __vbaR8IntI4, _allmul, _CItan, _CIexp, __vbaFreeStr, __vbaFreeObj

          Version Infos

          DescriptionData
          Translation0x0409 0x04b0
          LegalCopyrightBiSide Frak
          InternalNameTornf2
          FileVersion1.00
          CompanyNameBiSide Frak
          LegalTrademarksBiSide Frak
          CommentsBiSide Frak
          ProductNameBiSide Frak
          ProductVersion1.00
          FileDescriptionBiSide Frak
          OriginalFilenameTornf2.exe

          Possible Origin

          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States

          Network Behavior

          Network Port Distribution

          TCP Packets

          TimestampSource PortDest PortSource IPDest IP
          Nov 30, 2021 03:41:23.623822927 CET49842443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:23.623927116 CET4434984220.124.109.2192.168.11.20
          Nov 30, 2021 03:41:23.624150038 CET49842443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:23.643126965 CET49842443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:23.643189907 CET4434984220.124.109.2192.168.11.20
          Nov 30, 2021 03:41:55.982204914 CET49842443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:57.113812923 CET49860443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:57.113910913 CET4434986020.124.109.2192.168.11.20
          Nov 30, 2021 03:41:57.114097118 CET49860443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:57.114445925 CET49860443192.168.11.2020.124.109.2
          Nov 30, 2021 03:41:57.114515066 CET4434986020.124.109.2192.168.11.20
          Nov 30, 2021 03:42:29.426997900 CET49860443192.168.11.2020.124.109.2
          Nov 30, 2021 03:42:30.475056887 CET49862443192.168.11.2020.124.109.2
          Nov 30, 2021 03:42:30.475143909 CET4434986220.124.109.2192.168.11.20
          Nov 30, 2021 03:42:30.475362062 CET49862443192.168.11.2020.124.109.2
          Nov 30, 2021 03:42:30.475691080 CET49862443192.168.11.2020.124.109.2
          Nov 30, 2021 03:42:30.475745916 CET4434986220.124.109.2192.168.11.20
          Nov 30, 2021 03:43:02.825860977 CET49862443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:03.859611034 CET49864443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:03.859743118 CET4434986420.124.109.2192.168.11.20
          Nov 30, 2021 03:43:03.859967947 CET49864443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:03.860244989 CET49864443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:03.860299110 CET4434986420.124.109.2192.168.11.20
          Nov 30, 2021 03:43:36.177983999 CET49864443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:37.241301060 CET49866443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:37.241425991 CET4434986620.124.109.2192.168.11.20
          Nov 30, 2021 03:43:37.241671085 CET49866443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:37.247456074 CET49866443192.168.11.2020.124.109.2
          Nov 30, 2021 03:43:37.247529984 CET4434986620.124.109.2192.168.11.20
          Nov 30, 2021 03:44:09.639334917 CET49866443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:10.671215057 CET49867443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:10.671298981 CET4434986720.124.109.2192.168.11.20
          Nov 30, 2021 03:44:10.671669006 CET49867443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:10.671976089 CET49867443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:10.672018051 CET4434986720.124.109.2192.168.11.20
          Nov 30, 2021 03:44:42.991240978 CET49867443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:44.056864977 CET49868443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:44.056916952 CET4434986820.124.109.2192.168.11.20
          Nov 30, 2021 03:44:44.057152033 CET49868443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:44.057569981 CET49868443192.168.11.2020.124.109.2
          Nov 30, 2021 03:44:44.057599068 CET4434986820.124.109.2192.168.11.20
          Nov 30, 2021 03:45:16.437073946 CET49868443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:17.500408888 CET49870443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:17.500531912 CET4434987020.124.109.2192.168.11.20
          Nov 30, 2021 03:45:17.500765085 CET49870443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:17.501157999 CET49870443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:17.501235962 CET4434987020.124.109.2192.168.11.20
          Nov 30, 2021 03:45:49.882854939 CET49870443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:50.930428982 CET49871443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:50.930515051 CET4434987120.124.109.2192.168.11.20
          Nov 30, 2021 03:45:50.930716038 CET49871443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:50.931056976 CET49871443192.168.11.2020.124.109.2
          Nov 30, 2021 03:45:50.931108952 CET4434987120.124.109.2192.168.11.20
          Nov 30, 2021 03:46:23.328387976 CET49871443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:24.377590895 CET49873443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:24.377707958 CET4434987320.124.109.2192.168.11.20
          Nov 30, 2021 03:46:24.378004074 CET49873443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:24.378310919 CET49873443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:24.378357887 CET4434987320.124.109.2192.168.11.20
          Nov 30, 2021 03:46:56.742958069 CET49873443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:57.806294918 CET49877443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:57.806432009 CET4434987720.124.109.2192.168.11.20
          Nov 30, 2021 03:46:57.806617975 CET49877443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:57.806936979 CET49877443192.168.11.2020.124.109.2
          Nov 30, 2021 03:46:57.806986094 CET4434987720.124.109.2192.168.11.20
          Nov 30, 2021 03:47:30.188834906 CET49877443192.168.11.2020.124.109.2
          Nov 30, 2021 03:47:31.236588001 CET49879443192.168.11.2020.124.109.2
          Nov 30, 2021 03:47:31.236712933 CET4434987920.124.109.2192.168.11.20
          Nov 30, 2021 03:47:31.236920118 CET49879443192.168.11.2020.124.109.2
          Nov 30, 2021 03:47:31.237231016 CET49879443192.168.11.2020.124.109.2
          Nov 30, 2021 03:47:31.237282038 CET4434987920.124.109.2192.168.11.20
          Nov 30, 2021 03:48:03.634541988 CET49879443192.168.11.2020.124.109.2
          Nov 30, 2021 03:48:04.683474064 CET49880443192.168.11.2020.124.109.2
          Nov 30, 2021 03:48:04.683604956 CET4434988020.124.109.2192.168.11.20
          Nov 30, 2021 03:48:04.683804035 CET49880443192.168.11.2020.124.109.2
          Nov 30, 2021 03:48:04.684099913 CET49880443192.168.11.2020.124.109.2
          Nov 30, 2021 03:48:04.684150934 CET4434988020.124.109.2192.168.11.20

          UDP Packets

          TimestampSource PortDest PortSource IPDest IP
          Nov 30, 2021 03:41:23.455224991 CET5775753192.168.11.201.1.1.1
          Nov 30, 2021 03:41:23.613805056 CET53577571.1.1.1192.168.11.20

          DNS Queries

          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
          Nov 30, 2021 03:41:23.455224991 CET192.168.11.201.1.1.10x8ea5Standard query (0)bgreenidaho.comA (IP address)IN (0x0001)

          DNS Answers

          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
          Nov 30, 2021 03:41:23.613805056 CET1.1.1.1192.168.11.200x8ea5No error (0)bgreenidaho.com20.124.109.2A (IP address)IN (0x0001)

          Code Manipulations

          Statistics

          CPU Usage

          Click to jump to process

          Memory Usage

          Click to jump to process

          High Level Behavior Distribution

          Click to dive into process behavior distribution

          Behavior

          Click to jump to process

          System Behavior

          General

          Start time:03:39:55
          Start date:30/11/2021
          Path:C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe"
          Imagebase:0x400000
          File size:143360 bytes
          MD5 hash:94CB19D0951996CDB8B4CB914248763E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:Visual Basic
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Author: Joe Security
          Reputation:low

          General

          Start time:03:40:39
          Start date:30/11/2021
          Path:C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\CI_PL_BL_ 4100675407_xls.exe"
          Imagebase:0x400000
          File size:143360 bytes
          MD5 hash:94CB19D0951996CDB8B4CB914248763E
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000009.00000000.410577418495.0000000000560000.00000040.00000001.sdmp, Author: Joe Security
          Reputation:low

          Disassembly

          Code Analysis

          Reset < >

            Executed Functions

            APIs
              • Part of subcall function 0251F7E0: LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            • NtAllocateVirtualMemory.NTDLL ref: 0251CEBB
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: AllocateLibraryLoadMemoryVirtual
            • String ID: "H [$U|t$_o+$ja)
            • API String ID: 2616484454-625739762
            • Opcode ID: 9bfd0bd73acbbd46e3a914864c9d2b86b85851e3a9c52d1cef316f596d8b5527
            • Instruction ID: 7acc5aea7a92fc6c1419390a9453be45bd600bd32de7d8dd9bffcf09a5deb797
            • Opcode Fuzzy Hash: 9bfd0bd73acbbd46e3a914864c9d2b86b85851e3a9c52d1cef316f596d8b5527
            • Instruction Fuzzy Hash: C1B2677160434A9FEB349E38CDA57EA3BB2FF56350F85812DDC8A9B240D3318985CB46
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • NtProtectVirtualMemory.NTDLL(-49398BAD,?,?,?,?,025219D3), ref: 02522A95
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: MemoryProtectVirtual
            • String ID: "H [$U|t$_o+$ja)
            • API String ID: 2706961497-625739762
            • Opcode ID: 4f681c12f418835ff81b4fca02426832a3d6bd4e30ce8f5af4f07d692951f0a7
            • Instruction ID: 8902c63a9348416156b81afd2fb1ca6924924f2c17426cc95db1bc34b810527d
            • Opcode Fuzzy Hash: 4f681c12f418835ff81b4fca02426832a3d6bd4e30ce8f5af4f07d692951f0a7
            • Instruction Fuzzy Hash: C692457160434A9FEF349E38C9A57EA3BA2FF55350F85812EDC8A9B244D3358985CB06
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • CreateFileA.KERNELBASE ref: 0251C91D
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: CreateFileLibraryLoad
            • String ID: "H [$U|t$_o+$ja)
            • API String ID: 2049390123-625739762
            • Opcode ID: c36b38a27644f17734f4697cddcc008596b09edfe43b068b9d92b0cc2c06b8f6
            • Instruction ID: 08188c2c2be4a2ce365361823a91697a5cc0d5fcb7c99bb503dfb7baa1a94c87
            • Opcode Fuzzy Hash: c36b38a27644f17734f4697cddcc008596b09edfe43b068b9d92b0cc2c06b8f6
            • Instruction Fuzzy Hash: 35923371A0434A9FEF349E34C9A57EA7BB2FF55390F85452EDC8A9B200D3358981CB46
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID: "H [$;$U|t$_o+$D]$ja)
            • API String ID: 0-2034042019
            • Opcode ID: a133a9870fb94e1f22af3caac362745b2757bda8bc760bdd731375da4e6daa20
            • Instruction ID: 322c887807250ba8bf6d5502dca9ff5d72ab861690a25ab0af64e22c9b397015
            • Opcode Fuzzy Hash: a133a9870fb94e1f22af3caac362745b2757bda8bc760bdd731375da4e6daa20
            • Instruction Fuzzy Hash: 5D825571A0434ADFEF349E38C9957EA3BB2FF55390F85452ADC8A9B240D3358985CB06
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID: "H [$U|t$_o+$ja)
            • API String ID: 1029625771-625739762
            • Opcode ID: 5941f8138f87115b13f0891b8d9e4819ddfd514f1f1d64d8a40b985a1f660a0f
            • Instruction ID: 216e59097732246008048a098f53687be20f77266425afd250d24b98568f1960
            • Opcode Fuzzy Hash: 5941f8138f87115b13f0891b8d9e4819ddfd514f1f1d64d8a40b985a1f660a0f
            • Instruction Fuzzy Hash: 11B26975A0034A9FEF349E34C9A57EA3BB2FF55390F95812DCC8A9B240D3358985CB46
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID: "H [$U|t$_o+$ja)
            • API String ID: 0-625739762
            • Opcode ID: aaca962ca139c6f191b6e7f08ea8ec538b50a9f6cae668de54218431c3accca6
            • Instruction ID: 03e205085d7d59d1757cb85de50eb2b22b0a14eb7a38a5497c0df4b698aacd4e
            • Opcode Fuzzy Hash: aaca962ca139c6f191b6e7f08ea8ec538b50a9f6cae668de54218431c3accca6
            • Instruction Fuzzy Hash: 2192677160434A9FEF349E38C9A57EA3BB2FF55350F85852EDC8A8B240D3358985CB46
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID: "H [$U|t$_o+$ja)
            • API String ID: 1029625771-625739762
            • Opcode ID: 2cf771b4b01112e36d29355fedb31b4ade9e8e557bbcc7b86bab92ce11a33c12
            • Instruction ID: 3108300cfa90f71aabfaa03b558c3b4a20af80e7a782db4e3066e1ef348c37fd
            • Opcode Fuzzy Hash: 2cf771b4b01112e36d29355fedb31b4ade9e8e557bbcc7b86bab92ce11a33c12
            • Instruction Fuzzy Hash: 3B92567160434ADFEF349E34C9A57EA7BA2FF56350F85852EDC8A8B250D3348985CB06
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID: E w$sp
            • API String ID: 0-1867652173
            • Opcode ID: 781206effa60e91685e821680969ba666942ff3d9d7ef906c5e163ca4638acb5
            • Instruction ID: d1e8874471331de4aa363a4d3bec71a1333262e9ae06eed000f8466910aa0dd2
            • Opcode Fuzzy Hash: 781206effa60e91685e821680969ba666942ff3d9d7ef906c5e163ca4638acb5
            • Instruction Fuzzy Hash: E2A175706043869FDB35DE38C9A47DA3BB2BF96390F244169CD4A8F2D5C7398A48CB45
            Uniqueness

            Uniqueness Score: -1.00%

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoadMemoryProtectVirtual
            • String ID: '7gO
            • API String ID: 3389902171-4049214191
            • Opcode ID: c808424a097b351697b643a3bda0f51806d1e2fcc4a2da3d533a07b6de1f79bf
            • Instruction ID: a35d4b5d9b600135e77bb14edfaf4a725299047928882cc3d0f5a85fc608a8ab
            • Opcode Fuzzy Hash: c808424a097b351697b643a3bda0f51806d1e2fcc4a2da3d533a07b6de1f79bf
            • Instruction Fuzzy Hash: 48327D356043969FDB35CE38C8A57DA7B92AF42360F85C26ECCDA8B1D6C734844AC716
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: da7c4211161135f3a31fa790e18639b01b69808724d8b723cba4b47b59e2cf5d
            • Instruction ID: 0e51f8335b4318c1c94610798e60ee3e1892132cf65efd5c611bec3fb948bbaf
            • Opcode Fuzzy Hash: da7c4211161135f3a31fa790e18639b01b69808724d8b723cba4b47b59e2cf5d
            • Instruction Fuzzy Hash: 2DA1973060035A9FDB25CF748991BDA7BB2FF46354F11846DED8ACB692D3318406CB89
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LdrInitializeThunk.NTDLL(0000008C,0000008C), ref: 0251E0EC
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 70b0991e226a79f29005090d5ef9030412bdcb44563385c6cc3224d715d71b04
            • Instruction ID: 2dec8b2ab72c8158b35acd12fd904f35fa6a145230e3e6f327c3174f1d243590
            • Opcode Fuzzy Hash: 70b0991e226a79f29005090d5ef9030412bdcb44563385c6cc3224d715d71b04
            • Instruction Fuzzy Hash: 3E8111366582829FE71ACB288C52AC9BF66BF9621475801ADCC908F353C722D443CB95
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • #527.MSVBVM60(Whigling), ref: 0041C885
            • __vbaStrMove.MSVBVM60 ref: 0041C896
            • __vbaStrCmp.MSVBVM60(Unpitying,00000000), ref: 0041C89E
            • __vbaFreeStr.MSVBVM60 ref: 0041C8B1
            • __vbaVarDup.MSVBVM60 ref: 0041C8E3
            • #513.MSVBVM60(?,?,00000099), ref: 0041C8F2
            • #717.MSVBVM60(?,?,00000080,00000000), ref: 0041C907
            • __vbaVar2Vec.MSVBVM60(?,?), ref: 0041C918
            • __vbaAryMove.MSVBVM60(?,?), ref: 0041C929
            • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041C93D
            • __vbaVarDup.MSVBVM60 ref: 0041C963
            • #520.MSVBVM60(?,?), ref: 0041C96D
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041C977
            • __vbaStrMove.MSVBVM60 ref: 0041C982
            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041C98E
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,000006F8), ref: 0041C9B0
            • #564.MSVBVM60(?,?), ref: 0041C9DA
            • __vbaHresultCheck.MSVBVM60(00000000), ref: 0041C9E5
            • __vbaI4Var.MSVBVM60(?), ref: 0041C9F9
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,000006FC), ref: 0041CA38
            • __vbaFreeVarList.MSVBVM60(00000002,00000005,?), ref: 0041CA48
            • #574.MSVBVM60(00000005), ref: 0041CA63
            • __vbaStrMove.MSVBVM60 ref: 0041CA6E
            • __vbaStrCopy.MSVBVM60 ref: 0041CA78
            • __vbaStrMove.MSVBVM60(Kaleches4,?,UNFREEZABLE,000043EE), ref: 0041CAA2
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,00000700), ref: 0041CABC
            • __vbaFreeStrList.MSVBVM60(00000003,?,?,00000000), ref: 0041CAD0
            • __vbaFreeVar.MSVBVM60 ref: 0041CADC
            • __vbaVarDup.MSVBVM60 ref: 0041CB05
            • #617.MSVBVM60(?,00000003,00000092), ref: 0041CB14
            • __vbaVarDup.MSVBVM60 ref: 0041CB37
            • #524.MSVBVM60(?,?), ref: 0041CB41
            • #696.MSVBVM60(Erikka3), ref: 0041CB4C
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041CB66
            • __vbaStrMove.MSVBVM60 ref: 0041CB71
            • __vbaStrVarVal.MSVBVM60(?,?,?,00006066,?,?), ref: 0041CBA0
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,00000704), ref: 0041CBCA
            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041CBE0
            • __vbaFreeVarList.MSVBVM60(00000004,00000003,?,?,?), ref: 0041CBF4
            • __vbaStrCopy.MSVBVM60 ref: 0041CC0E
            • __vbaStrCopy.MSVBVM60 ref: 0041CC1C
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,00000708), ref: 0041CC48
            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041CC58
            • #572.MSVBVM60(00000003), ref: 0041CC6F
            • __vbaStrMove.MSVBVM60 ref: 0041CC7A
            • #696.MSVBVM60(00000000), ref: 0041CC83
            • #704.MSVBVM60(?,000000FF,000000FE,000000FE,000000FE), ref: 0041CCA5
            • __vbaStrMove.MSVBVM60 ref: 0041CCB0
            • __vbaStrMove.MSVBVM60 ref: 0041CCBF
            • #696.MSVBVM60(DESCARTES), ref: 0041CCD8
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,0000070C), ref: 0041CD14
            • __vbaFreeStrList.MSVBVM60(00000003,?,?,00000000), ref: 0041CD2E
            • __vbaFreeVarList.MSVBVM60(00000002,00000002,00000003), ref: 0041CD3A
            • #692.MSVBVM60(00000002,taxachauffrens,diaphanous), ref: 0041CD51
            • __vbaStrVarMove.MSVBVM60(00000002), ref: 0041CD65
            • __vbaStrMove.MSVBVM60 ref: 0041CD70
            • __vbaStrCopy.MSVBVM60 ref: 0041CD8E
            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041CDC9
            • __vbaFreeVar.MSVBVM60 ref: 0041CDD1
            • __vbaLenBstrB.MSVBVM60(Deklareret9,?), ref: 0041CDFF
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,00000710), ref: 0041CE3A
            • #581.MSVBVM60(ALLEGATE), ref: 0041CE45
            • __vbaFpI4.MSVBVM60(0037189C), ref: 0041CE74
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,00000714), ref: 0041CE9F
            • #714.MSVBVM60(00000003,00000002,00000000), ref: 0041CEC1
            • #648.MSVBVM60(?), ref: 0041CED9
            • __vbaStrCopy.MSVBVM60 ref: 0041CEF3
            • __vbaLenBstrB.MSVBVM60(Lubriciousness6), ref: 0041CEFE
            • __vbaI4Var.MSVBVM60(00000003,?,0000349B,00001C15), ref: 0041CF1E
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,00000718), ref: 0041CF4D
            • __vbaFreeStr.MSVBVM60 ref: 0041CF52
            • __vbaFreeVarList.MSVBVM60(00000003,00000004,0000000A,00000003), ref: 0041CF66
            • __vbaHresultCheckObj.MSVBVM60(00000000,00401228,00402D28,0000071C), ref: 0041CF8F
            • __vbaAryDestruct.MSVBVM60(00000000,?,0041D024), ref: 0041D014
            • __vbaFreeStr.MSVBVM60 ref: 0041D01D
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Move$CheckHresultList$Copy$#696$Bstr$#513#520#524#527#564#572#574#581#617#648#692#704#714#717DestructVar2
            • String ID: -W$ALLEGATE$BENTJERS$DESCARTES$Deklareret9$Erikka3$Jeepers$Kaleches4$Lubriciousness6$NONCOME$Nightwalker8$Oprettelsesdokument$PRINTERNE$Quininise$TIDSSKRIFTSAMLINGEN$UNFREEZABLE$Unbrilliantly8$Unpitying$Whigling$basilian$diaphanous$emmik$f`$hajjs$halvtidsstillingens$napaea$taxachauffrens$~frK
            • API String ID: 444667331-2328328339
            • Opcode ID: 4659948d30caa4912c280b27300a889c9accea64e81a689cde27cfc9dd99c40a
            • Instruction ID: 2a8ecee4f16eadfb4dfbe966999e764f50dc237253a232f7bb3da02a55408f3c
            • Opcode Fuzzy Hash: 4659948d30caa4912c280b27300a889c9accea64e81a689cde27cfc9dd99c40a
            • Instruction Fuzzy Hash: A0323F71900218AFDB14DFA0DD88FDEBBB9FF48301F00816AE649B6190DB745A49CF65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaStrCopy.MSVBVM60 ref: 0041DA75
            • __vbaVarDup.MSVBVM60 ref: 0041DA98
            • #547.MSVBVM60(?,?), ref: 0041DAA6
            • __vbaVarTstGt.MSVBVM60(?,?), ref: 0041DACB
            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041DAE3
            • #537.MSVBVM60(000000A3), ref: 0041DAF6
            • __vbaStrMove.MSVBVM60 ref: 0041DB07
            • #525.MSVBVM60(00000027), ref: 0041DB0B
            • __vbaStrMove.MSVBVM60 ref: 0041DB16
            • #689.MSVBVM60(Silkwoman8,Delen1,Reduktionsventilernes), ref: 0041DB59
            • __vbaStrMove.MSVBVM60 ref: 0041DB64
            • __vbaStrMove.MSVBVM60(00000001,000000FF,00000000), ref: 0041DB80
            • __vbaStrMove.MSVBVM60(Socialdemokratis,00000000), ref: 0041DB91
            • #712.MSVBVM60(00000000), ref: 0041DB94
            • __vbaStrMove.MSVBVM60 ref: 0041DB9F
            • #717.MSVBVM60(?,?,00000080,00000000), ref: 0041DBBF
            • __vbaVar2Vec.MSVBVM60(?,?), ref: 0041DBD0
            • __vbaAryMove.MSVBVM60(?,?), ref: 0041DBE1
            • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,?), ref: 0041DBFD
            • __vbaFreeVarList.MSVBVM60(00000002,00000008,?), ref: 0041DC0D
            • #583.MSVBVM60(93200000,4202A390), ref: 0041DC24
            • __vbaFpR8.MSVBVM60 ref: 0041DC2A
            • #717.MSVBVM60(?,00000008,00000040,00000000), ref: 0041DC62
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041DC6C
            • __vbaStrMove.MSVBVM60 ref: 0041DC77
            • __vbaFreeVar.MSVBVM60 ref: 0041DC7C
            • #572.MSVBVM60(?), ref: 0041DC94
            • __vbaStrMove.MSVBVM60 ref: 0041DC9F
            • #629.MSVBVM60(?,?,0000002B,?), ref: 0041DCD0
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041DCDD
            • __vbaStrMove.MSVBVM60 ref: 0041DCE8
            • __vbaFreeStr.MSVBVM60 ref: 0041DCED
            • __vbaFreeVarList.MSVBVM60(00000004,00000002,00000008,00000002,?), ref: 0041DD08
            • __vbaR8IntI4.MSVBVM60 ref: 0041DD13
            • __vbaAryDestruct.MSVBVM60(00000000,?,0041DD9F), ref: 0041DD7B
            • __vbaFreeStr.MSVBVM60 ref: 0041DD86
            • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041DD8D
            • __vbaFreeStr.MSVBVM60 ref: 0041DD92
            • __vbaFreeStr.MSVBVM60 ref: 0041DD97
            • __vbaFreeStr.MSVBVM60 ref: 0041DD9C
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Move$Free$List$#717Destruct$#525#537#547#572#583#629#689#712CopyVar2
            • String ID: 17:17:17$Delen1$Reduktionsventilernes$Silkwoman8$Socialdemokratis$h
            • API String ID: 329208838-924080792
            • Opcode ID: a72f898264c120113e3e4308235229eb7c48ae894a75c05e2edc1911786d7201
            • Instruction ID: 5e1a92a4069419491f0841626415ce12ddb1be5a0f43ec86ea082cc4ad82f256
            • Opcode Fuzzy Hash: a72f898264c120113e3e4308235229eb7c48ae894a75c05e2edc1911786d7201
            • Instruction Fuzzy Hash: 22B1F8B1D00259DBDB14DF94DD84ADEFBB8FF88300F10815AE509A7264DB745A89CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: de83b3b8d202b4fb176b661250f2a985c5897b0da95771ea2b39012d077583c8
            • Instruction ID: 3e7c2e79b4893f1ce1a2a0d1cdf8b790eaab4b4a65e04765075d40881e3b24be
            • Opcode Fuzzy Hash: de83b3b8d202b4fb176b661250f2a985c5897b0da95771ea2b39012d077583c8
            • Instruction Fuzzy Hash: 9F312475A0871AAFFB34AD6489B13FB23D6AF06390F90493E9C8BC7181D374C589C949
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 92bafb4c2580e963179ad29ef1185e0f176b6115c082cd4d08805dacf2864ec5
            • Instruction ID: 96c2227d95379b0a3ac5b9d121868c91a5144f67b4960d5ebc14ed908631c02e
            • Opcode Fuzzy Hash: 92bafb4c2580e963179ad29ef1185e0f176b6115c082cd4d08805dacf2864ec5
            • Instruction Fuzzy Hash: 1D31687060135AAFEF359F20C8F57DB27E2AF56790F90C129DC8A8B644E3348945CB09
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 68d5dc367d4a0003a5339af16d532b2f569142e8e2d13027a9a32287de7783d0
            • Instruction ID: 58bf608426ae70f3b01368989efa1fd6db59f4c6d5eeab3c8b189ad4bb6313cf
            • Opcode Fuzzy Hash: 68d5dc367d4a0003a5339af16d532b2f569142e8e2d13027a9a32287de7783d0
            • Instruction Fuzzy Hash: 90310B3570536A6FDB249E2498B17EB37D3AF47790F50812CDCCAC7282D3348845C609
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: bbb221015972da276d775c562d9d9c238eb54d39282ec1d4a45c3d54e1d5e1eb
            • Instruction ID: 8a5f455ffe34e2d1159a6c0749f966a1f29d641917db95e296341e9996becd4d
            • Opcode Fuzzy Hash: bbb221015972da276d775c562d9d9c238eb54d39282ec1d4a45c3d54e1d5e1eb
            • Instruction Fuzzy Hash: 4A31D27470075AAFDB24AE6499F0BEB37E2BF49790F904039EC8AC7241D3308944CA18
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 8c59022973c831cf141f474f63f1014943a6f7a01b106f3b9be70ea7c1f0e186
            • Instruction ID: c98a7c1a0b5c011ae320e85b8e473b4e63dc5b8d89499e97f7238a5da6ffa008
            • Opcode Fuzzy Hash: 8c59022973c831cf141f474f63f1014943a6f7a01b106f3b9be70ea7c1f0e186
            • Instruction Fuzzy Hash: 8A21557470031BBFDF24AE6098B13EF27E2AF46790F50802EEC8AC7140D7308885CA09
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: c9944871d830815ab48d5c47c50eea3dc899df25e037fd594d003754a0eacdd2
            • Instruction ID: 5a7843099e3837fb90ee7991beac886a8ff47cb74fcd3c93c294b23d45b95c3d
            • Opcode Fuzzy Hash: c9944871d830815ab48d5c47c50eea3dc899df25e037fd594d003754a0eacdd2
            • Instruction Fuzzy Hash: 0111C17070176ABFDF249E6498B17EB27E2AF46790F508029EC8AC7640D3348949CA09
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • TerminateProcess.KERNELBASE(-8B311D27), ref: 0251C4CB
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: ProcessTerminate
            • String ID:
            • API String ID: 560597551-0
            • Opcode ID: 858492ccf4f0d3f46901171413f06e7a63a265291bc0b39cb3441e4f8b94cb0e
            • Instruction ID: 98880a965cffb4e2d8dbcf33f3d6f810389e5bfdbefc436a398b10770f2ba5c4
            • Opcode Fuzzy Hash: 858492ccf4f0d3f46901171413f06e7a63a265291bc0b39cb3441e4f8b94cb0e
            • Instruction Fuzzy Hash: E0F0B4751087058BFB242EA89E657FB2691AF02246F540B1ECC9B96580E7218981C607
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: #100
            • String ID:
            • API String ID: 1341478452-0
            • Opcode ID: 5886ea9f95e716861579e2993740c8d947d86eaa3339f263be0f3f78d1cf0319
            • Instruction ID: 0f894a85c9390419c5753dc329098d70d468bf5dd381af0beaf9aee7ec66fd98
            • Opcode Fuzzy Hash: 5886ea9f95e716861579e2993740c8d947d86eaa3339f263be0f3f78d1cf0319
            • Instruction Fuzzy Hash: 69D0A48064E3C02EC3036338282610A3F340C0322032F04E3D082DE0F3D46A48088B36
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: EnumWindows
            • String ID:
            • API String ID: 1129996299-0
            • Opcode ID: 7439306728c8a0d23b352543be0b00fffcd4a502ab4e443a6e86ee8d88438122
            • Instruction ID: 00406f5a904d2d86afdd7dc9ec5f1906885e0fb5b68bdef07c3972fd4f6c1b12
            • Opcode Fuzzy Hash: 7439306728c8a0d23b352543be0b00fffcd4a502ab4e443a6e86ee8d88438122
            • Instruction Fuzzy Hash: 8CA0240F11474501C334CDF454D001005001DC7030750CFC54370CD5D7D051CC004503
            Uniqueness

            Uniqueness Score: -1.00%

            Non-executed Functions

            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID: N.hP
            • API String ID: 0-2920491939
            • Opcode ID: b136c3b36488dc4f340e90b3493468b0641ad4a769b4270004f0cc2b6ff5cf74
            • Instruction ID: 4321bf4dddcb426fc8307cb0817f23287248ab90cdf237a851eb5da3057e57f3
            • Opcode Fuzzy Hash: b136c3b36488dc4f340e90b3493468b0641ad4a769b4270004f0cc2b6ff5cf74
            • Instruction Fuzzy Hash: 2F8138759083958ECF35CE248D983EA7BA3AF42360F55829ACC998F1CAC3364585C727
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 24fcfb759a8b8559bf59a553562095b3cdeed600d289461f38b807473cd55f0b
            • Instruction ID: 732cb6d463c61920551f66b94c8e4bf4e00f18f04aff86455e28f78dc59a99c6
            • Opcode Fuzzy Hash: 24fcfb759a8b8559bf59a553562095b3cdeed600d289461f38b807473cd55f0b
            • Instruction Fuzzy Hash: D961CB25A053555FDB24CE34E9E27D7BB62FF83220F55806DDE864B1D2C332440ACB55
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3973c90b1f0ef276b156cc2b637c9e89ed43fc33c1ef917f7e87032ef6b17433
            • Instruction ID: df0e6e670625038e7f4b98b9cf3b5a0ce6f571dc502179f3a1d44f2074934c5d
            • Opcode Fuzzy Hash: 3973c90b1f0ef276b156cc2b637c9e89ed43fc33c1ef917f7e87032ef6b17433
            • Instruction Fuzzy Hash: 5331473970435A8BEB249DB885E43FB2692BF17754FD44639DC97CB6C1E3608886C30A
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 13948ffc2fa66f38bdc9c75d83ed245f03cefd927b48898da27bb3aac0afae64
            • Instruction ID: bc86550a98acdbedec4ef71747f40c122cc8827c28bd8b9c4552a60dd2b59cda
            • Opcode Fuzzy Hash: 13948ffc2fa66f38bdc9c75d83ed245f03cefd927b48898da27bb3aac0afae64
            • Instruction Fuzzy Hash: 923133316097598FD725CE38C8A87CA7BB1BF6A350F28055ECA89DB2E2C370D845CB45
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • LoadLibraryA.KERNELBASE(?,?,?,-0BD69E19,031D6E2F,DCDA2738,?,23BC22BD), ref: 0251F8FF
            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID: LibraryLoad
            • String ID:
            • API String ID: 1029625771-0
            • Opcode ID: 469da5421012eb52bc1f117214adc8e5b47a024690e4e1512ee5f611f1632d28
            • Instruction ID: 483d6e7dcc63635105db9de7865c602c7e85653c26467163a8a3d227a9ed90fd
            • Opcode Fuzzy Hash: 469da5421012eb52bc1f117214adc8e5b47a024690e4e1512ee5f611f1632d28
            • Instruction Fuzzy Hash: B621683A94439A9FEB289E388A153FA7A72AF54790F82041EDC86EB255D3314E42C745
            Uniqueness

            Uniqueness Score: -1.00%

            Memory Dump Source
            • Source File: 00000002.00000002.410581088153.0000000002510000.00000040.00000001.sdmp, Offset: 02510000, based on PE: false
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 04a0ea82bf315052c696f3d9ef678587c4ac5491c9ca4f342e372d0ff8c38bb6
            • Instruction ID: 4431c4ca2d3faf77bc05c5a635ef827586e5f0ed7e08a4c6206a6b396068261d
            • Opcode Fuzzy Hash: 04a0ea82bf315052c696f3d9ef678587c4ac5491c9ca4f342e372d0ff8c38bb6
            • Instruction Fuzzy Hash: DDB09230710A81CFCE95CA09C280E0473F0BB44B00B014891E401CBA51C224E800CA00
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaStrCopy.MSVBVM60 ref: 0041DFB8
            • __vbaStrCopy.MSVBVM60 ref: 0041DFC0
            • #538.MSVBVM60(?,0000087E,00000002,00000001), ref: 0041DFCF
            • __vbaVarTstEq.MSVBVM60(?,?), ref: 0041DFF1
            • __vbaFreeVar.MSVBVM60 ref: 0041DFFC
            • #612.MSVBVM60(?), ref: 0041E00B
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041E015
            • __vbaStrMove.MSVBVM60 ref: 0041E026
            • __vbaFreeVar.MSVBVM60 ref: 0041E02B
            • __vbaStrCopy.MSVBVM60 ref: 0041E052
            • #618.MSVBVM60(?,0000002D), ref: 0041E05E
            • __vbaStrMove.MSVBVM60 ref: 0041E069
            • __vbaStrCmp.MSVBVM60(Leona,00000000), ref: 0041E071
            • __vbaFreeStr.MSVBVM60 ref: 0041E083
            • #512.MSVBVM60(sphagnumets,00000032), ref: 0041E099
            • __vbaStrMove.MSVBVM60 ref: 0041E0A4
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 0041E0B8
            • __vbaHresultCheckObj.MSVBVM60(00000000,022FEA7C,00403394,00000014), ref: 0041E0DD
            • __vbaStrMove.MSVBVM60(00000001), ref: 0041E0F9
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033DC,00000138), ref: 0041E11D
            • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 0041E12D
            • __vbaFreeObj.MSVBVM60 ref: 0041E139
            • #702.MSVBVM60(?,000000FF,000000FE,000000FE,000000FE), ref: 0041E159
            • __vbaStrMove.MSVBVM60 ref: 0041E164
            • __vbaFreeVar.MSVBVM60 ref: 0041E169
            • #610.MSVBVM60(?), ref: 0041E173
            • #553.MSVBVM60(?,?), ref: 0041E181
            • #696.MSVBVM60(Anslagskraftens), ref: 0041E18C
            • __vbaVarTstLt.MSVBVM60(00008002,?), ref: 0041E1AB
            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041E1BD
            • #539.MSVBVM60(?,0000008C,000000EA,00000005), ref: 0041E1DF
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041E1EF
            • __vbaStrMove.MSVBVM60 ref: 0041E1F6
            • __vbaFreeVar.MSVBVM60 ref: 0041E1FB
            • #669.MSVBVM60 ref: 0041E201
            • __vbaStrMove.MSVBVM60 ref: 0041E20C
            • #629.MSVBVM60(?,?,00000005,?), ref: 0041E23A
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041E244
            • __vbaStrMove.MSVBVM60 ref: 0041E24B
            • __vbaFreeStr.MSVBVM60 ref: 0041E250
            • __vbaFreeVarList.MSVBVM60(00000003,00000008,00000002,?), ref: 0041E264
            • __vbaLenBstr.MSVBVM60(SIDESTILLER), ref: 0041E272
            • __vbaFreeStr.MSVBVM60(0041E2E0), ref: 0041E2BF
            • __vbaFreeStr.MSVBVM60 ref: 0041E2C4
            • __vbaFreeStr.MSVBVM60 ref: 0041E2C9
            • __vbaFreeStr.MSVBVM60 ref: 0041E2CE
            • __vbaFreeStr.MSVBVM60 ref: 0041E2D3
            • __vbaFreeStr.MSVBVM60 ref: 0041E2D8
            • __vbaFreeStr.MSVBVM60 ref: 0041E2DD
            • __vbaErrorOverflow.MSVBVM60 ref: 0041E307
            • __vbaVarDup.MSVBVM60(-00000001,00000000,6FD4D8B1), ref: 0041E37E
            • #632.MSVBVM60(?,?,000000E6,00000002), ref: 0041E395
            • __vbaVarTstEq.MSVBVM60(?,?), ref: 0041E3BA
            • __vbaFreeVarList.MSVBVM60(00000003,?,00000002,?), ref: 0041E3D6
            • #536.MSVBVM60(?), ref: 0041E3F6
            • __vbaStrMove.MSVBVM60 ref: 0041E407
            • __vbaFreeVar.MSVBVM60 ref: 0041E40C
            • __vbaLenBstrB.MSVBVM60(Operationalise), ref: 0041E425
            • #574.MSVBVM60(00000003,0000000A,000000FF,00000000), ref: 0041E440
            • __vbaStrMove.MSVBVM60 ref: 0041E44B
            • #711.MSVBVM60(?,00000000), ref: 0041E452
            • __vbaAryVar.MSVBVM60(00002008,?), ref: 0041E461
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Move$List$Copy$BstrCheckHresult$#512#536#538#539#553#574#610#612#618#629#632#669#696#702#711ErrorNew2Overflow
            • String ID: Anslagskraftens$Leona$N$NEGLIGERS$Operationalise$PREFAVOURABLY$SIDESTILLER$Toothed$sphagnumets
            • API String ID: 1098405350-3309045338
            • Opcode ID: d31998f9842eb745058daa8ecf5678625ed07abe901e6a418204749095ecee1c
            • Instruction ID: b10eaef41411e1a95daa79c03a5f0ee21f39a54b5c50ee711f38f87938dd5dbe
            • Opcode Fuzzy Hash: d31998f9842eb745058daa8ecf5678625ed07abe901e6a418204749095ecee1c
            • Instruction Fuzzy Hash: 1CF11971D00259ABDB04DFE4DD88AEDBBB8FB48700F10812AE516B72A4DB745A89CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • #610.MSVBVM60(?), ref: 0041EE11
            • #553.MSVBVM60(?,?), ref: 0041EE1F
            • #648.MSVBVM60(?), ref: 0041EE37
            • __vbaVarTstLt.MSVBVM60(?,?), ref: 0041EE59
            • __vbaFreeVarList.MSVBVM60(00000003,?,0000000A,?), ref: 0041EE75
            • #539.MSVBVM60(?,000000FB,000000A8,000000D6), ref: 0041EE96
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041EEA6
            • __vbaStrMove.MSVBVM60 ref: 0041EEB3
            • __vbaFreeVar.MSVBVM60 ref: 0041EEB8
            • __vbaVarDup.MSVBVM60 ref: 0041EEE6
            • #629.MSVBVM60(0000000A,?,000000E5,00000002), ref: 0041EEFD
            • __vbaStrVarMove.MSVBVM60(0000000A), ref: 0041EF07
            • __vbaStrMove.MSVBVM60 ref: 0041EF0E
            • __vbaFreeVarList.MSVBVM60(00000003,?,00000002,0000000A), ref: 0041EF1E
            • __vbaVarDup.MSVBVM60 ref: 0041EF45
            • #524.MSVBVM60(?,?), ref: 0041EF53
            • __vbaStrVarVal.MSVBVM60(?,?), ref: 0041EF67
            • #523.MSVBVM60(00000000), ref: 0041EF6A
            • __vbaStrMove.MSVBVM60 ref: 0041EF75
            • #696.MSVBVM60(00000000), ref: 0041EF78
            • #698.MSVBVM60(0000000A,00000000), ref: 0041EF86
            • #518.MSVBVM60(?,0000000A), ref: 0041EF94
            • __vbaStrVarVal.MSVBVM60(?,?), ref: 0041EFA2
            • #527.MSVBVM60(00000000), ref: 0041EFA5
            • __vbaStrMove.MSVBVM60 ref: 0041EFB0
            • __vbaStrCmp.MSVBVM60(konkurrencedygtige,00000000), ref: 0041EFB8
            • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,?), ref: 0041EFDA
            • __vbaFreeVarList.MSVBVM60(00000004,?,?,0000000A,?), ref: 0041EFF2
            • __vbaVarDup.MSVBVM60 ref: 0041F020
            • #717.MSVBVM60(?,?,00000080,00000000), ref: 0041F031
            • __vbaVar2Vec.MSVBVM60(?,?), ref: 0041F03F
            • __vbaAryMove.MSVBVM60(?,?), ref: 0041F04D
            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041F05D
            • __vbaVarDup.MSVBVM60 ref: 0041F07C
            • #619.MSVBVM60(?,?,00000014), ref: 0041F088
            • #520.MSVBVM60(0000000A,?), ref: 0041F096
            • __vbaStrVarMove.MSVBVM60(0000000A), ref: 0041F0A0
            • __vbaStrMove.MSVBVM60 ref: 0041F0AB
            • __vbaFreeVarList.MSVBVM60(00000003,?,?,0000000A), ref: 0041F0BB
            • __vbaFreeStr.MSVBVM60(0041F129), ref: 0041F110
            • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041F118
            • __vbaFreeStr.MSVBVM60 ref: 0041F121
            • __vbaFreeStr.MSVBVM60 ref: 0041F126
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Move$List$#518#520#523#524#527#539#553#610#619#629#648#696#698#717DestructVar2
            • String ID: Doernes2$Krag4$UOPLYSTHEDS$\$hearsay$konkurrencedygtige
            • API String ID: 1351758486-1457662506
            • Opcode ID: d19f2f90564cb56352faa32300c7afdb54d8cd1df35fd52c11e180412ba9399a
            • Instruction ID: 5d040c957a9e26ef42be1373eea363bde4bdc72b262fce76808089994b15650c
            • Opcode Fuzzy Hash: d19f2f90564cb56352faa32300c7afdb54d8cd1df35fd52c11e180412ba9399a
            • Instruction Fuzzy Hash: 9CB1EAB2C002199BDB14DFE4DE84EDEBBB8FB48704F10815AE506B7154DB746A49CFA4
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaStrCopy.MSVBVM60 ref: 0041E569
            • #514.MSVBVM60(?,00000009), ref: 0041E575
            • __vbaStrMove.MSVBVM60 ref: 0041E586
            • __vbaStrCmp.MSVBVM60(Lifestyle4,00000000), ref: 0041E58E
            • __vbaFreeStr.MSVBVM60 ref: 0041E5A0
            • __vbaStrCat.MSVBVM60(Fluxroot,?), ref: 0041E5BA
            • __vbaStrMove.MSVBVM60 ref: 0041E5C1
            • __vbaStrCat.MSVBVM60(Certif,00000000), ref: 0041E5C9
            • __vbaStrMove.MSVBVM60 ref: 0041E5D0
            • __vbaFreeStr.MSVBVM60 ref: 0041E5D5
            • #717.MSVBVM60(?,?,00000040,00000000), ref: 0041E5F3
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041E5FD
            • __vbaStrMove.MSVBVM60 ref: 0041E608
            • __vbaFreeVar.MSVBVM60 ref: 0041E60D
            • #698.MSVBVM60(?,00002742), ref: 0041E624
            • __vbaVarTstEq.MSVBVM60(?,?), ref: 0041E640
            • __vbaFreeVar.MSVBVM60 ref: 0041E64F
            • __vbaVarDup.MSVBVM60 ref: 0041E685
            • #632.MSVBVM60(?,?,000000CB,?), ref: 0041E69C
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041E6A6
            • __vbaStrMove.MSVBVM60 ref: 0041E6B1
            • __vbaFreeVarList.MSVBVM60(00000003,?,?,?), ref: 0041E6C1
            • #696.MSVBVM60(Hanebaand), ref: 0041E6CF
            • #713.MSVBVM60(UNCLEANER,?), ref: 0041E6E5
            • __vbaStrMove.MSVBVM60 ref: 0041E6F0
            • __vbaStrCat.MSVBVM60(00000000), ref: 0041E6F3
            • __vbaStrMove.MSVBVM60 ref: 0041E6FA
            • #651.MSVBVM60(?,00000000), ref: 0041E701
            • __vbaStrMove.MSVBVM60 ref: 0041E70C
            • __vbaStrCat.MSVBVM60(00000000), ref: 0041E70F
            • __vbaStrMove.MSVBVM60 ref: 0041E716
            • __vbaFreeStrList.MSVBVM60(00000003,?,?,?), ref: 0041E726
            • __vbaFreeVar.MSVBVM60 ref: 0041E732
            • __vbaAryDestruct.MSVBVM60(00000000,?,0041E797), ref: 0041E771
            • __vbaFreeStr.MSVBVM60 ref: 0041E780
            • __vbaFreeStr.MSVBVM60 ref: 0041E785
            • __vbaFreeStr.MSVBVM60 ref: 0041E78A
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Move$Free$List$#514#632#651#696#698#713#717CopyDestruct
            • String ID: A$Certif$Epharmonic$Fluxroot$Hanebaand$Kisteklder$Lifestyle4$UNCLEANER$wanness
            • API String ID: 1225124453-3253074281
            • Opcode ID: a74e9af56b4fae96d4b258fc2e5904bf4511391023e7812cb18324e7d70f493e
            • Instruction ID: 47c858292c2afc6f243e80f59837156d27629640eb25e5446b48662521e0394c
            • Opcode Fuzzy Hash: a74e9af56b4fae96d4b258fc2e5904bf4511391023e7812cb18324e7d70f493e
            • Instruction Fuzzy Hash: A071D5B5D00208ABDB04DFA5DD849EEBBB8FF58300F50812AE506B72A4DB745A89CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaChkstk.MSVBVM60(?,00401386), ref: 0041F3EE
            • __vbaStrCopy.MSVBVM60(?,?,?,?,00401386), ref: 0041F427
            • #646.MSVBVM60(0000000A), ref: 0041F446
            • __vbaStrMove.MSVBVM60 ref: 0041F451
            • __vbaStrCmp.MSVBVM60(ANCHIETEA,00000000), ref: 0041F45D
            • __vbaFreeStr.MSVBVM60 ref: 0041F472
            • __vbaFreeVar.MSVBVM60 ref: 0041F47B
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 0041F4A7
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403394,00000014), ref: 0041F4F8
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033DC,00000078), ref: 0041F540
            • __vbaFreeObj.MSVBVM60 ref: 0041F563
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 0041F583
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403394,00000014), ref: 0041F5D4
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033DC,00000138), ref: 0041F625
            • __vbaFreeObj.MSVBVM60 ref: 0041F640
            • __vbaOnError.MSVBVM60(000000FF), ref: 0041F64F
            • __vbaStrCopy.MSVBVM60 ref: 0041F664
            • #618.MSVBVM60(?,000000F9), ref: 0041F67A
            • __vbaStrMove.MSVBVM60 ref: 0041F685
            • __vbaStrCmp.MSVBVM60(Eighteenth4,00000000), ref: 0041F691
            • __vbaFreeStr.MSVBVM60 ref: 0041F6A5
            • #616.MSVBVM60(Skdyrets5,00000037), ref: 0041F6C5
            • __vbaStrMove.MSVBVM60 ref: 0041F6D0
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 0041F6E9
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,00403394,00000014), ref: 0041F73A
            • __vbaStrMove.MSVBVM60(00000001), ref: 0041F773
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033DC,00000138), ref: 0041F7A6
            • __vbaFreeStrList.MSVBVM60(00000002,?,00000000), ref: 0041F7C8
            • __vbaFreeObj.MSVBVM60(?,?,00401386), ref: 0041F7D4
            • #702.MSVBVM60(00000002,000000FF,000000FE,000000FE,000000FE), ref: 0041F7FB
            • __vbaStrMove.MSVBVM60 ref: 0041F806
            • __vbaFreeVar.MSVBVM60 ref: 0041F80F
            • __vbaFreeStr.MSVBVM60(0041F86B), ref: 0041F852
            • __vbaFreeStr.MSVBVM60 ref: 0041F85B
            • __vbaFreeStr.MSVBVM60 ref: 0041F864
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$CheckHresult$Move$New2$Copy$#616#618#646#702ChkstkErrorList
            • String ID: ANCHIETEA$Eighteenth4$Skdyrets5$UNFACTUALNESS$hjreparentesernes
            • API String ID: 2120662567-2651150714
            • Opcode ID: ad6ab693148f3b45e6b1d19e22f78ee215f21962dca1d391032fc5666f0c6aea
            • Instruction ID: 1c3a6e7a1976c436f102b78da6a20d39769aceb93b25719f40c33ab1ff70f517
            • Opcode Fuzzy Hash: ad6ab693148f3b45e6b1d19e22f78ee215f21962dca1d391032fc5666f0c6aea
            • Instruction Fuzzy Hash: B5D12D74A00318DFDB14DFA0D988BDDBBB4BF48305F20816AE506BB2A1DB745A86CF54
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Move$List$#518#536#561#619#631#716AddrefCopy
            • String ID: Korrektrernes5$NONVENOMOUSNESS$STUBCHEN$Skibakkerne$WScript.Shell$klovdyr$v
            • API String ID: 1348390723-3911151726
            • Opcode ID: 54b9d824027d2a835ce874f14ca7b1cb7e3761860e9e701333c88e71433b0a2d
            • Instruction ID: c4dde96c75a00f573ec47b6c43044a60a7ff210b93d06ae346fe08b5c65cdbf2
            • Opcode Fuzzy Hash: 54b9d824027d2a835ce874f14ca7b1cb7e3761860e9e701333c88e71433b0a2d
            • Instruction Fuzzy Hash: AF61E8B5C00219ABDB04DFA4D9899DEBFB8FF58704F10412AE506B72A0DB746689CF94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • #536.MSVBVM60(?), ref: 0041F1B4
            • __vbaStrMove.MSVBVM60 ref: 0041F1BF
            • #581.MSVBVM60(00000000), ref: 0041F1C6
            • __vbaLenBstr.MSVBVM60(HOMESTAY), ref: 0041F1D7
            • __vbaFpR8.MSVBVM60 ref: 0041F1F5
            • __vbaFreeStr.MSVBVM60 ref: 0041F21A
            • __vbaFreeVar.MSVBVM60 ref: 0041F21F
            • __vbaVarDup.MSVBVM60 ref: 0041F244
            • #607.MSVBVM60(?,00000013,00000003), ref: 0041F254
            • __vbaStrVarVal.MSVBVM60(?,?), ref: 0041F262
            • #690.MSVBVM60(ENTROCHITE,GYROVAGUE,Valvulate7,00000000), ref: 0041F278
            • __vbaFreeStr.MSVBVM60 ref: 0041F281
            • __vbaFreeVarList.MSVBVM60(00000002,00000003,?), ref: 0041F293
            • #660.MSVBVM60(?,00000003,?,00000001,00000001), ref: 0041F2C4
            • #520.MSVBVM60(?,?), ref: 0041F2D2
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041F2DC
            • __vbaStrMove.MSVBVM60 ref: 0041F2E7
            • __vbaFreeVarList.MSVBVM60(00000004,00000003,0000000A,?,?), ref: 0041F2FF
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 0041F316
            • __vbaHresultCheckObj.MSVBVM60(00000000,022FEA7C,00403394,0000004C), ref: 0041F33B
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033B4,00000028), ref: 0041F35B
            • __vbaFreeObj.MSVBVM60 ref: 0041F364
            • __vbaFreeStr.MSVBVM60(0041F3AA), ref: 0041F3A3
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Move$CheckHresultList$#520#536#581#607#660#690BstrNew2
            • String ID: ENTROCHITE$GYROVAGUE$HOMESTAY$Valvulate7
            • API String ID: 4190706326-1299342816
            • Opcode ID: 5d05e551b9269d6bc645ad2e8d4c6c25fc8167042414987e31c815d8b1ef010c
            • Instruction ID: 18182b45a1fd1b9bfd3c1f192fe4350dc7eadb7b06416c6f6deffd6f12d28d7b
            • Opcode Fuzzy Hash: 5d05e551b9269d6bc645ad2e8d4c6c25fc8167042414987e31c815d8b1ef010c
            • Instruction Fuzzy Hash: 36611BB1900219EBCB00DFD4DD88EEEBBB8FF58705F10416AE546B61A0DBB4554ACF64
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaStrCopy.MSVBVM60 ref: 0041EA59
            • __vbaVarDup.MSVBVM60 ref: 0041EA73
            • #666.MSVBVM60(?,?), ref: 0041EA81
            • __vbaStrVarMove.MSVBVM60(?), ref: 0041EA8B
            • __vbaStrMove.MSVBVM60 ref: 0041EA9C
            • __vbaFreeVarList.MSVBVM60(00000002,?,?), ref: 0041EAA8
            • #618.MSVBVM60(?,00000091), ref: 0041EABA
            • __vbaStrMove.MSVBVM60 ref: 0041EAC5
            • __vbaStrCmp.MSVBVM60(Lancetbladet6,00000000), ref: 0041EACD
            • __vbaFreeStr.MSVBVM60 ref: 0041EADF
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 0041EB00
            • __vbaHresultCheckObj.MSVBVM60(00000000,022FEA7C,00403394,00000014), ref: 0041EB25
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033DC,00000138), ref: 0041EB52
            • __vbaFreeObj.MSVBVM60 ref: 0041EB5B
            • #702.MSVBVM60(?,000000FF,000000FE,000000FE,000000FE), ref: 0041EB7B
            • __vbaStrMove.MSVBVM60 ref: 0041EB86
            • __vbaFreeVar.MSVBVM60 ref: 0041EB8B
            • __vbaFreeStr.MSVBVM60(0041EBD4), ref: 0041EBC7
            • __vbaFreeStr.MSVBVM60 ref: 0041EBCC
            • __vbaFreeStr.MSVBVM60 ref: 0041EBD1
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Move$CheckHresult$#618#666#702CopyListNew2
            • String ID: Lancetbladet6$uvisneligheden$windir
            • API String ID: 2448542732-203791292
            • Opcode ID: ba65078d291f24a858b8ef88220d631cb68a30f591f2626539dc9bd426d9e530
            • Instruction ID: 93f09a9705e80a18c184ad7f9bdbc2bfd6ced5caa24b576d8e32f9b18e05a9f3
            • Opcode Fuzzy Hash: ba65078d291f24a858b8ef88220d631cb68a30f591f2626539dc9bd426d9e530
            • Instruction Fuzzy Hash: B0415275900219ABCB00DF94DE89DDEBBB8EF58305F20412AF512B32A0DB746A45CF94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Construct2Destruct
            • String ID:
            • API String ID: 3342376363-0
            • Opcode ID: 46d34ab468fc2cac29abc08da48a01f850c22ee07bba1367ac555ddc42c2a596
            • Instruction ID: e9c0ba4422a09506f6b3f5aadbec08117cd3db1a297dacdfb6a946c0ef9008cd
            • Opcode Fuzzy Hash: 46d34ab468fc2cac29abc08da48a01f850c22ee07bba1367ac555ddc42c2a596
            • Instruction Fuzzy Hash: DA417174E052899FDB04DBA8C4507AEFF76AF98300F14C19F895157382CA79990ACBA1
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaVarDup.MSVBVM60(-00000001,00000000,6FD4D8B1), ref: 0041E37E
            • #632.MSVBVM60(?,?,000000E6,00000002), ref: 0041E395
            • __vbaVarTstEq.MSVBVM60(?,?), ref: 0041E3BA
            • __vbaFreeVarList.MSVBVM60(00000003,?,00000002,?), ref: 0041E3D6
            • #536.MSVBVM60(?), ref: 0041E3F6
            • __vbaStrMove.MSVBVM60 ref: 0041E407
            • __vbaFreeVar.MSVBVM60 ref: 0041E40C
            • __vbaLenBstrB.MSVBVM60(Operationalise), ref: 0041E425
            • #574.MSVBVM60(00000003,0000000A,000000FF,00000000), ref: 0041E440
            • __vbaStrMove.MSVBVM60 ref: 0041E44B
            • #711.MSVBVM60(?,00000000), ref: 0041E452
            • __vbaAryVar.MSVBVM60(00002008,?), ref: 0041E461
            • __vbaAryCopy.MSVBVM60(?,?), ref: 0041E478
            • __vbaFreeStr.MSVBVM60 ref: 0041E481
            • __vbaFreeVarList.MSVBVM60(00000003,00000003,0000000A,?), ref: 0041E495
            • #554.MSVBVM60 ref: 0041E49A
            • __vbaFreeStr.MSVBVM60(0041E4E2), ref: 0041E4CF
            • __vbaAryDestruct.MSVBVM60(00000000,?), ref: 0041E4DB
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$ListMove$#536#554#574#632#711BstrCopyDestruct
            • String ID: NEGLIGERS$Operationalise$PREFAVOURABLY
            • API String ID: 398136637-198126775
            • Opcode ID: 2eed633ddf3db996f5ed2fd8c611b455a1ce076a18c5f6c86e8cc516343fceb8
            • Instruction ID: 8f4e54df32ca24931feb130516052430e71214869d950335b477a7882e3afb04
            • Opcode Fuzzy Hash: 2eed633ddf3db996f5ed2fd8c611b455a1ce076a18c5f6c86e8cc516343fceb8
            • Instruction Fuzzy Hash: D451EAB1C00209AFDB04DFE4D989AEEBBB8FB48705F10C16AE515B72A0DB741649CF65
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            Memory Dump Source
            • Source File: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$Free$Copy$Move$#536#587#606#714List
            • String ID:
            • API String ID: 273173519-0
            • Opcode ID: b17f53b7c591e57e7b1bfc03bcb01c4639615117dd9acfdf5b8bd96b71c6d93d
            • Instruction ID: 0168e783088c4a36306cc712d063fb0c381573333367387479c659c2ce4e5f6a
            • Opcode Fuzzy Hash: b17f53b7c591e57e7b1bfc03bcb01c4639615117dd9acfdf5b8bd96b71c6d93d
            • Instruction Fuzzy Hash: 4B41A7B5C1021DABCB04DF94ED859DEBBB8FF58704F10811AE912B7264DB746A06CF94
            Uniqueness

            Uniqueness Score: -1.00%

            APIs
            • __vbaFreeVarList.MSVBVM60(00000003), ref: 00420039
            • __vbaNew2.MSVBVM60(004033A4,0042146C), ref: 00420055
            • __vbaHresultCheckObj.MSVBVM60(00000000,022FEA7C,00403394,00000014), ref: 0042007A
            • __vbaHresultCheckObj.MSVBVM60(00000000,?,004033DC,0000013C), ref: 004200C8
            • __vbaFreeObj.MSVBVM60 ref: 004200D1
            Strings
            Memory Dump Source
            • Source File: 00000002.00000002.410578815758.0000000000401000.00000020.00020000.sdmp, Offset: 00400000, based on PE: true
            • Associated: 00000002.00000002.410578779620.0000000000400000.00000002.00020000.sdmp Download File
            • Associated: 00000002.00000002.410578989718.000000000041C000.00000020.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579040656.0000000000421000.00000004.00020000.sdmp Download File
            • Associated: 00000002.00000002.410579088809.0000000000423000.00000002.00020000.sdmp Download File
            Similarity
            • API ID: __vba$CheckFreeHresult$ListNew2
            • String ID: srlove
            • API String ID: 701738313-3382764130
            • Opcode ID: 2529492a2dca9c03fcd3b86582498cd8a4db5b7c14d31bf8bb97edc409a85d15
            • Instruction ID: 0a5e03b915b907335e4a4d20cecc4a84a1820f58530a0de817e4d973d0cf265e
            • Opcode Fuzzy Hash: 2529492a2dca9c03fcd3b86582498cd8a4db5b7c14d31bf8bb97edc409a85d15
            • Instruction Fuzzy Hash: D231AF71E00308AFDB14DFA5D985AAEBBF8FF48700F10802AE505B7291D6785905CB99
            Uniqueness

            Uniqueness Score: -1.00%