Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.W32.AIDetectNet.01.5595.4189

Overview

General Information

Sample Name:SecuriteInfo.com.W32.AIDetectNet.01.5595.4189 (renamed file extension from 4189 to exe)
Analysis ID:659059
MD5:8a743553a12d1c6cbf3bb3714410e034
SHA1:7225b7233ad25d7b426cacee1df9ade262e67520
SHA256:6e7ed6e2800cb45547906279f027fe098d08bb0dbc517ce41fe0ebe33222ab99
Tags:AgentTeslaexe
Infos:

Detection

BluStealer, SpyEx
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Generic Dropper
Multi AV Scanner detection for submitted file
Yara detected SpyEx stealer
Malicious sample detected (through community Yara rule)
Yara detected BluStealer
Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Tries to steal Crypto Currency Wallets
Writes or reads registry keys via WMI
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Encrypted powershell cmdline option found
Machine Learning detection for sample
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
Creates an undocumented autostart registry key
Machine Learning detection for dropped file
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Stores files to the Windows start menu directory
Found evasive API chain (may stop execution after checking a module file name)
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • SecuriteInfo.com.W32.AIDetectNet.01.5595.exe (PID: 6952 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe" MD5: 8A743553A12D1C6CBF3BB3714410E034)
    • powershell.exe (PID: 7036 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA== MD5: DBA3E6449E97D4E3DF64527EF7012A10)
      • conhost.exe (PID: 7044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • cleanup
{"Exfil Mode": "SMTP", "From": "\"t.liaen@yandex.com\"", "To": "t.liaen@yandex.com", "SMTP Server": "lCC\u007f+wxN@|f\nBy"}
SourceRuleDescriptionAuthorStrings
00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SpyEx_1Yara detected SpyEx stealerJoe Security
      00000000.00000003.444443907.0000000003926000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
        00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SpyEx_1Yara detected SpyEx stealerJoe Security
            Click to see the 27 entries
            SourceRuleDescriptionAuthorStrings
            0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.raw.unpackJoeSecurity_SpyEx_1Yara detected SpyEx stealerJoe Security
                0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39656d3.3.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                  0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.4e70000.7.raw.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                    0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.4e70000.7.unpackJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
                      Click to see the 34 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeVirustotal: Detection: 40%Perma Link
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeReversingLabs: Detection: 43%
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeAvira: detected
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exeVirustotal: Detection: 40%Perma Link
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exeReversingLabs: Detection: 43%
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exeJoe Sandbox ML: detected
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.13.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.unpackAvira: Label: TR/Patched.Ren.Gen
                      Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.450000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.unpackAvira: Label: TR/Dropper.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.unpackAvira: Label: TR/Dropper.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.4.unpackAvira: Label: TR/Dropper.Gen
                      Source: 0.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.450000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 7.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.11.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.9.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.unpackAvira: Label: TR/Dropper.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.3.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.2.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.unpackAvira: Label: TR/Dropper.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.7.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.unpackAvira: Label: TR/Dropper.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.unpackAvira: Label: TR/Dropper.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.unpackAvira: Label: TR/Dropper.Gen
                      Source: 7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.0.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.5.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.1.unpackAvira: Label: TR/Dropper.MSIL.Gen
                      Source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.raw.unpackMalware Configuration Extractor: BluStealer {"Exfil Mode": "SMTP", "From": "\"t.liaen@yandex.com\"", "To": "t.liaen@yandex.com", "SMTP Server": "lCC\u007f+wxN@|f\nBy"}
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Work\SQLiteForExcel\Source\SQLite3_StdCall\Release\SQLite3_StdCall.pdb0. source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529484906.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmp, SQLite3_StdCall.dll.8.dr
                      Source: Binary string: protobuf-net.pdbSHA256 source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: C:\Work\SQLiteForExcel\Source\SQLite3_StdCall\Release\SQLite3_StdCall.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529484906.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmp, SQLite3_StdCall.dll.8.dr
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Local\Google\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\Public\4334444639304441384146393044\SQLite3.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_0280E8C8
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503255880.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503276267.0000000002B17000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-net
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-netJ
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://github.com/mgravell/protobuf-neti
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354

                      System Summary

                      barindex
                      Source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
                      Source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Auto-generated rule - file scan copy.pdf.r11 Author: Florian Roth
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::enumvalues
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::getstringvalue
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::EnumKey
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, xtu.csLarge array initialization: qii: array initializer size 708058
                      Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.450000.0.unpack, xtu.csLarge array initialization: qii: array initializer size 708058
                      Source: 7.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.0.unpack, xtu.csLarge array initialization: qii: array initializer size 708058
                      Source: 7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.3.unpack, xtu.csLarge array initialization: qii: array initializer size 708058
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                      Source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: LokiBot_Dropper_Packed_R11_Feb18 date = 2018-02-14, hash1 = 3b248d40fd7acb839cc592def1ed7652734e0e5ef93368be3c36c042883a3029, author = Florian Roth, description = Auto-generated rule - file scan copy.pdf.r11, reference = https://app.any.run/tasks/401df4d9-098b-4fd0-86e0-7a52ce6ddbf5, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028012190_2_02801219
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028012280_2_02801228
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_02800F0B0_2_02800F0B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_02800F180_2_02800F18
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028822780_2_02882278
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_02885BF00_2_02885BF0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028848400_2_02884840
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_02881E580_2_02881E58
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028826700_2_02882670
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028857710_2_02885771
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028822690_2_02882269
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_02885BE00_2_02885BE0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028840B80_2_028840B8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028800070_2_02880007
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028848310_2_02884831
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028826600_2_02882660
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028609680_2_02860968
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 0_2_028800400_2_02880040
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10008C5B8_2_10008C5B
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_100096E38_2_100096E3
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_1000AB3C8_2_1000AB3C
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_1000919F8_2_1000919F
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10009DDB8_2_10009DDB
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_100041EB8_2_100041EB
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: String function: 00403202 appears 327 times
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.501869229.0000000000502000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMT_68312.exeB vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506007712.0000000004D40000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameYhezobkundwyvw.dll" vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameprotobuf-net.dllJ vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503086371.0000000002984000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameabacus.exe vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.491472337.0000000003C3D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameabacus.exe vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000007.00000000.492565968.00000000003A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMT_68312.exeB vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000000.500591295.0000000000497000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameabacus.exe vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameabacus.exe vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000000.496089277.0000000000D92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMT_68312.exeB vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.525548641.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529653327.0000000003EE7000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529505154.0000000003EE9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.525584977.0000000003EED000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529547803.0000000003EEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.525493096.0000000003EF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.525470221.0000000003EEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.525603775.0000000003EF9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529697322.0000000003EEC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMsMpLics.dllj% vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeBinary or memory string: OriginalFilenameMT_68312.exeB vs SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeSection loaded: zipfldr.dllJump to behavior
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: notes.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeVirustotal: Detection: 40%
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeReversingLabs: Detection: 43%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeJump to behavior
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe "C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe"
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\YajeuJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajieobpm.51w.ps1Jump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/13@0/0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE "%w"."%w_node"(nodeno INTEGER PRIMARY KEY, data BLOB);CREATE TABLE "%w"."%w_rowid"(rowid INTEGER PRIMARY KEY, nodeno INTEGER);CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY, parentnode INTEGER);INSERT INTO '%q'.'%q_node' VALUES(1, zeroblob(%d))
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.706002917.0000000060966000.00000002.00000001.01000000.0000000A.sdmp, sqlite3.dll.8.drBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7044:120:WilError_01
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: E*\AC:\Users\Dell\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeBinary or memory string: I*\AC:\Users\Dell\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000000.500293865.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: `IF0@`I*\AC:\Users\Dell\AppData\Roaming\Microsoft\Windows\Templates\Stub\Project1.vbp
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeString found in binary or memory: Addresses:GAddress for {0} count not be found./Address updated for {0}
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Source: Binary string: C:\Work\SQLiteForExcel\Source\SQLite3_StdCall\Release\SQLite3_StdCall.pdb0. source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529484906.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmp, SQLite3_StdCall.dll.8.dr
                      Source: Binary string: protobuf-net.pdbSHA256 source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: protobuf-net.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: C:\Work\SQLiteForExcel\Source\SQLite3_StdCall\Release\SQLite3_StdCall.pdb source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000003.529484906.0000000003EFC000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmp, SQLite3_StdCall.dll.8.dr

                      Data Obfuscation

                      barindex
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39656d3.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.4e70000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.4e70000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e56f3.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ae55b0.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.444443907.0000000003926000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503255880.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.506443549.0000000004E70000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503230604.0000000002AF6000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503276267.0000000002B17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 6952, type: MEMORYSTR
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, xtu.cs.Net Code: qij System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.450000.0.unpack, xtu.cs.Net Code: qij System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 7.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.0.unpack, xtu.cs.Net Code: qij System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: 7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.3.unpack, xtu.cs.Net Code: qij System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_0040B4E5 push esp; retf 8_2_0040B4EB
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_0040C23E push 0B88B6BFh; retf 8_2_0040C248
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10002E11 push ecx; ret 8_2_10002E24
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10006A98 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,8_2_10006A98
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.998461587691195
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.998461587691195
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dllJump to dropped file
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\Public\4334444639304441384146393044\sqlite3.dllJump to dropped file
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders StartupJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\YajeuJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exeJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exe\:Zone.Identifier:$DATAJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503255880.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503276267.0000000002B17000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe TID: 6972Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7164Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7132Thread sleep time: -922337203685477s >= -30000sJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_8-8575
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_8-9040
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5825Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1701Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeAPI call chain: ExitProcess graph end nodegraph_8-9042
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dllJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Local\Google\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\Public\4334444639304441384146393044\SQLite3.dllJump to behavior
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503276267.0000000002B17000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware|VIRTUAL|A M I|Xen"select * from Win32_ComputerSystem
                      Source: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Microsoft|VMWare|Virtual
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001660 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_10001660
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10006A98 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,8_2_10006A98
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10006C55 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_10006C55
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001660 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_10001660
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10004DF6 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_10004DF6

                      HIPS / PFW / Operating System Protection Evasion

                      barindex
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: Base64 decoded Start-Sleep -Seconds 11
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: Base64 decoded Start-Sleep -Seconds 11Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeMemory written: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe base: 400000 value starts with: 4D5AJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.ConsoleHost\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.ConsoleHost.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Numerics\v4.0_4.0.0.0__b77a5c561934e089\System.Numerics.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Security\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Security.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Utility\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Utility.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Configuration.Install\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Configuration.Install.dll VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00113~31bf3856ad364e35~amd64~~10.0.17134.1.cat VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\sqlite3.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\sqlite3.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\sqlite3.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\sqlite3.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\sqlite3.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.zip VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: GetLocaleInfoA,8_2_100072B8
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10002FBC GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,8_2_10002FBC

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 6952, type: MEMORYSTR
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3bf0410.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.500293865.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.498743382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.498134765.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.497568730.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 6952, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 4916, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3bf0410.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.500293865.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.498743382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.498134765.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.497568730.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 6952, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 4916, type: MEMORYSTR

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.4.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3bf0410.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.500293865.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.498743382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.498134765.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000000.497568730.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 6952, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe PID: 4916, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001400 _sqlite3_stdcall_bind_text16@20,sqlite3_bind_text16,8_2_10001400
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001430 _sqlite3_stdcall_bind_value@12,sqlite3_bind_value,8_2_10001430
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001450 _sqlite3_stdcall_bind_zeroblob@12,sqlite3_bind_zeroblob,8_2_10001450
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001470 _sqlite3_stdcall_bind_parameter_count@4,sqlite3_bind_parameter_count,8_2_10001470
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001480 _sqlite3_stdcall_bind_parameter_name@8,sqlite3_bind_parameter_name,8_2_10001480
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_100014A0 _sqlite3_stdcall_bind_parameter_index@8,sqlite3_bind_parameter_index,8_2_100014A0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001320 _sqlite3_stdcall_bind_blob@20,sqlite3_bind_blob,8_2_10001320
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001350 _sqlite3_stdcall_bind_double@16,sqlite3_bind_double,8_2_10001350
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001370 _sqlite3_stdcall_bind_int@12,sqlite3_bind_int,8_2_10001370
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001180 _sqlite3_stdcall_clear_bindings@4,sqlite3_clear_bindings,8_2_10001180
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_10001390 _sqlite3_stdcall_bind_int64@16,sqlite3_bind_int64,8_2_10001390
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_100013B0 _sqlite3_stdcall_bind_null@8,sqlite3_bind_null,8_2_100013B0
                      Source: C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exeCode function: 8_2_100013D0 _sqlite3_stdcall_bind_text@20,sqlite3_bind_text,8_2_100013D0
                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid Accounts211
                      Windows Management Instrumentation
                      11
                      Registry Run Keys / Startup Folder
                      111
                      Process Injection
                      1
                      Masquerading
                      1
                      OS Credential Dumping
                      1
                      System Time Discovery
                      Remote Services1
                      Archive Collected Data
                      Exfiltration Over Other Network Medium1
                      Encrypted Channel
                      Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default Accounts2
                      Command and Scripting Interpreter
                      1
                      DLL Side-Loading
                      11
                      Registry Run Keys / Startup Folder
                      1
                      Disable or Modify Tools
                      LSASS Memory1
                      Query Registry
                      Remote Desktop Protocol2
                      Data from Local System
                      Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain Accounts2
                      Native API
                      Logon Script (Windows)1
                      DLL Side-Loading
                      31
                      Virtualization/Sandbox Evasion
                      Security Account Manager221
                      Security Software Discovery
                      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local Accounts1
                      PowerShell
                      Logon Script (Mac)Logon Script (Mac)111
                      Process Injection
                      NTDS1
                      Process Discovery
                      Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                      Deobfuscate/Decode Files or Information
                      LSA Secrets31
                      Virtualization/Sandbox Evasion
                      SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.common4
                      Obfuscated Files or Information
                      Cached Domain Credentials1
                      Application Window Discovery
                      VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup Items13
                      Software Packing
                      DCSync2
                      File and Directory Discovery
                      Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                      DLL Side-Loading
                      Proc Filesystem125
                      System Information Discovery
                      Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 signatures2 2 Behavior Graph ID: 659059 Sample: SecuriteInfo.com.W32.AIDete... Startdate: 07/07/2022 Architecture: WINDOWS Score: 100 31 Malicious sample detected (through community Yara rule) 2->31 33 Antivirus detection for dropped file 2->33 35 Antivirus / Scanner detection for submitted sample 2->35 37 11 other signatures 2->37 7 SecuriteInfo.com.W32.AIDetectNet.01.5595.exe 7 2->7         started        process3 file4 21 C:\Users\user\AppData\Roaming\...\notes.exe, PE32 7->21 dropped 23 C:\Users\user\...\notes.exe:Zone.Identifier, ASCII 7->23 dropped 25 SecuriteInfo.com.W...Net.01.5595.exe.log, ASCII 7->25 dropped 39 Creates an undocumented autostart registry key 7->39 41 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 7->41 43 Encrypted powershell cmdline option found 7->43 45 2 other signatures 7->45 11 SecuriteInfo.com.W32.AIDetectNet.01.5595.exe 3 11 7->11         started        15 powershell.exe 15 7->15         started        17 SecuriteInfo.com.W32.AIDetectNet.01.5595.exe 7->17         started        signatures5 process6 file7 27 C:\Users\Public\...\sqlite3.dll, PE32 11->27 dropped 29 C:\Users\Public\...\SQLite3_StdCall.dll, PE32 11->29 dropped 47 Tries to harvest and steal browser information (history, passwords, etc) 11->47 49 Tries to steal Crypto Currency Wallets 11->49 19 conhost.exe 15->19         started        signatures8 process9

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      SecuriteInfo.com.W32.AIDetectNet.01.5595.exe41%VirustotalBrowse
                      SecuriteInfo.com.W32.AIDetectNet.01.5595.exe44%ReversingLabsByteCode-MSIL.Spyware.Noon
                      SecuriteInfo.com.W32.AIDetectNet.01.5595.exe100%AviraTR/Dropper.MSIL.Gen
                      SecuriteInfo.com.W32.AIDetectNet.01.5595.exe100%Joe Sandbox ML
                      SourceDetectionScannerLabelLink
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exe100%AviraTR/Dropper.MSIL.Gen
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exe100%Joe Sandbox ML
                      C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dll0%VirustotalBrowse
                      C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dll0%MetadefenderBrowse
                      C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dll0%ReversingLabs
                      C:\Users\Public\4334444639304441384146393044\sqlite3.dll0%VirustotalBrowse
                      C:\Users\Public\4334444639304441384146393044\sqlite3.dll0%MetadefenderBrowse
                      C:\Users\Public\4334444639304441384146393044\sqlite3.dll0%ReversingLabs
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exe41%VirustotalBrowse
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Yajeu\notes.exe44%ReversingLabsByteCode-MSIL.Spyware.Noon
                      SourceDetectionScannerLabelLinkDownload
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.1.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.13.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3b56028.8.unpack100%AviraTR/Patched.Ren.GenDownload File
                      0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.450000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.0.unpack100%AviraTR/Dropper.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.6.unpack100%AviraTR/Dropper.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.4.unpack100%AviraTR/Dropper.GenDownload File
                      0.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.450000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      7.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.11.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.3.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.2.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.1.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.9.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      0.2.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.39e1d80.4.unpack100%AviraTR/Dropper.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.3.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.2.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.8.unpack100%AviraTR/Dropper.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.7.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      0.3.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.3ba6048.9.unpack100%AviraTR/Dropper.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.10.unpack100%AviraTR/Dropper.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.400000.12.unpack100%AviraTR/Dropper.GenDownload File
                      7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.0.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      8.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.ce0000.5.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      7.0.SecuriteInfo.com.W32.AIDetectNet.01.5595.exe.2f0000.1.unpack100%AviraTR/Dropper.MSIL.GenDownload File
                      No Antivirus matches
                      No Antivirus matches
                      No contacted domains info
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://github.com/mgravell/protobuf-netSecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpfalse
                        high
                        https://github.com/mgravell/protobuf-netiSecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          https://stackoverflow.com/q/14436606/23354SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpfalse
                            high
                            https://github.com/mgravell/protobuf-netJSecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpfalse
                              high
                              https://api.telegram.org/botSecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503255880.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503276267.0000000002B17000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://stackoverflow.com/q/11564914/23354;SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.503376807.0000000002B67000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpfalse
                                  high
                                  https://stackoverflow.com/q/2152978/23354SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.445358931.0000000003BF0000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, 00000000.00000002.506263882.0000000004E10000.00000004.08000000.00040000.00000000.sdmpfalse
                                    high
                                    No contacted IP infos
                                    Joe Sandbox Version:35.0.0 Citrine
                                    Analysis ID:659059
                                    Start date and time: 07/07/202217:18:252022-07-07 17:18:25 +02:00
                                    Joe Sandbox Product:CloudBasic
                                    Overall analysis duration:0h 10m 47s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Sample file name:SecuriteInfo.com.W32.AIDetectNet.01.5595.4189 (renamed file extension from 4189 to exe)
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                    Number of analysed new started processes analysed:21
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • HDC enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@8/13@0/0
                                    EGA Information:
                                    • Successful, ratio: 66.7%
                                    HDC Information:
                                    • Successful, ratio: 27.1% (good quality ratio 26.7%)
                                    • Quality average: 79.9%
                                    • Quality standard deviation: 24.8%
                                    HCA Information:
                                    • Successful, ratio: 71%
                                    • Number of executed functions: 147
                                    • Number of non-executed functions: 58
                                    Cookbook Comments:
                                    • Adjust boot time
                                    • Enable AMSI
                                    • Exclude process from analysis (whitelisted): audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                                    • Excluded domains from analysis (whitelisted): www.bing.com, ris.api.iris.microsoft.com, client.wns.windows.com, licensing.mp.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                                    • Execution Graph export aborted for target SecuriteInfo.com.W32.AIDetectNet.01.5595.exe, PID 6312 because there are no executed function
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report creation exceeded maximum time and may have missing disassembly code information.
                                    • Report size getting too big, too many NtEnumerateKey calls found.
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryAttributesFile calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    TimeTypeDescription
                                    17:19:52API Interceptor32x Sleep call for process: powershell.exe modified
                                    17:20:10API Interceptor594x Sleep call for process: SecuriteInfo.com.W32.AIDetectNet.01.5595.exe modified
                                    No context
                                    No context
                                    No context
                                    No context
                                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                    C:\Users\Public\4334444639304441384146393044\SQLite3_StdCall.dllBooking002.exeGet hashmaliciousBrowse
                                      SecuriteInfo.com.W32.AIDetectNet.01.10117.exeGet hashmaliciousBrowse
                                        SecuriteInfo.com.W32.AIDetectNet.01.26890.exeGet hashmaliciousBrowse
                                          SecuriteInfo.com.Variant.Bulz.700673.18484.exeGet hashmaliciousBrowse
                                            SecuriteInfo.com.Variant.Bulz.700673.26284.exeGet hashmaliciousBrowse
                                              Order-7263601.exeGet hashmaliciousBrowse
                                                SecuriteInfo.com.W32.MSIL_Kryptik.HBW.genEldorado.12715.exeGet hashmaliciousBrowse
                                                  Re-2181718.exeGet hashmaliciousBrowse
                                                    SecuriteInfo.com.W32.AIDetectNet.01.28304.exeGet hashmaliciousBrowse
                                                      SecuriteInfo.com.W32.AIDetectNet.01.32016.exeGet hashmaliciousBrowse
                                                        SecuriteInfo.com.W32.AIDetectNet.01.32339.exeGet hashmaliciousBrowse
                                                          MmNJcLe58f.exeGet hashmaliciousBrowse
                                                            SecuriteInfo.com.Variant.Ursu.608909.11813.exeGet hashmaliciousBrowse
                                                              RINI - BP220097.exeGet hashmaliciousBrowse
                                                                Requests1250.exeGet hashmaliciousBrowse
                                                                  BPL_1057230.exe.exeGet hashmaliciousBrowse
                                                                    MT155026.exeGet hashmaliciousBrowse
                                                                      SecuriteInfo.com.Variant.Strictor.273382.14790.exeGet hashmaliciousBrowse
                                                                        MT_013224617.exeGet hashmaliciousBrowse
                                                                          SecuriteInfo.com.Variant.Strictor.273382.3027.exeGet hashmaliciousBrowse
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:SQLite 3.x database, last written using SQLite version 3032001
                                                                            Category:modified
                                                                            Size (bytes):40960
                                                                            Entropy (8bit):0.792852251086831
                                                                            Encrypted:false
                                                                            SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                                                            MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                                                            SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                                                            SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                                                            SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                                                            Malicious:false
                                                                            Reputation:high, very likely benign file
                                                                            Preview:SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):60416
                                                                            Entropy (8bit):6.476799607351969
                                                                            Encrypted:false
                                                                            SSDEEP:768:iwxijL3LxouSmW7Z534ZO1z0/AgqWgjKDv01FoMRxrU:iwxiFNWdVOv/BijKavRK
                                                                            MD5:D77B227A28A78627C2323CAC75948390
                                                                            SHA1:E228C3951F2A9FD0FEBFE07390633AB4F35727F4
                                                                            SHA-256:527EC201DCD7695BD9830EB82AB35A3986121DE9EA156193834AED9D79223B82
                                                                            SHA-512:5627FBC8BBB98F644E21F101A68F0E0B07B87C264D00EA227286BED8AB6DD4EBF5114F03B632604F775FF93666A409A1A179A81EBFC9246956BA8150FF5B0587
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Joe Sandbox View:
                                                                            • Filename: Booking002.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.W32.AIDetectNet.01.10117.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.W32.AIDetectNet.01.26890.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.Variant.Bulz.700673.18484.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.Variant.Bulz.700673.26284.exe, Detection: malicious, Browse
                                                                            • Filename: Order-7263601.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.W32.MSIL_Kryptik.HBW.genEldorado.12715.exe, Detection: malicious, Browse
                                                                            • Filename: Re-2181718.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.W32.AIDetectNet.01.28304.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.W32.AIDetectNet.01.32016.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.W32.AIDetectNet.01.32339.exe, Detection: malicious, Browse
                                                                            • Filename: MmNJcLe58f.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.Variant.Ursu.608909.11813.exe, Detection: malicious, Browse
                                                                            • Filename: RINI - BP220097.exe, Detection: malicious, Browse
                                                                            • Filename: Requests1250.exe, Detection: malicious, Browse
                                                                            • Filename: BPL_1057230.exe.exe, Detection: malicious, Browse
                                                                            • Filename: MT155026.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.Variant.Strictor.273382.14790.exe, Detection: malicious, Browse
                                                                            • Filename: MT_013224617.exe, Detection: malicious, Browse
                                                                            • Filename: SecuriteInfo.com.Variant.Strictor.273382.3027.exe, Detection: malicious, Browse
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........B-.J#C.J#C.J#C.C[.Q#C.C[.Y#C.C[...#C.m.8.H#C.Q..I#C.J#B.0#C.C[.I#C.C[.K#C.C[.K#C.RichJ#C.................PE..L...!<.N...........!.........J............................................... ..............................................,...<......................................................................@............................................text...|........................... ..`.rdata...).......*..................@..@.data...8...........................@....rsrc...............................@..@.reloc..............................@..B........................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:Zip archive data, at least v2.0 to extract
                                                                            Category:dropped
                                                                            Size (bytes):31807
                                                                            Entropy (8bit):7.991011459273904
                                                                            Encrypted:true
                                                                            SSDEEP:768:a71TC0sm3iuHOcXwLsAJavuc/6JDw66qiTXZ:k1TC0s0X9XwLsAJavu66D6qEJ
                                                                            MD5:E91150A120A7D0B90C9541DDC35DF2DA
                                                                            SHA1:8B218F7653CBA01CD73A818DE380E5B1018D1D40
                                                                            SHA-256:E96C6C2D75C1AF719909FAC9CBF1A63441052C0ACC5BFFF8E53D663DD0D7EE89
                                                                            SHA-512:3A796D7556799DEE2BF2C0EE402B5AD39908EE2572F6E3A9DD78229D0F4E9D3F5236D0E1AF08B6A0866189E219DF03B0ED428A4B5DFB4EBDF585436615E66E28
                                                                            Malicious:false
                                                                            Reputation:moderate, very likely benign file
                                                                            Preview:PK...........@Mb..{..........SQLite3_StdCall.dll..@...8>..0....#..11A...Z...".WW......$(.f|$....q..Ik..T.6...mM4.UV..5.j.F...&C.........]^j.~_..........s.=..s.=.5cZ...S....E.:BI..........w.u...Gds>..0wu........5...k..0..-."v.f.ZM.T....4__. g..fL.9{b...$...5...ve..jW .k...+....>.5....%.;qI..y...V.....l6R...;5!.c...r..#...1[..e.<....SM.n..N..&....;.....Hj..7..4R.uO..RKQ1.WF..Qw..2JI.M...@....C.. u....i.e...W....l..?.E..V...dC...?...X$.i...5.T...;......\..H%QW.^.%..._......'w........`..PRg..V..E....IA..p...zRqBAI..!..!....4?.....'}....+|.=........fD...,.B0.'...?)..y.;l =~....Sbz......>.........{..Dq.|.aH.5C.....w..b...W.?.."...Y. .W. ... |.?.......~8..{.C}V..>...s....s.[...(.4.......w..J.......AA..}=....l`|..&.........s.?....;......p........n...{.w%5 .;..t...$.gzO.L..#dC.K_.8...).8i?y.%.].<w....<..g%y..g)yn"....g!y.g.y....\J...s!y..s.y..g.y&.g.yF.g.yj.s.yN&. ..g y....y..SI.4y*."....".v.l......5.v..u..+/...x.2=..%c7....)*.....U...Z.....n!.
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):599419
                                                                            Entropy (8bit):6.490720742062744
                                                                            Encrypted:false
                                                                            SSDEEP:12288:OQwLOkFyRUXeqQg1vTuOv43WZfyy9IQoqyRHPvKftzTFJKs/:OetRUXeE1buOv4GZaQI9RHiJKs/
                                                                            MD5:5405413FFF79B8D9C747AA900F60F082
                                                                            SHA1:71CAF8907DDD9A3A25D71356BD2CE09BD293BD78
                                                                            SHA-256:3E5A28FFDE07AC661C26B6CCF94E64C1C90B1F25B3B24C90605AA922B87642EB
                                                                            SHA-512:2F09A30FC4DA5166BD665210FEFA1D44CE344F0EC6A37F127D677AEB3CA4FC0D09B7C9C1540F57DA1E3449B7F588A1C61115395E965FA153D4BAA5033266ED66
                                                                            Malicious:false
                                                                            Antivirus:
                                                                            • Antivirus: Virustotal, Detection: 0%, Browse
                                                                            • Antivirus: Metadefender, Detection: 0%, Browse
                                                                            • Antivirus: ReversingLabs, Detection: 0%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....O...........!.....8...<......X........P.....`.................................[........ ...................... .......@..8............................p...$...........................`.......................A..l............................text....6.......8..................`.0`.data...<....P.......>..............@.0..rdata.......`.......N..............@.@@.bss..................................@..edata....... ......................@.0@.idata..8....@......................@.0..CRT.........P......................@.0..tls.... ....`......................@.0..reloc...$...p...&..................@.0B/4......`............B..............@.@B/19..................D..............@..B/35.....M............H..............@..B/51......C.......D...P..............@..B/63.......... ......................@..B/77..........0......................@..B/89..........@..........
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:Zip archive data, at least v2.0 to extract
                                                                            Category:dropped
                                                                            Size (bytes):302418
                                                                            Entropy (8bit):7.998422186263683
                                                                            Encrypted:true
                                                                            SSDEEP:6144:dXR80RGZx5E7gq/J3ZrC91PKkbchdkJ2BwWukWcQhrCN3:dB8TjIrC91PKk4hdkkfC1e
                                                                            MD5:21765A296B37C1B074BC14316DC9D6CD
                                                                            SHA1:C99C541D528AD6DEFE78970E90361D86AD5FA6AE
                                                                            SHA-256:C5A7D1D5F61A535AA511FC9B8119FF5103BE48F97F89E123A138453C4AA5FC66
                                                                            SHA-512:5D3392D0F9EE7ED8D9471375FF5333554CA80B7DBE436C2BACB42C1FFE8A5C687835D58AE8425029F83500F43C19268B3315A5C43EDB12B707DF367E6B86EA0A
                                                                            Malicious:false
                                                                            Preview:PK........f\.@.k.W....{%......sqlite3.dll..}|T.8..3s.L..3.....5*.jF.2$....F......[/.E8..$d....Nk..}........F@...f..j.\..4`.'.T#........L2....|~.<.....g.....Zk..V.g8+.q...u.....y.... ..?s.xnW.._.._..W....6el.......w3.~.{..........e<....o.g|...<z.q).&."?.-.'rm.....$.5...Sy.$n~"..$q...v@f.W...3.,l1...g.=cc...Mf......q.....}..&q.S.E'7$qm..".4.s]!..EI...?/v..h.....'...&..S.e........o....9:.........bAH..~........M..%..#....A....Q....c..i.{..z.7?f.b.%g._{..|..}+..0...$6w......Y.28.o...m|...?..s.s.].....e......./wl>o.-n.....d,.........-....@:,7......f.6....<..c..~....N.0....;X.8....f..o..o...!.#............p\.l...<..5..T.D.....V6.;.^..vy>.....W.. .+Vz.t..x.4...W..R4.sb.$j.E.sz..."7k.....9....$*0....b....M...U+..\*.h..V:.K...Td..L...T.2+.Sz...X.bM..!.n..]..;.....?..h....<r.,...V "=.e.x...r'..XK4/S.5.5.mP.Z7;.S.{N".K.T.[f;".S#.##a.....<.-+..)...c...6..mD.T..9..~j..._.......<t...w..Z%7.g.R...Dn.4.Z,6.b....bkm........0... ,.z.......J....
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:modified
                                                                            Size (bytes):621
                                                                            Entropy (8bit):5.350261800132725
                                                                            Encrypted:false
                                                                            SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhayoDLI4MWuPrr7VTiv:ML9E4Ks2wKDE4KhK3VZ9pKhRAE4Kzr7a
                                                                            MD5:D2D23B288FCB4AB6617A8E4D336F49FB
                                                                            SHA1:F850B6C3BE0F5BC37F4506797823DEE54E550299
                                                                            SHA-256:C172B96325429CDD3FE76267694FB383E9658E0DC97BADA3FF33473A1FD1EFC3
                                                                            SHA-512:9548AB67B8C3791E0C4EBF02248F7B4BEB706C751E76B5FEC22E93D7C29B804C14979DB0E9C44BE36C328DABADB24093061854D0102A639622CBE274F6A6DBF8
                                                                            Malicious:true
                                                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21e8e2b95c\System.Xml.ni.dll",0..
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:data
                                                                            Category:dropped
                                                                            Size (bytes):16412
                                                                            Entropy (8bit):5.54903394580812
                                                                            Encrypted:false
                                                                            SSDEEP:384:Ht9/l+0BDl7Tw9+u1RUS0nCjultImspRvAjs4oXfqYCy:n1EkNTCCltkNpfjV
                                                                            MD5:2B154115E46CBEE51DA368DA9B5203EC
                                                                            SHA1:5AE578D0F81BACC69CABE7029FA4FE730500DA5B
                                                                            SHA-256:842A5E5E3045B1909A92B125957EFD48188C43A7819942BB6978BBD5CE43264C
                                                                            SHA-512:DAE32F27649C10F8AEC61EA8F9F4E4B820A9A9F01C3D34435FDFCDF42F6CF23A2A8AE33972F6F9FDD8B00643C79F36E2EA4DD4658753465180B1652178AD357C
                                                                            Malicious:false
                                                                            Preview:@...e.......................f.].......e.%............@..........H...............<@.^.L."My...:/..... .Microsoft.PowerShell.ConsoleHostD...............fZve...F.....x.)........System.Management.Automation4...............[...{a.C..%6..h.........System.Core.0...............G-.o...A...4B..........System..4................Zg5..:O..g..q..........System.Xml..L...............7.....J@......~.......#.Microsoft.Management.Infrastructure.8................'....L..}............System.Numerics.@................Lo...QN......<Q........System.DirectoryServices<................H..QN.Y.f............System.Management...4....................].D.E.....#.......System.Data.H................. ....H..m)aUu.........Microsoft.PowerShell.Security...<.................~.[L.D.Z.>..m.........System.Transactions.<................):gK..G...$.1.q........System.ConfigurationP................./.C..J..%...].......%.Microsoft.PowerShell.Commands.Utility...D..................-.D.F.<;.nt.1........System.Configuration.Ins
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:very short file (no magic)
                                                                            Category:dropped
                                                                            Size (bytes):1
                                                                            Entropy (8bit):0.0
                                                                            Encrypted:false
                                                                            SSDEEP:3:U:U
                                                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                            Malicious:false
                                                                            Preview:1
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:very short file (no magic)
                                                                            Category:dropped
                                                                            Size (bytes):1
                                                                            Entropy (8bit):0.0
                                                                            Encrypted:false
                                                                            SSDEEP:3:U:U
                                                                            MD5:C4CA4238A0B923820DCC509A6F75849B
                                                                            SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                                            SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                                            SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                                            Malicious:false
                                                                            Preview:1
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:Composite Document File V2 Document, Cannot read section info
                                                                            Category:dropped
                                                                            Size (bytes):6656
                                                                            Entropy (8bit):4.197302626580184
                                                                            Encrypted:false
                                                                            SSDEEP:48:rmOPwyt7DE0K/BXSMIuHtk/XSDCuJGaPTulevt96adR1vmu/cvYiupQb:yP87DYJhtk/2GmbdR1vj/u
                                                                            MD5:431232997E74B78D2821D94FB0314EC9
                                                                            SHA1:EF42919E6BE1048FF78F2A27A2B7537A0F342B3F
                                                                            SHA-256:29FC8681C15C9B3A776D0721C5D7C64069707C6DF4C145EB3DCA25D921DA246F
                                                                            SHA-512:CA58D94A2D2A0C708466D17AE098A0DE381866A2F25B3E3E82AD11C14330AD997BC80894C800739EE0243F79FF0C6CF7C024A6466CD2B97E026B6A5E4A1015B3
                                                                            Malicious:false
                                                                            Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Category:dropped
                                                                            Size (bytes):734208
                                                                            Entropy (8bit):7.9781110556733426
                                                                            Encrypted:false
                                                                            SSDEEP:12288:IJUL2yRZ+ToPsbCGncM+GzXbigISWwM7BhRdrhGuaaCdhXBhUBi/W0a4GN29aq5V:IeL2yR4TokbCGcM+GTbAgUB3drcupoXF
                                                                            MD5:8A743553A12D1C6CBF3BB3714410E034
                                                                            SHA1:7225B7233AD25D7B426CACEE1DF9ADE262E67520
                                                                            SHA-256:6E7ED6E2800CB45547906279F027FE098D08BB0DBC517CE41FE0EBE33222AB99
                                                                            SHA-512:30ED6E14056147A357F4C66692A3DA9ECC16BE5BB9C30EB1EDD0747F6185EBB194CF958AA45E8913438445EA20E5EED207BDB6789923ED8D4D3313BB3038FDCB
                                                                            Malicious:true
                                                                            Antivirus:
                                                                            • Antivirus: Avira, Detection: 100%
                                                                            • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                            • Antivirus: Virustotal, Detection: 41%, Browse
                                                                            • Antivirus: ReversingLabs, Detection: 44%
                                                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'..b..............0......J........... ........@.. ....................................@.....................................W.... ...H........................................................................... ............... ..H............text...4.... ...................... ..`.rsrc....H... ...H..................@..@.reloc...............2..............@..B........................H.......T................$...............................................0..........r...p.s....%.o....r...p..o....*..(....*n.+...}....+.(....+...}....*J.(.....s....}....*...0..'.........s.......(....+..{.....o....+.-.+..*.*..0..".........(....+..,..{.....o....&+..+..*.*6.{.....o....*>.{....o.......*.0..%.......s.......}.....{...........s....o....*J.{.....{....(....*J.(.....s....}....*..0..L........s.....s.......s....s.......o.......,..o......o........,..o......,..o......*.(..
                                                                            Process:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File Type:ASCII text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):26
                                                                            Entropy (8bit):3.95006375643621
                                                                            Encrypted:false
                                                                            SSDEEP:3:ggPYV:rPYV
                                                                            MD5:187F488E27DB4AF347237FE461A079AD
                                                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                            Malicious:true
                                                                            Preview:[ZoneTransfer]....ZoneId=0
                                                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            File Type:UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                            Category:dropped
                                                                            Size (bytes):999
                                                                            Entropy (8bit):5.163710435471729
                                                                            Encrypted:false
                                                                            SSDEEP:24:BxSAS0CDvBBIx2DOXUWjxoqWuHjeTKKjX4CIym1ZJXqLjbi5nxSAZ+p:BZsv/IoOcuqDYB1ZUoZZ2
                                                                            MD5:E5E89E39E79B507763D53FA0AABDE3D7
                                                                            SHA1:158B0C7E794327B86E61C37ABF7CF09C12034F46
                                                                            SHA-256:9DECA1938CA0C885234A37144B2CB1475977F84F3F03B37BF463D163A5569970
                                                                            SHA-512:7CD2BEDADF611FD5A0AA29E0B3E5FB8EA166D7E22735842235AB0CE2E75B23B1E243ED6073084FC7FD17135A19F122B5626AEAC2FB03B40475E3F691911C412C
                                                                            Malicious:false
                                                                            Preview:.**********************..Windows PowerShell transcript start..Start time: 20220707171951..Username: computer\user..RunAs User: computer\user..Configuration Name: ..Machine: 936905 (Microsoft Windows NT 10.0.17134.0)..Host Application: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==..Process ID: 7036..PSVersion: 5.1.17134.1..PSEdition: Desktop..PSCompatibleVersions: 1.0, 2.0, 3.0, 4.0, 5.0, 5.1.17134.1..BuildVersion: 10.0.17134.1..CLRVersion: 4.0.30319.42000..WSManStackVersion: 3.0..PSRemotingProtocolVersion: 2.3..SerializationVersion: 1.1.0.1..**********************..**********************..Command start time: 20220707171951..**********************..PS>Start-Sleep -Seconds 11..**********************..Command start time: 20220707172412..**********************..PS>$global:?..True..**********************..Windows PowerShell transcript end..End time: 20220707172412..**********************..
                                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                            Entropy (8bit):7.9781110556733426
                                                                            TrID:
                                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                            • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                                            • DOS Executable Generic (2002/1) 0.01%
                                                                            File name:SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            File size:734208
                                                                            MD5:8a743553a12d1c6cbf3bb3714410e034
                                                                            SHA1:7225b7233ad25d7b426cacee1df9ade262e67520
                                                                            SHA256:6e7ed6e2800cb45547906279f027fe098d08bb0dbc517ce41fe0ebe33222ab99
                                                                            SHA512:30ed6e14056147a357f4c66692a3da9ecc16be5bb9c30eb1edd0747f6185ebb194cf958aa45e8913438445ea20e5eed207bdb6789923ed8d4d3313bb3038fdcb
                                                                            SSDEEP:12288:IJUL2yRZ+ToPsbCGncM+GzXbigISWwM7BhRdrhGuaaCdhXBhUBi/W0a4GN29aq5V:IeL2yR4TokbCGcM+GTbAgUB3drcupoXF
                                                                            TLSH:16F4231E0F4DF469C3E244F2656144B51BB8FDF58628EAA30398BD57CF72104AEA6336
                                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...'..b..............0......J........... ........@.. ....................................@................................
                                                                            Icon Hash:7d6d5d507d5d0d0b
                                                                            Entrypoint:0x4b072e
                                                                            Entrypoint Section:.text
                                                                            Digitally signed:false
                                                                            Imagebase:0x400000
                                                                            Subsystem:windows gui
                                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                            Time Stamp:0x62C68E27 [Thu Jul 7 07:41:27 2022 UTC]
                                                                            TLS Callbacks:
                                                                            CLR (.Net) Version:
                                                                            OS Version Major:4
                                                                            OS Version Minor:0
                                                                            File Version Major:4
                                                                            File Version Minor:0
                                                                            Subsystem Version Major:4
                                                                            Subsystem Version Minor:0
                                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                            Instruction
                                                                            jmp dword ptr [00402000h]
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            add byte ptr [eax], al
                                                                            NameVirtual AddressVirtual Size Is in Section
                                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xb06d40x57.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xb20000x4800.rsrc
                                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xb80000xc.reloc
                                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                            .text0x20000xae7340xae800False0.9958405153116046data7.998461587691195IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                            .rsrc0xb20000x48000x4800False0.2947591145833333data4.243728031360968IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                            .reloc0xb80000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                            NameRVASizeTypeLanguageCountry
                                                                            RT_ICON0xb21000x4028data
                                                                            RT_GROUP_ICON0xb61380x14data
                                                                            RT_VERSION0xb615c0x3d0data
                                                                            RT_MANIFEST0xb653c0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                            DLLImport
                                                                            mscoree.dll_CorExeMain
                                                                            No network behavior found

                                                                            Click to jump to process

                                                                            Click to jump to process

                                                                            Click to dive into process behavior distribution

                                                                            Click to jump to process

                                                                            Target ID:0
                                                                            Start time:17:19:40
                                                                            Start date:07/07/2022
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe"
                                                                            Imagebase:0x450000
                                                                            File size:734208 bytes
                                                                            MD5 hash:8A743553A12D1C6CBF3BB3714410E034
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.444443907.0000000003926000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000000.00000003.490679051.0000000003B4E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000000.00000002.503541674.0000000003909000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.503255880.0000000002AFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000003.444916693.0000000003AE5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.506443549.0000000004E70000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.502969930.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.503230604.0000000002AF6000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: LokiBot_Dropper_Packed_R11_Feb18, Description: Auto-generated rule - file scan copy.pdf.r11, Source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Florian Roth
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000000.00000002.505240066.0000000003AC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.503268704.0000000002B0F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CosturaAssemblyLoader, Description: Yara detected Costura Assembly Loader, Source: 00000000.00000002.503276267.0000000002B17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Target ID:1
                                                                            Start time:17:19:47
                                                                            Start date:07/07/2022
                                                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==
                                                                            Imagebase:0x9f0000
                                                                            File size:430592 bytes
                                                                            MD5 hash:DBA3E6449E97D4E3DF64527EF7012A10
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:.Net C# or VB.NET
                                                                            Reputation:high

                                                                            Target ID:2
                                                                            Start time:17:19:47
                                                                            Start date:07/07/2022
                                                                            Path:C:\Windows\System32\conhost.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                            Imagebase:0x7ff77f440000
                                                                            File size:625664 bytes
                                                                            MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:high

                                                                            Target ID:7
                                                                            Start time:17:20:06
                                                                            Start date:07/07/2022
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            Wow64 process (32bit):false
                                                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            Imagebase:0x2f0000
                                                                            File size:734208 bytes
                                                                            MD5 hash:8A743553A12D1C6CBF3BB3714410E034
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:C, C++ or other language
                                                                            Reputation:low

                                                                            Target ID:8
                                                                            Start time:17:20:07
                                                                            Start date:07/07/2022
                                                                            Path:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            Wow64 process (32bit):true
                                                                            Commandline:C:\Users\user\Desktop\SecuriteInfo.com.W32.AIDetectNet.01.5595.exe
                                                                            Imagebase:0xce0000
                                                                            File size:734208 bytes
                                                                            MD5 hash:8A743553A12D1C6CBF3BB3714410E034
                                                                            Has elevated privileges:true
                                                                            Has administrator privileges:true
                                                                            Programmed in:Visual Basic
                                                                            Yara matches:
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000000.500293865.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000008.00000000.500293865.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000000.498743382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000008.00000000.498743382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000000.498134765.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000008.00000000.498134765.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000000.497568730.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            • Rule: JoeSecurity_SpyEx_1, Description: Yara detected SpyEx stealer, Source: 00000008.00000000.497568730.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                            Reputation:low

                                                                            Reset < >

                                                                              Execution Graph

                                                                              Execution Coverage:19%
                                                                              Dynamic/Decrypted Code Coverage:100%
                                                                              Signature Coverage:25%
                                                                              Total number of Nodes:12
                                                                              Total number of Limit Nodes:0
                                                                              execution_graph 13660 280efc8 13661 280f00c ResumeThread 13660->13661 13663 280f058 13661->13663 13664 2800f0b 13665 2800e64 13664->13665 13666 2800e15 13665->13666 13668 28021f7 13665->13668 13671 280ec00 13668->13671 13673 280ec27 13671->13673 13675 280ed08 13673->13675 13676 280ed51 VirtualProtect 13675->13676 13678 28013ae 13676->13678

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 0 2885bf0-2885c15 1 2885c1c-2885c5d 0->1 2 2885c17 0->2 3 2885dab-2885db2 1->3 4 2885c63-2885c73 1->4 2->1 7 2885dc9-2885dd6 3->7 8 2885db4-2885dc7 3->8 5 2885c79-2885c91 4->5 6 28860a5-28860c6 4->6 12 2885ca2-2885cc3 call 2883050 5->12 9 2885dd8-2885ddc 7->9 8->9 9->6 11 2885de2-2885df6 9->11 13 2885df8-2885e18 11->13 14 2885e21-2885e38 11->14 20 2885c93-2885c99 12->20 13->14 14->6 15 2885e3e-2885e7f 14->15 21 2885e81-2885e93 15->21 22 2885e95-2885ea0 15->22 20->12 23 2885c9b 20->23 24 2885ea2-2885ea6 21->24 22->24 23->12 25 2885f69-2885f8a 23->25 26 2886029-2886044 23->26 27 2885d0b-2885d5d call 2883050 23->27 28 2885f8f-2885f90 23->28 29 2885ce1-2885cf2 23->29 30 2885d62-2885da0 23->30 31 2885cc5-2885cdf 23->31 32 2885da5-2885da6 23->32 33 2886046-288605a 23->33 34 2885f27-2885f67 23->34 35 2885fff-2886027 23->35 36 288605f-2886082 call 2886630 23->36 37 2885cf4-2885d09 23->37 24->6 41 2885eac-2885ebf 24->41 38 2885ef4-2885efa 25->38 40 2885fc7-2885fcd 26->40 27->20 39 2886088-288609f 28->39 29->20 30->20 31->20 32->6 33->40 34->38 35->40 36->39 37->20 50 2885efc 38->50 51 2885f03-2885f25 call 2883050 38->51 39->6 39->15 44 2885fcf 40->44 45 2885fd6-2885ffd call 2883050 40->45 46 2885f95-2885fa6 41->46 47 2885ec5-2885ee3 41->47 44->26 44->33 44->35 44->36 45->35 45->40 46->39 53 2885fac-2885fb2 46->53 55 2885eea-2885ef2 47->55 56 2885ee5 47->56 50->25 50->26 50->28 50->33 50->34 50->35 50->36 51->34 51->38 63 2885fbb-2885fc5 53->63 55->38 55->51 56->55 63->40 63->45
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: s8'$x"A$i*
                                                                              • API String ID: 0-240512166
                                                                              • Opcode ID: de2e8d3cf97bc8cd8c35e8021cd8426b25acbccc3fb66b108f3a34c8effd9a6a
                                                                              • Instruction ID: ff56230c7c89ea43187066d8d5a3a565a1817650e01dc693b14a6e2a897a9948
                                                                              • Opcode Fuzzy Hash: de2e8d3cf97bc8cd8c35e8021cd8426b25acbccc3fb66b108f3a34c8effd9a6a
                                                                              • Instruction Fuzzy Hash: 0CF12778A04249CFDB04DFA9D9809AEBBF6FB88314F618529E819EB354D734E941CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 67 2882269-288229a 69 288229c 67->69 70 28822a1-2882319 call 28825e1 67->70 69->70 75 2882331-2882339 70->75 76 288231b-2882328 75->76 76->75 77 288232a 76->77 77->75 78 288246a 77->78 79 288238e-2882392 77->79 80 2882503-2882506 77->80 81 2882523-2882542 77->81 82 28823c4-28823ef 77->82 83 28823a5-28823bf 77->83 84 2882406-288240a 77->84 85 2882547 77->85 86 288233b-2882359 77->86 87 288235b-288237d 77->87 88 288241d-2882451 77->88 89 288237f-288238c 77->89 90 28824df-2882501 77->90 91 28823f4-2882401 77->91 94 288246d-2882476 78->94 79->94 95 2882398-28823a0 79->95 97 2882510-2882521 80->97 107 28824bf-28824cc 81->107 82->76 83->76 92 2882410-2882418 84->92 93 28824a2-28824a8 84->93 100 288254f-288255b 85->100 86->76 87->76 108 2882458-2882465 88->108 109 2882453 88->109 89->76 90->107 91->76 92->76 93->83 103 28824ae-28824bd 93->103 94->88 102 2882478-288249f 94->102 95->76 97->107 102->93 114 28824d5-28824dd 103->114 113 28824ce 107->113 107->114 108->76 109->108 113->80 113->81 113->85 113->90 113->114 114->107
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: -$0
                                                                              • API String ID: 0-417717675
                                                                              • Opcode ID: 83034d403f6b50ef5adab0e5593f084f54b0cd9fa390795d4c1182c863f1266f
                                                                              • Instruction ID: e0375624845da73a9d1bf35155c3056895af5c34d7b6a19663e6756650f95d42
                                                                              • Opcode Fuzzy Hash: 83034d403f6b50ef5adab0e5593f084f54b0cd9fa390795d4c1182c863f1266f
                                                                              • Instruction Fuzzy Hash: C1A1D778E05249CFDB04DFA9C4406EEBBB6FF89304F248169D819AB359D7349946CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 117 2882278-288229a 118 288229c 117->118 119 28822a1-2882319 call 28825e1 117->119 118->119 124 2882331-2882339 119->124 125 288231b-2882328 124->125 125->124 126 288232a 125->126 126->124 127 288246a 126->127 128 288238e-2882392 126->128 129 2882503-2882506 126->129 130 2882523-2882542 126->130 131 28823c4-28823ef 126->131 132 28823a5-28823bf 126->132 133 2882406-288240a 126->133 134 2882547 126->134 135 288233b-2882359 126->135 136 288235b-288237d 126->136 137 288241d-2882451 126->137 138 288237f-288238c 126->138 139 28824df-2882501 126->139 140 28823f4-2882401 126->140 143 288246d-2882476 127->143 128->143 144 2882398-28823a0 128->144 146 2882510-2882521 129->146 156 28824bf-28824cc 130->156 131->125 132->125 141 2882410-2882418 133->141 142 28824a2-28824a8 133->142 149 288254f-288255b 134->149 135->125 136->125 157 2882458-2882465 137->157 158 2882453 137->158 138->125 139->156 140->125 141->125 142->132 152 28824ae-28824bd 142->152 143->137 151 2882478-288249f 143->151 144->125 146->156 151->142 163 28824d5-28824dd 152->163 162 28824ce 156->162 156->163 157->125 158->157 162->129 162->130 162->134 162->139 162->163 163->156
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: -$0
                                                                              • API String ID: 0-417717675
                                                                              • Opcode ID: f3b37b1a962cbbec640a285e128ffe554b000785a31a34e2b1f1c4b64ab5d85b
                                                                              • Instruction ID: 9d755326a951abbaea78939dd1d2dc438884ae5037686a10c435fb2d886c2fa6
                                                                              • Opcode Fuzzy Hash: f3b37b1a962cbbec640a285e128ffe554b000785a31a34e2b1f1c4b64ab5d85b
                                                                              • Instruction Fuzzy Hash: 4EA1D778E05249CFDB14DFAAC4806EEBBB6FF89304F248129D819AB359D7349946CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 166 2881e58-2881e7a 167 2881e7c 166->167 168 2881e81-2881ea6 166->168 167->168 169 2881ea8-2881eb0 168->169 170 2881eb2-2881eb8 168->170 171 2881eba-2881ebe 169->171 170->171 172 2881fbf-2881fc6 171->172 173 2881ec4-2881ed6 171->173 174 2881fc8-2881fce 172->174 175 2881fd9-2881fe1 172->175 178 2881ed8-2881ee0 173->178 179 2881ee2-2881ee8 173->179 176 2881fe3-2881fe7 174->176 175->176 180 28820ec-28820f4 176->180 181 2881fed-2881ff6 176->181 182 2881eea-2881eee 178->182 179->182 183 288201f-288202c 181->183 184 2881f9b-2881fbd 182->184 185 2881ef4-2881f4d 182->185 186 2881fff-288200c 183->186 184->172 217 2881f4f-2881f55 185->217 218 2881f57-2881f5f 185->218 188 288200e 186->188 189 2882015-288201d 186->189 188->183 188->189 191 288204a-288204b 188->191 192 288204d-2882056 188->192 193 288202e-2882037 188->193 194 288206e-2882082 188->194 195 2882091-288209e 188->195 196 28820a3-28820a7 188->196 197 28820b6-28820bc 188->197 189->186 198 2881ff8-2881ffd 191->198 199 2882058 192->199 200 288205d-288206c 192->200 205 2882039 193->205 206 2882040-2882048 193->206 211 28820be-28820c6 194->211 212 2882084-288208c 194->212 195->198 202 28820a9-28820b1 196->202 203 28820dd-28820e6 196->203 204 28820c8-28820cc 197->204 198->189 199->200 200->198 202->198 203->180 203->192 209 28820da 204->209 210 28820ce-28820d9 204->210 205->192 205->194 205->195 205->196 205->197 205->206 206->186 209->203 211->204 212->198 219 2881f61-2881f65 217->219 218->219 219->184 220 2881f67-2881f84 call 2882220 219->220 222 2881f8a-2881f90 220->222 222->184
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0$0
                                                                              • API String ID: 0-203156872
                                                                              • Opcode ID: 5b615e7e93326cc96660b43f94a28ceec1acb5a2c0cf65cbd454a8b89b6fb476
                                                                              • Instruction ID: 39652947faa6395d96c4fe65f7adc72d19ee1932f82fdc9f0105d5dcd6a8943f
                                                                              • Opcode Fuzzy Hash: 5b615e7e93326cc96660b43f94a28ceec1acb5a2c0cf65cbd454a8b89b6fb476
                                                                              • Instruction Fuzzy Hash: 6E811C78D0920CCFDB14EFA9D448BEDBBB1BF89318F109129D419AB298DB745846CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 439 2882670-288269b 440 288269d 439->440 441 28826a2-288274a 439->441 440->441 444 288275b-2882790 441->444 447 288274c-2882752 444->447 447->444 448 2882754 447->448 448->444 449 2882918-288293f 448->449 450 28827ec-28827f8 448->450 451 28828ee-2882913 448->451 452 2882792-28827c0 448->452 453 28827c2-28827e7 448->453 454 2882852-28828ad 448->454 455 28828b2-28828bf 448->455 456 28828c4-28828e9 448->456 457 2882944-2882948 448->457 458 2882957 448->458 449->447 461 28827fa 450->461 462 28827ff-2882814 450->462 451->447 452->447 453->447 454->447 455->447 456->447 459 288295a-2882960 457->459 460 288294a-2882952 457->460 458->459 459->450 470 2882966-2882a73 459->470 460->447 461->462 464 288281b-2882834 462->464 465 2882816 462->465 472 288283b-288284d 464->472 473 2882836 464->473 465->464 487 2882aa0-2882aea 470->487 488 2882a75-2882a9b 470->488 472->447 473->472 495 2882aec-2882b05 487->495 496 2882b07-2882b1e 487->496 491 2882b7a-2882bb6 call 2883240 488->491 499 2882bc7-2882bfc 491->499 498 2882b20-2882b33 495->498 496->498 500 2882b5b-2882b77 498->500 501 2882b35-2882b50 498->501 507 2882bb8-2882bbe 499->507 500->491 501->500 507->499 508 2882bc0 507->508 508->499 509 2882ec9-2882ef8 508->509 510 2882c1c-2882c2a 508->510 511 2882e4c-2882e60 508->511 512 2882c3d-2882c5a 508->512 513 2882efd-2882fa1 508->513 514 2882bfe-2882c1a 508->514 515 2882e62-2882e83 call 2883618 508->515 517 2882e00-2882e06 509->517 523 2882c30-2882c38 510->523 511->517 524 2882c5c-2882c65 512->524 525 2882c67-2882c72 512->525 514->507 531 2882e89-2882ec4 515->531 519 2882e08 517->519 520 2882e0f-2882e4a 517->520 519->509 519->511 519->513 519->515 520->511 520->517 523->507 528 2882c74-2882c7b 524->528 525->528 532 2882c89 528->532 533 2882c7d 528->533 531->517 532->517 533->532
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @
                                                                              • API String ID: 0-2766056989
                                                                              • Opcode ID: 20f132e4c894dfdfd7da46f9d5eaa28498ba4e22807c9da415b2376812e9f553
                                                                              • Instruction ID: 36386d381ed816ad8646d1f5b2ce7af5f54385dd8fa04a18f91db7142fe891e2
                                                                              • Opcode Fuzzy Hash: 20f132e4c894dfdfd7da46f9d5eaa28498ba4e22807c9da415b2376812e9f553
                                                                              • Instruction Fuzzy Hash: C522C278A05258CFDB64DFA9D884B9DBBF2BF49304F1081AAD909A7355DB309E85CF10
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 539 2882660-288269b 540 288269d 539->540 541 28826a2-288274a 539->541 540->541 544 288275b-2882790 541->544 547 288274c-2882752 544->547 547->544 548 2882754 547->548 548->544 549 2882918-288293f 548->549 550 28827ec-28827f8 548->550 551 28828ee-2882913 548->551 552 2882792-28827c0 548->552 553 28827c2-28827e7 548->553 554 2882852-28828ad 548->554 555 28828b2-28828bf 548->555 556 28828c4-28828e9 548->556 557 2882944-2882948 548->557 558 2882957 548->558 549->547 561 28827fa 550->561 562 28827ff-2882814 550->562 551->547 552->547 553->547 554->547 555->547 556->547 559 288295a-2882960 557->559 560 288294a-2882952 557->560 558->559 559->550 570 2882966-2882a73 559->570 560->547 561->562 564 288281b-2882834 562->564 565 2882816 562->565 572 288283b-288284d 564->572 573 2882836 564->573 565->564 587 2882aa0-2882aea 570->587 588 2882a75-2882a9b 570->588 572->547 573->572 595 2882aec-2882b05 587->595 596 2882b07-2882b1e 587->596 591 2882b7a-2882bb6 call 2883240 588->591 599 2882bc7-2882bfc 591->599 598 2882b20-2882b33 595->598 596->598 600 2882b5b-2882b77 598->600 601 2882b35-2882b50 598->601 607 2882bb8-2882bbe 599->607 600->591 601->600 607->599 608 2882bc0 607->608 608->599 609 2882ec9-2882ef8 608->609 610 2882c1c-2882c2a 608->610 611 2882e4c-2882e60 608->611 612 2882c3d-2882c5a 608->612 613 2882efd-2882fa1 608->613 614 2882bfe-2882c1a 608->614 615 2882e62-2882e83 call 2883618 608->615 617 2882e00-2882e06 609->617 623 2882c30-2882c38 610->623 611->617 624 2882c5c-2882c65 612->624 625 2882c67-2882c72 612->625 614->607 631 2882e89-2882ec4 615->631 619 2882e08 617->619 620 2882e0f-2882e4a 617->620 619->609 619->611 619->613 619->615 620->611 620->617 623->607 628 2882c74-2882c7b 624->628 625->628 632 2882c89 628->632 633 2882c7d 628->633 631->617 632->617 633->632
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: @
                                                                              • API String ID: 0-2766056989
                                                                              • Opcode ID: 0a5a4ef617035ea77b06d999be3a78714903ce85e80057546c73534ba4e5fcc3
                                                                              • Instruction ID: c18160d8dee5a2e00523dfed5dc677ffdbe0c22bebb3a0894c69df663e6545b9
                                                                              • Opcode Fuzzy Hash: 0a5a4ef617035ea77b06d999be3a78714903ce85e80057546c73534ba4e5fcc3
                                                                              • Instruction Fuzzy Hash: 7E12D578A05258CFDB54DFA9D884B9DBBF2BF89304F1081AAD909A7365DB309D85CF10
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 657 2885be0-2885c15 658 2885c1c-2885c5d 657->658 659 2885c17 657->659 660 2885dab-2885db2 658->660 661 2885c63-2885c73 658->661 659->658 664 2885dc9-2885dd6 660->664 665 2885db4-2885dc7 660->665 662 2885c79-2885c91 661->662 663 28860a5-28860c6 661->663 669 2885ca2-2885cc3 call 2883050 662->669 666 2885dd8-2885ddc 664->666 665->666 666->663 668 2885de2-2885df6 666->668 670 2885df8-2885e18 668->670 671 2885e21-2885e38 668->671 677 2885c93-2885c99 669->677 670->671 671->663 672 2885e3e-2885e7f 671->672 678 2885e81-2885e93 672->678 679 2885e95-2885ea0 672->679 677->669 680 2885c9b 677->680 681 2885ea2-2885ea6 678->681 679->681 680->669 682 2885f69-2885f8a 680->682 683 2886029-2886044 680->683 684 2885d0b-2885d5d call 2883050 680->684 685 2885f8f-2885f90 680->685 686 2885ce1-2885cf2 680->686 687 2885d62-2885da0 680->687 688 2885cc5-2885cdf 680->688 689 2885da5-2885da6 680->689 690 2886046-288605a 680->690 691 2885f27-2885f67 680->691 692 2885fff-2886027 680->692 693 288605f-2886082 call 2886630 680->693 694 2885cf4-2885d09 680->694 681->663 698 2885eac-2885ebf 681->698 695 2885ef4-2885efa 682->695 697 2885fc7-2885fcd 683->697 684->677 696 2886088-288609f 685->696 686->677 687->677 688->677 689->663 690->697 691->695 692->697 693->696 694->677 707 2885efc 695->707 708 2885f03-2885f25 call 2883050 695->708 696->663 696->672 701 2885fcf 697->701 702 2885fd6-2885ffd call 2883050 697->702 703 2885f95-2885fa6 698->703 704 2885ec5-2885ee3 698->704 701->683 701->690 701->692 701->693 702->692 702->697 703->696 710 2885fac-2885fb2 703->710 712 2885eea-2885ef2 704->712 713 2885ee5 704->713 707->682 707->683 707->685 707->690 707->691 707->692 707->693 708->691 708->695 720 2885fbb-2885fc5 710->720 712->695 712->708 713->712 720->697 720->702
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: s8'
                                                                              • API String ID: 0-2901587165
                                                                              • Opcode ID: 00668a2c08beadd1b7c7ee672cfdf37e9bdaba7e2f8fe8f8ef0f01f75b7d10e8
                                                                              • Instruction ID: e943a13132c64c8ee21493f093954ac86b01ee6d129600b5f56e475c07ccbce6
                                                                              • Opcode Fuzzy Hash: 00668a2c08beadd1b7c7ee672cfdf37e9bdaba7e2f8fe8f8ef0f01f75b7d10e8
                                                                              • Instruction Fuzzy Hash: D5A128B8A04258CFDB04DFA9D8809EEBBF6FB88310B51856AE819EB354D7349941CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 16c662da1b15e5733ea0ad9bdd0ff2dfde85d6fc1e00a7c9fd3b52c882385ab9
                                                                              • Instruction ID: 77ba07812a9868bdf9ae588ace82808e327b13b29344cc3d56cc18c411d5b6a9
                                                                              • Opcode Fuzzy Hash: 16c662da1b15e5733ea0ad9bdd0ff2dfde85d6fc1e00a7c9fd3b52c882385ab9
                                                                              • Instruction Fuzzy Hash: 5BB2C474A00228CFDB64DF69C984B99BBB2FF89304F1581E9D50DAB265DB319E85CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502750536.0000000002860000.00000040.00000800.00020000.00000000.sdmp, Offset: 02860000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2860000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 73bb1b23898e05a78fac41ad7739e2ba7439b2ad78bda2a3eda8bd21828b9e28
                                                                              • Instruction ID: 572cc1b051601ca8c92e0208f8ddbce782297faa6c00a2a95861639254f6262a
                                                                              • Opcode Fuzzy Hash: 73bb1b23898e05a78fac41ad7739e2ba7439b2ad78bda2a3eda8bd21828b9e28
                                                                              • Instruction Fuzzy Hash: 0DC2B038D04229CFDB64DF64D898BADB7B2BB4A305F1485E9D40EA6792CB315E85CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 984816d8cdddeb5b2937c467a945baf6abc53f894fd83c6a75fb2e7a8e51b3dd
                                                                              • Instruction ID: 70e98043a129d1ba0b02566003cb5fe5d0ea6c2ba9894c332cda03f8339bca55
                                                                              • Opcode Fuzzy Hash: 984816d8cdddeb5b2937c467a945baf6abc53f894fd83c6a75fb2e7a8e51b3dd
                                                                              • Instruction Fuzzy Hash: F16247B8501205CFE304EF9AD648A89BBF6FB80B1DF46C458D5088F266DB75D889CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5e368536a35a65cc5b55764c10acb2dc7e46091c9eedb8e6d7b953a19ba41651
                                                                              • Instruction ID: 67f4a68f3971a8960aa1011651d1f19fb001986af3c8783c84b85f876a859978
                                                                              • Opcode Fuzzy Hash: 5e368536a35a65cc5b55764c10acb2dc7e46091c9eedb8e6d7b953a19ba41651
                                                                              • Instruction Fuzzy Hash: 4B4233B8505245CFE314EF96D64CA89BBF5EB80B1DF4AC498D1088F266DB75D889CF80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f53c1634ba0f47a3bf607fd0e1b6e19094345be2aebcdfb4ca00291feb571eac
                                                                              • Instruction ID: fe02ddf8c133376fe7d43f360492fd00e77585a6a594e245b18992ece2a49050
                                                                              • Opcode Fuzzy Hash: f53c1634ba0f47a3bf607fd0e1b6e19094345be2aebcdfb4ca00291feb571eac
                                                                              • Instruction Fuzzy Hash: 22B11478D04209CFDB04EF99C884AEDFBF6BF89304F559119D809BB241D734A986CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 515cab2865f10e0e3ff9bd656d513d9f528de06d958b0638b6215beae0fa8d03
                                                                              • Instruction ID: cc718ae7313aa2a592089bbb2eacd1aea0fff43398740625bd1a699609710808
                                                                              • Opcode Fuzzy Hash: 515cab2865f10e0e3ff9bd656d513d9f528de06d958b0638b6215beae0fa8d03
                                                                              • Instruction Fuzzy Hash: 10A1307590A1458FDB48EFB6E891B9EBBF2EBC5308F04C52AD1059B268EF305806DF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 244 288b404-288b408 245 288b52a-288b5d3 244->245 246 288b40e-288c09b 244->246 263 288b759-288b7b4 245->263 264 288b5d9-288b65e 245->264 246->245 278 288b7d2-288b82d 263->278 279 288b7b6-288b7d1 263->279 286 288b669-288b758 264->286 291 288b84b-288b8a6 278->291 292 288b82f-288b84a 278->292 279->278 286->263 303 288b8a8-288b8c3 291->303 304 288b8c4-288b91f 291->304 292->291 303->304 316 288b93d-288b998 304->316 317 288b921-288b93c 304->317 324 288b99a-288b9b5 316->324 325 288b9b6-288ba17 316->325 317->316 324->325 332 288ba19-288ba34 325->332 333 288ba35-288bac8 325->333 332->333 342 288baca-288bae5 333->342 343 288bae6-288bb47 333->343 342->343 350 288bb49-288bb64 343->350 351 288bb65-288bbf8 343->351 350->351 360 288bbfa-288bc09 351->360 361 288bc16-288bc70 351->361 364 288bc15 360->364 368 288bc72-288bc9a 361->368 369 288bcd3-288bcd5 361->369 364->361 368->369 377 288bc9c-288bcd1 368->377 370 288bcdb-288bce9 369->370 372 288bdbd-288be1e 370->372 373 288bcef-288bdbc 370->373 386 288be28-288be8f 372->386 387 288be20-288be27 372->387 373->372 377->370 398 288bf7d-288bfde 386->398 399 288be95-288bf2e 386->399 387->386 409 288bfec-288c053 398->409 410 288bfe0-288bfeb 398->410 416 288bf3c-288bf5a 399->416 417 288bf30-288bf37 399->417 429 288c071-288c0b1 409->429 430 288c055-288c070 409->430 410->409 423 288bf7c 416->423 420 288bf39-288bf3a 417->420 421 288bf5c-288bf7a 417->421 420->423 421->423 423->398 437 288c0b8-288c0f1 429->437 430->429
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 8^Gm
                                                                              • API String ID: 0-4274178255
                                                                              • Opcode ID: fc294122164ad767aca8f9f03b0baf4422dc2f2fb2e031f499dd6609b149000f
                                                                              • Instruction ID: 5cf22ab8eb4840ff0ad62fb5a63a6e144c507c30c4bd83ce5e4791c37ad10e06
                                                                              • Opcode Fuzzy Hash: fc294122164ad767aca8f9f03b0baf4422dc2f2fb2e031f499dd6609b149000f
                                                                              • Instruction Fuzzy Hash: B2622B78E081588FDB15EF68E854BEE7BB2EB89309F1085E9D509A7394DB305E90CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 639 280ed08-280edbc VirtualProtect 642 280edc5-280ee0d 639->642 643 280edbe-280edc4 639->643 643->642
                                                                              APIs
                                                                              • VirtualProtect.KERNELBASE(?,?,?,?), ref: 0280EDAC
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ProtectVirtual
                                                                              • String ID:
                                                                              • API String ID: 544645111-0
                                                                              • Opcode ID: 8a56e6c856247d722f9d4b1a59739aa76832d3328f167a69a9591cd4dbf38347
                                                                              • Instruction ID: 4da5ac601c1918e6721e6cb7b896e64d67426cee244ee51861daef251a913c33
                                                                              • Opcode Fuzzy Hash: 8a56e6c856247d722f9d4b1a59739aa76832d3328f167a69a9591cd4dbf38347
                                                                              • Instruction Fuzzy Hash: DD31A8B8D002489FCF10CFA9D984AEEFBB5BB49314F14942AE819B7210D735A945CF94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 648 280efc8-280f056 ResumeThread 651 280f058-280f05e 648->651 652 280f05f-280f0a1 648->652 651->652
                                                                              APIs
                                                                              • ResumeThread.KERNELBASE(?), ref: 0280F046
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ResumeThread
                                                                              • String ID:
                                                                              • API String ID: 947044025-0
                                                                              • Opcode ID: cfbdd2f40d1754dd3498e6f2718be358ac191fda90c7576ccdc14abfb1d7988a
                                                                              • Instruction ID: 8e6b4c6f28f1d3c63ce0b5f9da095a8ef968d957dfb1360e4f987811784e1fd0
                                                                              • Opcode Fuzzy Hash: cfbdd2f40d1754dd3498e6f2718be358ac191fda90c7576ccdc14abfb1d7988a
                                                                              • Instruction Fuzzy Hash: 9B31CBB8D002189FCF14CFA9D884AEEFBF4AF59314F14842AE915B7240CB75A805CFA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 724 2887819-2887867 726 28878a9-28879d9 724->726 727 2887869-28878a6 724->727 753 28879dc call 2887b58 726->753 754 28879dc call 2887b68 726->754 727->726 744 28879e2-2887a80 748 2887a87-2887aca 744->748 753->744 754->744
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: $Cm
                                                                              • API String ID: 0-3887825953
                                                                              • Opcode ID: 4c773e74c62a949e53243ae53c1a9af9f21f60aec33296dfd2658da6456e446a
                                                                              • Instruction ID: 8516a7e03332cc9be5554fabecf074ae91ae4f7d0689a2dbef79de337133cb6f
                                                                              • Opcode Fuzzy Hash: 4c773e74c62a949e53243ae53c1a9af9f21f60aec33296dfd2658da6456e446a
                                                                              • Instruction Fuzzy Hash: 66611778E04218CFDB14DFA9C840AADBBB2BF88305F6485A9D549EB354DB31AD42CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 815 288c390-288c3c2 816 288c3c9-288c46b 815->816 817 288c3c4 815->817 827 288c472-288c4a5 816->827 817->816 832 288c4ab 827->832 833 288c4a7-288c4aa 827->833 835 288c4ac 832->835 833->832 835->835
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: <(Gm
                                                                              • API String ID: 0-568085370
                                                                              • Opcode ID: a03ee1ed721ab939eba31009600880241e27e4a01d3e77016e77162da33ea240
                                                                              • Instruction ID: 8bcbedd2546b882517816efdbfa4e4b300fe998944163b9e8fc80555488e76f2
                                                                              • Opcode Fuzzy Hash: a03ee1ed721ab939eba31009600880241e27e4a01d3e77016e77162da33ea240
                                                                              • Instruction Fuzzy Hash: 2B313978D45218DBCB18DFE5D490AEDFBB2AF89304F20902AD506BB358DB705C81CB65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 838 288c3a0-288c3c2 839 288c3c9-288c46b 838->839 840 288c3c4 838->840 850 288c472-288c4a5 839->850 840->839 855 288c4ab 850->855 856 288c4a7-288c4aa 850->856 858 288c4ac 855->858 856->855 858->858
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: <(Gm
                                                                              • API String ID: 0-568085370
                                                                              • Opcode ID: 2c4cccc62f7b289631d8b6e405dd8f0191c7e57d73365bde8a7808e8cddfe56b
                                                                              • Instruction ID: 15d080148efe70cd424268d724dba9d4e84a52830ea5371f209a5f2268df6fc4
                                                                              • Opcode Fuzzy Hash: 2c4cccc62f7b289631d8b6e405dd8f0191c7e57d73365bde8a7808e8cddfe56b
                                                                              • Instruction Fuzzy Hash: 92313B78D05218DBCB18DFE5D440AEEB7B6AF89304F20942AD506BB354DB705C41CB65
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: pZI
                                                                              • API String ID: 0-1517061732
                                                                              • Opcode ID: d98d75dc4c8924e08dbffc1efa7c85ae1f4ebbdbbbba963a7489fc869d014b44
                                                                              • Instruction ID: d8a86b1cb8ff9fb1591e322f3775dc8e0a5a63c618e4323d59f12cdce177ab6f
                                                                              • Opcode Fuzzy Hash: d98d75dc4c8924e08dbffc1efa7c85ae1f4ebbdbbbba963a7489fc869d014b44
                                                                              • Instruction Fuzzy Hash: B2316F78A042459FCB44EFA9E884AEEBBF2FF89304F10846AD505EB355DB345941CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: pZI
                                                                              • API String ID: 0-1517061732
                                                                              • Opcode ID: 875ac9dd26609b33f2b20a879638e289cbe6210d774049e5fdf13fcc4ef07839
                                                                              • Instruction ID: d047b32254905fa31b7795d280831ca49964014807eee2f290ae896a169aeaf9
                                                                              • Opcode Fuzzy Hash: 875ac9dd26609b33f2b20a879638e289cbe6210d774049e5fdf13fcc4ef07839
                                                                              • Instruction Fuzzy Hash: 2F311C78A041099FCB44EFA9E884AEEBBF2FF88305F50846AD505A7354DB349945CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 83d3fa7eaac1702b2d6dd7ad5c7c8738cad233d2c99bb8351ac19b85ad30f1dc
                                                                              • Instruction ID: 9a7c9f35a73889a53384f6fd44b89f579b50b2e09bf95e868d346416c67517fb
                                                                              • Opcode Fuzzy Hash: 83d3fa7eaac1702b2d6dd7ad5c7c8738cad233d2c99bb8351ac19b85ad30f1dc
                                                                              • Instruction Fuzzy Hash: 17919A3DB012148FDB05EFA5D854AADBBF6AF88315F6884A9E901DB391DB35CD01CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a1eddd9c5b8828b55d49b90449106f4bcb450a582bd5b810593cbc3be703f606
                                                                              • Instruction ID: 661fe492182536d2c40ab6ca6f5a3d4a339dda10ed4371739678c0f302c782c6
                                                                              • Opcode Fuzzy Hash: a1eddd9c5b8828b55d49b90449106f4bcb450a582bd5b810593cbc3be703f606
                                                                              • Instruction Fuzzy Hash: C78101396047418FD724EF7AD0807AABBF2AF85318F14C96DE15ACB691DB30E845CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8c4ad881d289065ea5bcad0b3155a3b248c7ae77d4c03a95e8decf1673b35352
                                                                              • Instruction ID: abe542d00b1c5ec16ac1989f7b5f84e67f46da4efc3cb7dd5143a018244e8b6a
                                                                              • Opcode Fuzzy Hash: 8c4ad881d289065ea5bcad0b3155a3b248c7ae77d4c03a95e8decf1673b35352
                                                                              • Instruction Fuzzy Hash: 36512878E08219CFDF14EFA9E444AEEB7B2BF89708F14846AD505BB244DB345941CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3377c6ae3897835dd2a136bf865a8cf274bf0ec9db20f9d95eb7938cca12c80a
                                                                              • Instruction ID: a3e5d1e61344b5cd9cde3aec7a335972ef120b22aa64512f4b117754299b8716
                                                                              • Opcode Fuzzy Hash: 3377c6ae3897835dd2a136bf865a8cf274bf0ec9db20f9d95eb7938cca12c80a
                                                                              • Instruction Fuzzy Hash: 3A512678D05209DBCB04EFA9D9806EEF7F6BF88304F668565D808B7251EB34A945CF60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 6aabaa439504602e3be7a498a1b17a1b86e18dc40b8df3a2a5bf153c907711c9
                                                                              • Instruction ID: a8c03f03e7a5385642d22c7871fd48f15e590959979991b35cfe41962dd4d584
                                                                              • Opcode Fuzzy Hash: 6aabaa439504602e3be7a498a1b17a1b86e18dc40b8df3a2a5bf153c907711c9
                                                                              • Instruction Fuzzy Hash: 79513C7A600000AFCB459FA8D855D697BB7EF8D31471981A8E2099F276DB32DC12EB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d6710739ef444b95eaa48c11b72159db1318b5a6da867c2e6defbcbd95ea11aa
                                                                              • Instruction ID: e7d0945cec4284656b27385153f66139dadfed4cdd69e75da766fcf186c734a8
                                                                              • Opcode Fuzzy Hash: d6710739ef444b95eaa48c11b72159db1318b5a6da867c2e6defbcbd95ea11aa
                                                                              • Instruction Fuzzy Hash: 3F5106B8D0920DDFDB04EFA9D544BEEBBF2AF88708F1091AAD414A7250D7749A85CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: df08d78871fc24870864e4436b54e374c38f73ddaa65d463a287313a7a302610
                                                                              • Instruction ID: dea7cef84265f45ffa34ff66da38ae6ce3bb5d022baf2f52cc03c0da1047fc37
                                                                              • Opcode Fuzzy Hash: df08d78871fc24870864e4436b54e374c38f73ddaa65d463a287313a7a302610
                                                                              • Instruction Fuzzy Hash: B2515E78A006108FCB18EF68D854F6EB7B2BF89724F118699E556DB3E1DB31AC018B51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cea315f8bb7b7ed88d8b85d4c03476fb05b5d3a03353753901169d1c041633f0
                                                                              • Instruction ID: 5259db659dc1f57c5bc4b8a52cd0a253fe10c283b54c563aa266648a5f2ce7fe
                                                                              • Opcode Fuzzy Hash: cea315f8bb7b7ed88d8b85d4c03476fb05b5d3a03353753901169d1c041633f0
                                                                              • Instruction Fuzzy Hash: 3F512878E08209CFDF15EFA8E4447EEBBB1FF89708F14846AD505AB294DB345941CB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d40981d99903537f7c38b79c660186d29bb001f9cce0a7a76b0cbf1b524471a1
                                                                              • Instruction ID: 1ec586f71314af8800f6cbb3a79681c83d26f8d729d7c61edfcab1c07869f873
                                                                              • Opcode Fuzzy Hash: d40981d99903537f7c38b79c660186d29bb001f9cce0a7a76b0cbf1b524471a1
                                                                              • Instruction Fuzzy Hash: C1418C3DA002059FDB14EFB4D494BAEB7F6AF88304F548469E609EB691DB719841CB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c4f95593b7513dc86bb6384cdec094b2777369e99ad7d2accefc7b1b2bce590b
                                                                              • Instruction ID: ac8fe91f4d4759bb7af4f876d918c97bc4bee0811bbbbaecfb8de13f2d0a4df9
                                                                              • Opcode Fuzzy Hash: c4f95593b7513dc86bb6384cdec094b2777369e99ad7d2accefc7b1b2bce590b
                                                                              • Instruction Fuzzy Hash: F141293A7092905FCB069F7998909EA7FA6EFCA22870444BFE509CF252DF348C05D791
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1b598f7b609f49eafe41bb811ebaa8ee417a061443a2a0ad292f730a051b5bb5
                                                                              • Instruction ID: 4312e51d86663d6a0db5515035efffb6a023c11a734b4db85e327989fd519ea4
                                                                              • Opcode Fuzzy Hash: 1b598f7b609f49eafe41bb811ebaa8ee417a061443a2a0ad292f730a051b5bb5
                                                                              • Instruction Fuzzy Hash: 69416A78E04259CFCB14EFA5D840AEEBBB2EF89304F0084AAD509EB354EB345941CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ab2df21e468c68ee8f0a31919dd9927e20fa76da45bc63e8d9d44d8a75d15fca
                                                                              • Instruction ID: 8ac74f1f6ba163d92334cc19868029cef102b8eb4c2f6af7c30488a0ba846857
                                                                              • Opcode Fuzzy Hash: ab2df21e468c68ee8f0a31919dd9927e20fa76da45bc63e8d9d44d8a75d15fca
                                                                              • Instruction Fuzzy Hash: 8B41E238A042568FCB11DF28C09096AFBB1FF8A314F198696C659DB642D734EC51CBD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c5a581254edeb17e19efeddff73068923fff25f05b182511df6b209ee857f5d2
                                                                              • Instruction ID: f0c954eb4174b9b788648ea2098c3f930781cb5cc4a9cc8fe1aee75c1861bf18
                                                                              • Opcode Fuzzy Hash: c5a581254edeb17e19efeddff73068923fff25f05b182511df6b209ee857f5d2
                                                                              • Instruction Fuzzy Hash: CE41F678E10218DFDB04DFE9D984A9DBBF6EF89304F208429E505AB394DB309841CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c9e036c6d20589cc8f9c82e87644da0d56c99d7c7388dc6557297657cb9c106b
                                                                              • Instruction ID: 78d013338ae1e92c8f446091180d5f97a95a01b31dfdff4804721a31ae2e63f1
                                                                              • Opcode Fuzzy Hash: c9e036c6d20589cc8f9c82e87644da0d56c99d7c7388dc6557297657cb9c106b
                                                                              • Instruction Fuzzy Hash: 8541D378E10218DFDB04DFA9D584ADDBBF6AF88314F208429E505AB354DB309941CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1e0a43f740dab78d062ec7f3b2461f74040e23b92371da3780276b203c6cb931
                                                                              • Instruction ID: 482c806c45dbedbd83dcc5017d1e8c1ca2d577f7be8edfe382bdb49d29c695f7
                                                                              • Opcode Fuzzy Hash: 1e0a43f740dab78d062ec7f3b2461f74040e23b92371da3780276b203c6cb931
                                                                              • Instruction Fuzzy Hash: C751E778A04168CFDB24DF54C885BD9BBB2FB49305F1081EAEA09A7364DB709E81CF51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8e86fac661447c86cda127083bd46cac0e0688ccf7d4310ad6c56c87945910ee
                                                                              • Instruction ID: e06fb8f0a4f48a4540c6856b1db427d179d7b6ba68d045dc6fab130f3a00bf8f
                                                                              • Opcode Fuzzy Hash: 8e86fac661447c86cda127083bd46cac0e0688ccf7d4310ad6c56c87945910ee
                                                                              • Instruction Fuzzy Hash: E8416034E0824ADFCB45EFE4E490AEDB7B2FB89308F50842AD505AB794DB345901DF92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fbba1183eb8ef1ca5f2a82338d75e56d26123d99172e47e44605ca14667b8ff2
                                                                              • Instruction ID: 28699454c2c15d629ff4fe726b914e73351178b6a872c37d04fbc6796109a1c3
                                                                              • Opcode Fuzzy Hash: fbba1183eb8ef1ca5f2a82338d75e56d26123d99172e47e44605ca14667b8ff2
                                                                              • Instruction Fuzzy Hash: 0041E478D08208DFDB14EFA4D484BADBBB1BF49304F209069E909EB391DB345986CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c18a83a9b33ac93bdd60aa2dd06e98fce9d4cc6f8a40d6e6f00d472b51f9fd13
                                                                              • Instruction ID: feb1afae74d7aa455d5dd80d37fcad4d9147b312ca927fc1629c8ffd4084d960
                                                                              • Opcode Fuzzy Hash: c18a83a9b33ac93bdd60aa2dd06e98fce9d4cc6f8a40d6e6f00d472b51f9fd13
                                                                              • Instruction Fuzzy Hash: 8A41D878E04248CFDB14EFA6C488B9DBBB2AF89308F10842AD409AB364DB745846CF41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3aac1ada5192e88d4f3b21febfd24456c22239fd6df5bfa86a35df770b03808c
                                                                              • Instruction ID: e359c8d255ff8d4110098a393e08d7ac60fe609b06ccd8558458aad693314567
                                                                              • Opcode Fuzzy Hash: 3aac1ada5192e88d4f3b21febfd24456c22239fd6df5bfa86a35df770b03808c
                                                                              • Instruction Fuzzy Hash: 34411A78A0520ADFCB44EFE5E490AADB7B2FB89308F50842AD505AB794DB305941DF92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1a1a18809f6dcae239dc001739a310fd0344ab09f683417158df6fc853ac26fe
                                                                              • Instruction ID: 2b035e51c211450982f283d45b3e2ddac28193d466b93965359d1735b3c403fd
                                                                              • Opcode Fuzzy Hash: 1a1a18809f6dcae239dc001739a310fd0344ab09f683417158df6fc853ac26fe
                                                                              • Instruction Fuzzy Hash: 7831BF39104B418FD731DF3AC484792BBF2AF85314F148A2EE1AACB6A1E770E549CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 478646fd36a8338289f42d6eeab55f0840b8ce79500449a1a59e9cc40acb8f0b
                                                                              • Instruction ID: dcecf27c11007ed9a688f26473d82e44bca65fc39cac6ce28992430c82cf88d5
                                                                              • Opcode Fuzzy Hash: 478646fd36a8338289f42d6eeab55f0840b8ce79500449a1a59e9cc40acb8f0b
                                                                              • Instruction Fuzzy Hash: F331F778A05158CFDB24EF64D844B99B7B6BB49304F1081AAE909E7355DB309E80CF60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 172f52a95e716a83ee42154ebdfe6b5addfdd3f4bd7e66e019b26531edeab044
                                                                              • Instruction ID: 34b69c34a5d764d925418b42e73f3a09f04179fb5e6644da74bbd356345963e8
                                                                              • Opcode Fuzzy Hash: 172f52a95e716a83ee42154ebdfe6b5addfdd3f4bd7e66e019b26531edeab044
                                                                              • Instruction Fuzzy Hash: 5941C578E05208CFDB14EFA9D590ADDBBB2FF89309F20442AD509AB355DB305942CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 327e131ad9e16c0962f12ddefdc8e08cb822fc844e397b71ece380e7c82d9367
                                                                              • Instruction ID: e58d30e54436ce17872faee1d6526a92745900c782296839f9364aa1d42323e6
                                                                              • Opcode Fuzzy Hash: 327e131ad9e16c0962f12ddefdc8e08cb822fc844e397b71ece380e7c82d9367
                                                                              • Instruction Fuzzy Hash: 8C31F5B8D05209DFCB45EFA9D9406AEBBF2EF89704F2090AAD505E7351D7349A41CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7e16e76de78059591730104237f06084b785622795009b4f5ac87ef12763da79
                                                                              • Instruction ID: c594dae8606d9ff3708f79db60dcef3116209f883d60fd2a33e30d5bd2d4c97a
                                                                              • Opcode Fuzzy Hash: 7e16e76de78059591730104237f06084b785622795009b4f5ac87ef12763da79
                                                                              • Instruction Fuzzy Hash: 5431E5B8E05208DFCB44EFA9D9406AEBBF6EB88704F1090AAD919E7351D7349A41CF50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4ed1bf10a960a04f063b3c0dc99b40c978300a69b3a8f21670809fef580dc9a9
                                                                              • Instruction ID: ea98802f8cf95872b39316672a2222896664c6270047e7a6c8877f68166e9a60
                                                                              • Opcode Fuzzy Hash: 4ed1bf10a960a04f063b3c0dc99b40c978300a69b3a8f21670809fef580dc9a9
                                                                              • Instruction Fuzzy Hash: 8131BE78908259CFCB15EFA4D850BAEBBB2EF45308F0444AAC509DB395EB305E45DF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 46cb2c1c5d6b089c8b266c5a6e556199e4260d3cb253ca7f91b54522d39311db
                                                                              • Instruction ID: e93d560cac34fc40d0ebb0cb7716e84721d7bc06d3f66c10e02f40fea7450212
                                                                              • Opcode Fuzzy Hash: 46cb2c1c5d6b089c8b266c5a6e556199e4260d3cb253ca7f91b54522d39311db
                                                                              • Instruction Fuzzy Hash: 62211478D05208DFCB04DFB9D894AEDBBF6AB49304F10942AE805B7295DB705801CB64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5ec545cbe6e6bd932bed672e95a0d8a542f0748615c44acd27d59c75b842833a
                                                                              • Instruction ID: a6cd8fac2bd7211a0a7760b2bf92cc883a6b55ea3ca83f6f09deee8299376fda
                                                                              • Opcode Fuzzy Hash: 5ec545cbe6e6bd932bed672e95a0d8a542f0748615c44acd27d59c75b842833a
                                                                              • Instruction Fuzzy Hash: 3921F435A04245CFCF48DFB9D88059BBBB1EF9532472482A7D818DB18AE330D915CBE2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502257770.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_ccd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c8294467eddb25b876255c69535f32c777bd8d4c4ea2f5a845e28e4b124d043f
                                                                              • Instruction ID: a94dc69c39c7cf5d4fa7706f5272295aa503533b10cc7a2e51fdec32d47fe5ab
                                                                              • Opcode Fuzzy Hash: c8294467eddb25b876255c69535f32c777bd8d4c4ea2f5a845e28e4b124d043f
                                                                              • Instruction Fuzzy Hash: 11213675104240DFCB04CF10D8C0F66BBA9FB84324F24C57DEA060B246C336E856C7A2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502257770.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_ccd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 33dd6b8c9aedabe2cce9d1266c82ee13d1a4f8dbf0ba6e04a56743bd1388750a
                                                                              • Instruction ID: c772ed098b8f2684d7c56a15489045e7190bcecb5a0cf655dbf0e8035d5d5d05
                                                                              • Opcode Fuzzy Hash: 33dd6b8c9aedabe2cce9d1266c82ee13d1a4f8dbf0ba6e04a56743bd1388750a
                                                                              • Instruction Fuzzy Hash: 622145B1504200DFCB04CF50D8C0F66BBA5FB88328F20C5BDE8060B646C336E956CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 375bd46753cbdd0c441171ea10ab0a58b2cb04bfb690a2bdebc0bc5b904fd142
                                                                              • Instruction ID: 4a57f69d2cbd554aa213fc35f7da76db504c865e0c87bee2c77d69aa53c4d23f
                                                                              • Opcode Fuzzy Hash: 375bd46753cbdd0c441171ea10ab0a58b2cb04bfb690a2bdebc0bc5b904fd142
                                                                              • Instruction Fuzzy Hash: 2621F278D15218DBCB04DFB8D984AEDBBF6BB89304F10942AE816B7395DB705841CF64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 7b720c6727526fc270b2143f2f1a151bd5301092a9c69d49e301881b26eab18f
                                                                              • Instruction ID: 0751fffcba7b335e1d791cb35e2933fbe69617f9f92118428b7d77414ab57545
                                                                              • Opcode Fuzzy Hash: 7b720c6727526fc270b2143f2f1a151bd5301092a9c69d49e301881b26eab18f
                                                                              • Instruction Fuzzy Hash: 7C315278A04159CFCB14EF94D854BEEB7B2EB85308F0044A9D509EB794DB305E41DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 330c36b29be4963867f77962c5127a99f7f7f9d8d982af9149d11798c8de6b0d
                                                                              • Instruction ID: 56e67fd8558b185c9736beea857594d79c619eca60856217b6217efe3f76e51c
                                                                              • Opcode Fuzzy Hash: 330c36b29be4963867f77962c5127a99f7f7f9d8d982af9149d11798c8de6b0d
                                                                              • Instruction Fuzzy Hash: E221AE39A00209DFDB15DFA4C444AEE7BB6EF8D324F184529E815A7391DB359C41CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 0d18af4ef7683c859ef4787defb1ea4a530a3e7b8c5ff9dff1e21b541e90cdcb
                                                                              • Instruction ID: cec1009a4a72bc864260311700d3be157938bbdf719975bc0ab40b3ccd73335e
                                                                              • Opcode Fuzzy Hash: 0d18af4ef7683c859ef4787defb1ea4a530a3e7b8c5ff9dff1e21b541e90cdcb
                                                                              • Instruction Fuzzy Hash: BA31F57CE012189FDB04DFA4D594AADB7B6BF89304F248459E905EB360DB34AD41CF90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 75941d1a76fe5fba36a6a5f497f8b9b1a1eb8353a758936151ea797589a6b69b
                                                                              • Instruction ID: e2b1ff872a27b9467d74bb10f29e810b6f76842c12828aaa1ea49f9fd21b71b5
                                                                              • Opcode Fuzzy Hash: 75941d1a76fe5fba36a6a5f497f8b9b1a1eb8353a758936151ea797589a6b69b
                                                                              • Instruction Fuzzy Hash: 89210738A103014FDB00EFB4E454BAE7BAAFB85304F448D2DE105C7685EF71A8068BE1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 139d5a98a0ec21b989f8ffd44adee3d1f3737c456d92c81612bdd1680580e2f8
                                                                              • Instruction ID: 6c4a43f8734e8231202991ae239d2ba4c658520d2b6d10bc1bf71aecdf815cbc
                                                                              • Opcode Fuzzy Hash: 139d5a98a0ec21b989f8ffd44adee3d1f3737c456d92c81612bdd1680580e2f8
                                                                              • Instruction Fuzzy Hash: 50213478E042098FCF05DFA9C444AEEBBF5EF89704F1084AAD514AB2A1D734A945CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d8f8a98e1391502e340ea3b858000c45480d044234eec28a461ec308045d40d3
                                                                              • Instruction ID: e941dccf133ffe8335d66b064fd3f29dff28557cb91e542d049133736728d642
                                                                              • Opcode Fuzzy Hash: d8f8a98e1391502e340ea3b858000c45480d044234eec28a461ec308045d40d3
                                                                              • Instruction Fuzzy Hash: A8216A39A002099FCB14DFA8C844AEE7BB6EF8D324F184529E415A7391DB359C41CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3669a39226a45b902f58bd328516dd4e2a9997a53c65f4464258a425f9a7aa70
                                                                              • Instruction ID: d099ed4b5067af6cab4fa5b33de0ef392c0885803668e4b6ef6c64df6ce877ee
                                                                              • Opcode Fuzzy Hash: 3669a39226a45b902f58bd328516dd4e2a9997a53c65f4464258a425f9a7aa70
                                                                              • Instruction Fuzzy Hash: 7711903CB002159FDB10AF7488147BE7BF5BB89750F08846AE655DB390EB71C841CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1a2a0723b29c2de28ca65ceece0dc90c208a1aa614a57b08b9a2959b4198aef7
                                                                              • Instruction ID: ccdfd04a96d8335306f6ac81034c6059e83fdae3e052f6d92b237d54ae9513eb
                                                                              • Opcode Fuzzy Hash: 1a2a0723b29c2de28ca65ceece0dc90c208a1aa614a57b08b9a2959b4198aef7
                                                                              • Instruction Fuzzy Hash: 85211538E001099FCF04DFA9C448AEEBBB5AF88718F00C56AD919A72A0D7349905CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f9128ec6fa3a9236ca56eeb0817ea6f69c18c42f51d4e65708f4dfd14eb6ddca
                                                                              • Instruction ID: bbaf12223158d1af8ec401f9ff879cc2e771288f97242b214b4edd13efb0f203
                                                                              • Opcode Fuzzy Hash: f9128ec6fa3a9236ca56eeb0817ea6f69c18c42f51d4e65708f4dfd14eb6ddca
                                                                              • Instruction Fuzzy Hash: 8A216A78A0414A8FCF04DFA8D990AEEBBF1EF89304F10856AD501A7394DB305E05CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ff92983ea5dba49d1b6cf56beba2d4adc585be6e818aac4dfdecd0c67286937e
                                                                              • Instruction ID: 5c99965beea6f93383dfba82867a10cdaab900d0d93c6eb2558ac09f8789a74b
                                                                              • Opcode Fuzzy Hash: ff92983ea5dba49d1b6cf56beba2d4adc585be6e818aac4dfdecd0c67286937e
                                                                              • Instruction Fuzzy Hash: A411CE3A344254AFDB118F28DC90F9A7BA9EF99620F1481A6F614CB291CB71D800DB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 20f5b1b40f53b4fc9efb9651ce6dd71680959141d45de2ed0d7f66d60d257dca
                                                                              • Instruction ID: 35cea3d0e2c4652a309c45b030384eea4da3a8106735738dd5bab6c5d6f47475
                                                                              • Opcode Fuzzy Hash: 20f5b1b40f53b4fc9efb9651ce6dd71680959141d45de2ed0d7f66d60d257dca
                                                                              • Instruction Fuzzy Hash: 50214A78A0410A8FCF04EFA8D990AEEB7F2EB88305F50856AD504A7354DB305E01CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502257770.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_ccd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: acbd54d619e4651e8d664778484e1ea667955c8583ce90928e9da7c7847df0cf
                                                                              • Instruction ID: c4a53153e6f4290fd64907f1432b875c07fb40502d4ba4df9577f0f8a3e641e2
                                                                              • Opcode Fuzzy Hash: acbd54d619e4651e8d664778484e1ea667955c8583ce90928e9da7c7847df0cf
                                                                              • Instruction Fuzzy Hash: 7811B1B6504280CFCB12CF14D9C4B16BF71FB94324F24C6ADD8050B656C336D95ACBA2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502257770.0000000000CCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CCD000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_ccd000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: acbd54d619e4651e8d664778484e1ea667955c8583ce90928e9da7c7847df0cf
                                                                              • Instruction ID: cb9004439e6de7ad2266729300d8b1af82ee2abab90998d0f0d26e045c0565cb
                                                                              • Opcode Fuzzy Hash: acbd54d619e4651e8d664778484e1ea667955c8583ce90928e9da7c7847df0cf
                                                                              • Instruction Fuzzy Hash: 7311AF76504280CFCB15CF10D9C4B16BF61FB94324F24C6ADD90A4B656C336E95ACBA2
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9addb072fc877d4844f5d84004ebdc1efaee56c23b9a0effd09f67a0d0e9cfd1
                                                                              • Instruction ID: 7fe0ae1ab7acf355e442107e77adbd074f85b92b2befb7e652a2e542d421a9d0
                                                                              • Opcode Fuzzy Hash: 9addb072fc877d4844f5d84004ebdc1efaee56c23b9a0effd09f67a0d0e9cfd1
                                                                              • Instruction Fuzzy Hash: D8110138908389CFDB12DFB9D8506A9BFB0AF06304F0548DEE055DB692C7345900CF20
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cda56974532fe4560de4d87b516d29cf7a93082fe527ba90680b324cbf109ab8
                                                                              • Instruction ID: 67528a6b6afad6e37aface80d30a980939fb330267ca07a95b64f015fe4f607d
                                                                              • Opcode Fuzzy Hash: cda56974532fe4560de4d87b516d29cf7a93082fe527ba90680b324cbf109ab8
                                                                              • Instruction Fuzzy Hash: 60116074D05209DFCF00EFA8D941A9DBBB1FF45304B10469AD414AB391DB306E41DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: cd697e1cb07eedee6253824709b3f9266ce52fcdd9ab10ae1a7e189d5d3f866d
                                                                              • Instruction ID: e38e1f4e202824828323a396f77ad8b70d0e693bc97725292a321510c64ba083
                                                                              • Opcode Fuzzy Hash: cd697e1cb07eedee6253824709b3f9266ce52fcdd9ab10ae1a7e189d5d3f866d
                                                                              • Instruction Fuzzy Hash: D5215878A0025CCFDB24DF54CC45BD9BBB1AB49304F1041EADA09AB2A4DB305E85CFA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 44361dacbeeb7dd376544ca72245158fa1245ca062a74de7ce4bb7229db6633a
                                                                              • Instruction ID: 9897abfd6ed89ad60222911eb8a204f2014cb3c88e7975be51b27ff8c7dca6a0
                                                                              • Opcode Fuzzy Hash: 44361dacbeeb7dd376544ca72245158fa1245ca062a74de7ce4bb7229db6633a
                                                                              • Instruction Fuzzy Hash: 7B114874E052598FCB06EFA8D8446EEBBF1EF49304F1045AAD504A7380D7345A45CBA0
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 27fc3c3077100fee279b3b93a5454d2b76c61e3dbfba6aa791349b0cadd200e2
                                                                              • Instruction ID: 05399b6da794fec604808b551fafd01310d18442e06dff0eff52325b7abd1c98
                                                                              • Opcode Fuzzy Hash: 27fc3c3077100fee279b3b93a5454d2b76c61e3dbfba6aa791349b0cadd200e2
                                                                              • Instruction Fuzzy Hash: DC110579E001199FCF04EFA8D8446EEBBF5EB88319F10446AD608A3380E7355A55CBA1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e34ea0577281cfb00a25be426f8cf6160287279813f0cf049c01a0ddf28c2ae8
                                                                              • Instruction ID: 0aa23d88d0fc4b339045398f6eaea8513b7a010012715fdade89d92635475573
                                                                              • Opcode Fuzzy Hash: e34ea0577281cfb00a25be426f8cf6160287279813f0cf049c01a0ddf28c2ae8
                                                                              • Instruction Fuzzy Hash: B6112A74D052499FCB05DFB8D54469DBFF1EF49304F1081AAE908EB3A1D7304A81DB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c431441d5e8224f149cc89c4c953b5b9cf5cc137f93638e8a26b1aba919fef09
                                                                              • Instruction ID: c18bda468ebc76238b508f9b03e3d68d35f69bcce423ec9ca8a4056611601b22
                                                                              • Opcode Fuzzy Hash: c431441d5e8224f149cc89c4c953b5b9cf5cc137f93638e8a26b1aba919fef09
                                                                              • Instruction Fuzzy Hash: 28119278E05209DFCB44DFA9D945BAEBBF1EF48304F2080A9E909A7361D7309E41DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: deede2f5be9effabe9bf3afa8a7f28423465662335a82b3e3ae9a54d49ea06bd
                                                                              • Instruction ID: 2362711452a45a40371bbad4244611723c963e4d29e35c0482cc6a4760c69d43
                                                                              • Opcode Fuzzy Hash: deede2f5be9effabe9bf3afa8a7f28423465662335a82b3e3ae9a54d49ea06bd
                                                                              • Instruction Fuzzy Hash: 0B119578E01209DFDB44DFA9C945BAEBBF1EF48305F2080A9E909A7361D7309E41DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2dfeca8e5c5a661de90c01bc1f56d502c08fd97605c25450da96ce70ad4c89fb
                                                                              • Instruction ID: 3b2c42a0959d663830a476f3b828852a7b22708ba2138da43ae3035dd61ee081
                                                                              • Opcode Fuzzy Hash: 2dfeca8e5c5a661de90c01bc1f56d502c08fd97605c25450da96ce70ad4c89fb
                                                                              • Instruction Fuzzy Hash: B9F0287AB082156FE3155A259804B2AF7A9EB89310F04406AE509DB391CB719C4087D4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5df0332923fa4a3cf23d626f8444164b398e94d546d250e9fbc8a66e7910836b
                                                                              • Instruction ID: 144f7499f35239dc00ed10f62386fe80c72370fcb8f13248efb686ef7779617c
                                                                              • Opcode Fuzzy Hash: 5df0332923fa4a3cf23d626f8444164b398e94d546d250e9fbc8a66e7910836b
                                                                              • Instruction Fuzzy Hash: 1BF050AFB4D2955FD71117745C50725BB91CBDA108F0C80DFD449CF6E2DB928806C390
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 34ced7848c5709eaa7140af641287700817e0ec825ab453dd91ecb02c19700af
                                                                              • Instruction ID: 4532844d80b162786253f97666fded6f2d2846a72bd937ea6b491e266bc7f12a
                                                                              • Opcode Fuzzy Hash: 34ced7848c5709eaa7140af641287700817e0ec825ab453dd91ecb02c19700af
                                                                              • Instruction Fuzzy Hash: EEF06D3D3042818FC7129F39D89499ABFB5EFAA62031540EAE695CB322CB619815CB60
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 19254afbb55db7f7cc37f6a6c294575b02c12f20d8baab7d0f8099e4b0059557
                                                                              • Instruction ID: 431f54997321aa67f2b2574912389b05362cdd10d3b9996ec28f04cf3503ed0b
                                                                              • Opcode Fuzzy Hash: 19254afbb55db7f7cc37f6a6c294575b02c12f20d8baab7d0f8099e4b0059557
                                                                              • Instruction Fuzzy Hash: 54011A74E092599FCB04EFE8D990A9EFFB0FF45304F10869AC418A7256E7745A41CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 78af96cbf4616b4115c607fa4ca5c415c339213ce2d95c45627b95c1f419b741
                                                                              • Instruction ID: b019b23ba72c4d97f5218139ee742d3a9ab6a98451df6b010398d045cb39f075
                                                                              • Opcode Fuzzy Hash: 78af96cbf4616b4115c607fa4ca5c415c339213ce2d95c45627b95c1f419b741
                                                                              • Instruction Fuzzy Hash: 7201C974E05209DFCB44EFE9E940AAEBBF5FB44304F1086AAC418A7355E7349A41DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d9c5c0e33ed58da210251033d7ede62c5d66f2ec69de2bd2086299b864cb06c4
                                                                              • Instruction ID: 43644cb75e1029b5fcde3ec1f694d743cc74073c96d3742c8d15392d9647139c
                                                                              • Opcode Fuzzy Hash: d9c5c0e33ed58da210251033d7ede62c5d66f2ec69de2bd2086299b864cb06c4
                                                                              • Instruction Fuzzy Hash: 66F017B4905209AFCB42DFA8D840698BBF0EF4A300F10C0EAD858D7251EB359A82DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e5cd296fd87fa077b64afa4953d63cf798d6ad20bca5fdb0ebbca1b9f627f2c5
                                                                              • Instruction ID: 9477f78de84d6aa5df79e22fff955f3773b43de443e3f91b2cb6c0a159b27f60
                                                                              • Opcode Fuzzy Hash: e5cd296fd87fa077b64afa4953d63cf798d6ad20bca5fdb0ebbca1b9f627f2c5
                                                                              • Instruction Fuzzy Hash: C4F0DA74905249AFCB46DFB8D55169CBBF1EF49204F1480EAD808DB391E7359982DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 92f80b4004bc7e8487b0b5528cba90a4db57faa8990188c408b259886fdddf78
                                                                              • Instruction ID: a10a66f343b6854a9a607ccc8dbb85f4b50536f97812c3eff756dc09503e6fb6
                                                                              • Opcode Fuzzy Hash: 92f80b4004bc7e8487b0b5528cba90a4db57faa8990188c408b259886fdddf78
                                                                              • Instruction Fuzzy Hash: 5DF06734904208AFCB02DFA8C84069CBBB0EF05304F2481EAD848D7251D7319A46DF80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b350358d8eb0622f663edfec799c11132256e9cb99fe98a296526c4272606d88
                                                                              • Instruction ID: 63db99c7dda4e614189aa8b792a937ac65851281a278cb2a54126dc412e42ba0
                                                                              • Opcode Fuzzy Hash: b350358d8eb0622f663edfec799c11132256e9cb99fe98a296526c4272606d88
                                                                              • Instruction Fuzzy Hash: 29F08234408258EFCF07DF94DC41A9CBF71EF06304F10819AED045B261D7315952EB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 785a52f0e2e22149c7a99f575b8187638e3d96fad48f74df80d4d84585f1066e
                                                                              • Instruction ID: dcf143848cfa1635191d929bf160d4cb748c906afcaf5b6bc96429c46a478944
                                                                              • Opcode Fuzzy Hash: 785a52f0e2e22149c7a99f575b8187638e3d96fad48f74df80d4d84585f1066e
                                                                              • Instruction Fuzzy Hash: 3EF03A74905359AFCB42DFA8D950298FFF0EF4A204F1084EAC848DB351D7355A86CF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9b791d434f3c505d8c4fc73455c49fddb85ec6e2cff94e9a162174b349119224
                                                                              • Instruction ID: e937ce2a7fdb3dc9d9da64d816ee0597d2260b26a8f35fddb6e35ef5a5a2afa2
                                                                              • Opcode Fuzzy Hash: 9b791d434f3c505d8c4fc73455c49fddb85ec6e2cff94e9a162174b349119224
                                                                              • Instruction Fuzzy Hash: A4F0E7B4D062099FCB44EFA8D5446AEBBF1FB48304F1085AAD808E3344EB305A41CF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d8224a6f4cf032a8a03cbe8bc77ce580123c6c45beb36cfbea06fabf1adb0a23
                                                                              • Instruction ID: 584dbe50483f7124eda4eea00ad93bb0c7752e3b377bdb704cc220496547fcec
                                                                              • Opcode Fuzzy Hash: d8224a6f4cf032a8a03cbe8bc77ce580123c6c45beb36cfbea06fabf1adb0a23
                                                                              • Instruction Fuzzy Hash: 1DF0BE70C09288AFCB42DFB8C85029CBFF0AF06204F1481DAD898D7392D7351A42DB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 8bd55919b4ec628ff23bb846f0c7288ed777a1a80ba7a3554187cb8cb67c25c7
                                                                              • Instruction ID: ce58a6f3e9c0f0e16da569566da8a4fd6772eba7de33742008113978f02941c9
                                                                              • Opcode Fuzzy Hash: 8bd55919b4ec628ff23bb846f0c7288ed777a1a80ba7a3554187cb8cb67c25c7
                                                                              • Instruction Fuzzy Hash: F1F03034805348EFCB07DFA4D94069CBFB0EF46314F1480DAE8449B361D7315A92DB84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 09ce4f2ac51fd3ee7eec9c5addb910f13bbade6450572d903164b70c3182c529
                                                                              • Instruction ID: 8d6809f44a133f09315f992733f806de7e9d422d8c4a3c96a682a674014eab12
                                                                              • Opcode Fuzzy Hash: 09ce4f2ac51fd3ee7eec9c5addb910f13bbade6450572d903164b70c3182c529
                                                                              • Instruction Fuzzy Hash: 74F05874D09248AFCB42DFA8DD6579CFFF0AF4A304F1480EAD84897282E7355A42CB42
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 10090d54a930799c6ce108d2bf84551df56682c21b5c68d5bfed14cd247fa76f
                                                                              • Instruction ID: 1c39ee12fec6d1633d5802c4364e0169860c99c46aaf47a9321303b50a046164
                                                                              • Opcode Fuzzy Hash: 10090d54a930799c6ce108d2bf84551df56682c21b5c68d5bfed14cd247fa76f
                                                                              • Instruction Fuzzy Hash: 56E06D754092099FCB43EFB8D94578E7BF9EF02304F1008E7C104DB161EA390A84DB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 58e528306aac45c18eff860abf8985fe41dd84b61f8b15d019563749deead3c0
                                                                              • Instruction ID: 6367d43b063fff55f0dfcbad0f725ed1a2e6a052e54843202d3e0dbd60bc3818
                                                                              • Opcode Fuzzy Hash: 58e528306aac45c18eff860abf8985fe41dd84b61f8b15d019563749deead3c0
                                                                              • Instruction Fuzzy Hash: 21F03438D05208AFCB12DFE8D85469CBBB1EF49304F14C0EAC84897352D6359A96DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e9d8b88127a1aa3e37d19f74d5075516cdaa0255400fc2082b303bb26280c7b0
                                                                              • Instruction ID: 5efc0857c985b38b6ad0e4fc4b5e6f5f2c9e0a1dca81b608ebf5fd7097e09762
                                                                              • Opcode Fuzzy Hash: e9d8b88127a1aa3e37d19f74d5075516cdaa0255400fc2082b303bb26280c7b0
                                                                              • Instruction Fuzzy Hash: B8F0E534809204BFCB02DFA4D951698BFB0EF5A314F1080DAC844573A2C7316987EB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e56b0a15f05b352b75f592bbceb31616cd5cedc93260a4f5ba249adb0f3d2970
                                                                              • Instruction ID: 08bc38808ac4a4f1279effe117dc6b56fc7e2885bdba7de28467be1bcb445c52
                                                                              • Opcode Fuzzy Hash: e56b0a15f05b352b75f592bbceb31616cd5cedc93260a4f5ba249adb0f3d2970
                                                                              • Instruction Fuzzy Hash: 87F06774905208AFCB42DFA8C840ADCBFB0EF4A310F1080EAD81897212D7369A56DF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 728a65dbd3bbb5bc1a872f7563e8e84782bcb45d84942dea45fc87c448ab4369
                                                                              • Instruction ID: b467da2099822af8a85fdc34ad730efd0bd59d6a38e87eabc1fa8d1a65e3e748
                                                                              • Opcode Fuzzy Hash: 728a65dbd3bbb5bc1a872f7563e8e84782bcb45d84942dea45fc87c448ab4369
                                                                              • Instruction Fuzzy Hash: 64F05874D08288AFCB42DFA8D85475CFFF0AB46214F1481EA8858A73D2D6355A42DB42
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4f41d2bb85bc9966dc0b15ff4c28483509d500edc749342001ac577552585c7f
                                                                              • Instruction ID: 6a543a3313dbabf2d80d59d1c650c4fce6d385e38663cf5287ac299a94420b35
                                                                              • Opcode Fuzzy Hash: 4f41d2bb85bc9966dc0b15ff4c28483509d500edc749342001ac577552585c7f
                                                                              • Instruction Fuzzy Hash: 19F05878905208FFCB01DF94D844A9CBFB5EF48304F20C0AAE84493290C7369A51EB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4afdc4727748744bff4fcb30dce9dfb110abb58be44704a519c7c000016bca11
                                                                              • Instruction ID: 5c1ce58ec1a958b40ae6a8cda19ec2bde5ac15a8a23f59c8ea6386cee038b9ab
                                                                              • Opcode Fuzzy Hash: 4afdc4727748744bff4fcb30dce9dfb110abb58be44704a519c7c000016bca11
                                                                              • Instruction Fuzzy Hash: F8F0A0348092489FCF03CFB0D8515DCBFB0EF03310F1480EAC8459B292C6350986DB91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 2cbe8c3c3a43fdfa10b6f240e0ca6b3b5370b17ea456ae71aa66aa6e46f39133
                                                                              • Instruction ID: b956d044cca52e331b23dab35c00892f7ab353be15a4e5506eda9df55e85fb8c
                                                                              • Opcode Fuzzy Hash: 2cbe8c3c3a43fdfa10b6f240e0ca6b3b5370b17ea456ae71aa66aa6e46f39133
                                                                              • Instruction Fuzzy Hash: CFF05838904308AFCB42DFA8D84029CBFF0EF4A204F1080EAC848DB391D6359E42DB81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dac782277b9a38ff0392ab8e2bc3e504df6592e239e08b134e6819229a645c69
                                                                              • Instruction ID: 7ac889d78dd640ec9bb92f48eef00e7c634790ed8ded9e15df688f354dcc9b7c
                                                                              • Opcode Fuzzy Hash: dac782277b9a38ff0392ab8e2bc3e504df6592e239e08b134e6819229a645c69
                                                                              • Instruction Fuzzy Hash: 29F05874D092889FCB42CFA8D9A539CFFF0EB4A214F1481DAC898D73A1D7355A42DB01
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: f354218b3d055b7e817a5ba1ea5ca42b11df51a809c707a0d9d4cc37973cd028
                                                                              • Instruction ID: 9132dd98ddd033ede82f7d0aa4c68fa803dc2c416eb72eeeef61cbfe04389061
                                                                              • Opcode Fuzzy Hash: f354218b3d055b7e817a5ba1ea5ca42b11df51a809c707a0d9d4cc37973cd028
                                                                              • Instruction Fuzzy Hash: AAE09B74909249AFD701DFB0D9516A97FB5DF46204B0584D6E504DF241DA311E11DB51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fc5890b05f4ec3adc049347d0de51babc786fe4b9805a49f7584af8a34faa058
                                                                              • Instruction ID: 98906185916246435b217b10247bd82a5357cd71b4e82c3f704df696f83299ab
                                                                              • Opcode Fuzzy Hash: fc5890b05f4ec3adc049347d0de51babc786fe4b9805a49f7584af8a34faa058
                                                                              • Instruction Fuzzy Hash: 05E0ED3A44A2889ECB02EBF4989069EBBB09F07304B1004EBC049D71A2DA300A89CB52
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 4f281e5d403c0e6e3585096e365701cbf49b5d050782e123c4a1122fa83dea01
                                                                              • Instruction ID: e8b5c212e462fecaad60053b1964801e6146ac8aa7223de2a65834e6b040dd3a
                                                                              • Opcode Fuzzy Hash: 4f281e5d403c0e6e3585096e365701cbf49b5d050782e123c4a1122fa83dea01
                                                                              • Instruction Fuzzy Hash: 8EE06D75D08184AFCB01DFF4A4906EC7BB5DF8B208B244AD9D448D7251E5711E06DB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ba4b3fa0839d3fbc044255022408768c1d0c7ff71d234b27c3c73ac369a604b5
                                                                              • Instruction ID: b9d4a8bd31caff025cd95b7318f0b1b3f2fa4e758ffd1f997938a55d39428906
                                                                              • Opcode Fuzzy Hash: ba4b3fa0839d3fbc044255022408768c1d0c7ff71d234b27c3c73ac369a604b5
                                                                              • Instruction Fuzzy Hash: 40F01C34E092889FCB55DFB8D99169CBFB1EF4A204F1880DEC888D7352D6355A56DF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 5975590b72e5ae3b20b01e3345996eb25ecce484cf9539bf1d2f8fa278743f77
                                                                              • Instruction ID: 20e55d892fabe2aba64499a4e3d8f126a8f53125668d98a7c2c0021888898a26
                                                                              • Opcode Fuzzy Hash: 5975590b72e5ae3b20b01e3345996eb25ecce484cf9539bf1d2f8fa278743f77
                                                                              • Instruction Fuzzy Hash: 92E06D78508208ABCF06DFB8D954B9DFFB4EF46304F2081E9E84457391C7316992EB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 31e445a8ebbf320a1afe487d67382ec8e54795b7b5682ce01e889cee9cfcd16b
                                                                              • Instruction ID: 1e040114785c1d129f540a15d37fd15dfd4f63c9539395b70e7c6cfcda84bc01
                                                                              • Opcode Fuzzy Hash: 31e445a8ebbf320a1afe487d67382ec8e54795b7b5682ce01e889cee9cfcd16b
                                                                              • Instruction Fuzzy Hash: 3CF01C78D05208AFCB40DFA9E95565CBBF1AB45304F2481EA881897351D6359A46DF42
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1ee5b89c2820ac1a595b2aa0176b32cc13ec1912103e6f1da9b57bf379b9f593
                                                                              • Instruction ID: b52ff8fb75221a621e841f812fb9eef583090479181d621732dd68f972698941
                                                                              • Opcode Fuzzy Hash: 1ee5b89c2820ac1a595b2aa0176b32cc13ec1912103e6f1da9b57bf379b9f593
                                                                              • Instruction Fuzzy Hash: D7E0C974D00208EFCB44DFA8D94569CBBF4EB58304F14C1AA9818A3350D735AA51DF44
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fbb3ef36a25441e3a58fd327a16dc9bf95e953309b11f56ebd6feefefa72cef6
                                                                              • Instruction ID: 7856a1461cf9be43f20208d364305b1cabfc04415b683693988eb8802c85a8b4
                                                                              • Opcode Fuzzy Hash: fbb3ef36a25441e3a58fd327a16dc9bf95e953309b11f56ebd6feefefa72cef6
                                                                              • Instruction Fuzzy Hash: EDF037749052849FCB15DFA4D85475CFFF0AB46218F2482DB8864973E2D7365A43DB41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a74640a2b7da2f5472252d56e78228b2dcda4b6cbf35c641d3fc724c269d5ad8
                                                                              • Instruction ID: 97821e8d372822c02d61ac37ca5b243ce1e81432c74a62df3edbdb4e3c4e59a7
                                                                              • Opcode Fuzzy Hash: a74640a2b7da2f5472252d56e78228b2dcda4b6cbf35c641d3fc724c269d5ad8
                                                                              • Instruction Fuzzy Hash: C3F0A578D00208AFCB44DFA8D944A9CBBB5EB48304F10C0AA9C1893350D731AA51DF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dad37c8972fd0a93ad6534562b7316407d48ab1f94f1520add08b0cd564af413
                                                                              • Instruction ID: f99e982f3a430258b7ccd97413dea582033191d1e55ab3b4eb6a3c3629234c5d
                                                                              • Opcode Fuzzy Hash: dad37c8972fd0a93ad6534562b7316407d48ab1f94f1520add08b0cd564af413
                                                                              • Instruction Fuzzy Hash: 92E0C278E00208AFCB54DFA8D944A9CBBF4EB48304F10C4AA9818A3350D731AA92DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: dad37c8972fd0a93ad6534562b7316407d48ab1f94f1520add08b0cd564af413
                                                                              • Instruction ID: 9a5236442432091586ec411aa28d93a90356456ef59aa3f82759ce86dd21bccb
                                                                              • Opcode Fuzzy Hash: dad37c8972fd0a93ad6534562b7316407d48ab1f94f1520add08b0cd564af413
                                                                              • Instruction Fuzzy Hash: 39E0C278E00208AFCB54DFE8D944A9CFBF5EB48314F24C0AA9808A3350D731AA52DF80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9b4c8cb98818695ba9eb8b6dd0cb6904f37941abf73496ac511cfa8e291e0d04
                                                                              • Instruction ID: 8d50f2c039efd52a0098225fb4903cc334ffae878038357b9775cfc503653a72
                                                                              • Opcode Fuzzy Hash: 9b4c8cb98818695ba9eb8b6dd0cb6904f37941abf73496ac511cfa8e291e0d04
                                                                              • Instruction Fuzzy Hash: BEE0ED38D04208AFCB04DFE4D9957ACFBB5EF45304F2481EAD85857381D7356A52DB85
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fa47696b879ad839f54848fe15b569759111bb70aaf2ebe7b18483a370e39f8d
                                                                              • Instruction ID: 3c7d5b3cc6d526c5dec961eebc35c00527914e70275eb2657f11e77b3a1870f5
                                                                              • Opcode Fuzzy Hash: fa47696b879ad839f54848fe15b569759111bb70aaf2ebe7b18483a370e39f8d
                                                                              • Instruction Fuzzy Hash: 71E0E574E00208AFCB44DFA8D94469CBBF4EB48204F10C1EA885893350D7319A42DF80
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: fa47696b879ad839f54848fe15b569759111bb70aaf2ebe7b18483a370e39f8d
                                                                              • Instruction ID: f61a6e8bcc497b6eb0b49d195c1fbaf42b5b0a39ceb40e29ecb92f9c075540aa
                                                                              • Opcode Fuzzy Hash: fa47696b879ad839f54848fe15b569759111bb70aaf2ebe7b18483a370e39f8d
                                                                              • Instruction Fuzzy Hash: B7E07578E05208AFCB54EFA8D95569DBBF4EB88204F10C5AA981893390D7359A42DF81
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 30a1a43496e0f2ced7f42b6aa26efae9f11251c925dfaf3e9c35133b6a8be409
                                                                              • Instruction ID: fa81efe4f645d8e64319ac89ad889457d5a8bf7061a3420cbadc39b6e982a3e0
                                                                              • Opcode Fuzzy Hash: 30a1a43496e0f2ced7f42b6aa26efae9f11251c925dfaf3e9c35133b6a8be409
                                                                              • Instruction Fuzzy Hash: 60E0867450D2489FD705DBA1ED50765BBB5DB03248F1481CED84887292DB365D42D751
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: b54a2c9a24ec192319e9bd87d5d1844d5cc4f805aa979272619379ccd7c8d374
                                                                              • Instruction ID: ba87df50c7868c822e86643e4cfc1438a7747faf990a341dfe05c01793610c83
                                                                              • Opcode Fuzzy Hash: b54a2c9a24ec192319e9bd87d5d1844d5cc4f805aa979272619379ccd7c8d374
                                                                              • Instruction Fuzzy Hash: 8BE0C2B980110CABCF40FFF4E94479E77E9EB01308F1008B6C409D3160EB300A40DB92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e57eca3f54ed72fce9301275c175aecebcb895d6b70d0213348d8047fc0f29b9
                                                                              • Instruction ID: f17fd606ca20cfac5d9d1f8e9f541f6c6efb0b655e30723387c003b1e44f1e60
                                                                              • Opcode Fuzzy Hash: e57eca3f54ed72fce9301275c175aecebcb895d6b70d0213348d8047fc0f29b9
                                                                              • Instruction Fuzzy Hash: 5BE0127940511CEBCB41FFF4E94479E77E9DB06309F1049AAC509D7160EB314A449B92
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 84e71f2a08ca6c093f2640a096a317ab658b899b1f3d3b783563e3bb0469b6d8
                                                                              • Instruction ID: 162cd3616f111acd8171dc58ad040152203cc17ba360c486721c698cca431093
                                                                              • Opcode Fuzzy Hash: 84e71f2a08ca6c093f2640a096a317ab658b899b1f3d3b783563e3bb0469b6d8
                                                                              • Instruction Fuzzy Hash: F5E04639A44209EFCB40EFB9E84589D77BAFB85208B5049ADE90AD7250DB316E00DF91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 97e914340ffeb7d79b45745dcad42919ef169d897852400f6f2c8ac835907463
                                                                              • Instruction ID: 35b1bf25f5d2ddb1f68f97446e5f6e5b0a8284eebd745898a6b382c6c5697c86
                                                                              • Opcode Fuzzy Hash: 97e914340ffeb7d79b45745dcad42919ef169d897852400f6f2c8ac835907463
                                                                              • Instruction Fuzzy Hash: 4FE01275E04208FFDB00EFB5EA41AAE77BAEB85308F518899E504DB240EA715F009B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 96d25aee28c107405da8ebb567657ccda95341f07df897e0452684ae9cf96a37
                                                                              • Instruction ID: a93885f9b46bf1c88f23a6898b9cc6ed9f739fc999fe45645b3e739c1413a09c
                                                                              • Opcode Fuzzy Hash: 96d25aee28c107405da8ebb567657ccda95341f07df897e0452684ae9cf96a37
                                                                              • Instruction Fuzzy Hash: 24E08C78904208EBCB05DF94E940A9CBBB4EB45304F20C0A9DC0463350C732AE92EB84
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: c49fcf4ad8365a19b9ab042d18ef51415d0da960e5a1231f98f85f0c648effbf
                                                                              • Instruction ID: ff341f17c684c4d0a4c49956d104a242f01483700121cd70da62802c26341181
                                                                              • Opcode Fuzzy Hash: c49fcf4ad8365a19b9ab042d18ef51415d0da960e5a1231f98f85f0c648effbf
                                                                              • Instruction Fuzzy Hash: 1AE01235E04108EFCB40DFE5E540A9D77B9EB85304F608999D508D7744EA716F009B91
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1bbba56b2b9fc483a3188dcf31c5e741b8878d021ece9320eb14a2a714a482e5
                                                                              • Instruction ID: 7623deb8ff1845b5286cfe4ba8aa808b4bfc7216cd16a2185b2c5cdb5ec46274
                                                                              • Opcode Fuzzy Hash: 1bbba56b2b9fc483a3188dcf31c5e741b8878d021ece9320eb14a2a714a482e5
                                                                              • Instruction Fuzzy Hash: 95D0A938506108EBCB04DFD4EA54B69B7B8EB42208F2080DE8C0C83390DB33AE43DB90
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: d0165eb904ecdf771ebfb0f56fff2c0166482611be7194c609912632ec56454b
                                                                              • Instruction ID: fc3404e3d4047495b3dfc826855ec9d2f18b84dbec2731f302e2d71eaa398074
                                                                              • Opcode Fuzzy Hash: d0165eb904ecdf771ebfb0f56fff2c0166482611be7194c609912632ec56454b
                                                                              • Instruction Fuzzy Hash: F9C04CB6E0410D9BDF80DBD8E5518DCFF71EF94325F500036D218A7110D73059A5CB50
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: Vm,
                                                                              • API String ID: 0-2489320424
                                                                              • Opcode ID: f08a6a535a104c82b2681818fe5751668875cedd21e42b7e5141fb82fb7123c6
                                                                              • Instruction ID: 16e8b12bb95facdb323627859184f31f0527e4ce6af45304c3796a55de06fb91
                                                                              • Opcode Fuzzy Hash: f08a6a535a104c82b2681818fe5751668875cedd21e42b7e5141fb82fb7123c6
                                                                              • Instruction Fuzzy Hash: 6BE1497DA042098FCB04DFA9D480AEEB7F6EB89304F24952AD519EB355E734ED42CB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 47aa94373750d23a0ddc39df456702716275ca655a1b6682fccf18b032b3801e
                                                                              • Instruction ID: f947254b42dc36ae35309188869629eec2ce1dfa794e5bed83309afc5f1aab6b
                                                                              • Opcode Fuzzy Hash: 47aa94373750d23a0ddc39df456702716275ca655a1b6682fccf18b032b3801e
                                                                              • Instruction Fuzzy Hash: 6FD1C8B5E056588FDB58DF6AC854B89BBF2BF89304F14C0EAD40DAB265DB305A85CF40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: ac428d1b04ad7cec8c7a541369a4f131e6c71fda04279ab15d32837d615f4653
                                                                              • Instruction ID: 39d599458b3203a64c209ad0384ac6d396f4ad17b19a1d3bdd771e05a2ab41cd
                                                                              • Opcode Fuzzy Hash: ac428d1b04ad7cec8c7a541369a4f131e6c71fda04279ab15d32837d615f4653
                                                                              • Instruction Fuzzy Hash: 3A811071D0A2448FDB48EFBAE891B9EBBF2AFC5304F44C52AD1049B268EF7459058F51
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3d02382117362e33aa83ee48199059f24a3b3633087c4905c225f7c1494ab133
                                                                              • Instruction ID: f187e3c694d2f23866fe9ef321f8939150d4786f01b2a5e3111b598d9d4d8487
                                                                              • Opcode Fuzzy Hash: 3d02382117362e33aa83ee48199059f24a3b3633087c4905c225f7c1494ab133
                                                                              • Instruction Fuzzy Hash: 69517275D056588BEB2DCF6B8D442CAFAF3AFC9314F14C1FA854CA6264DB740AC58E01
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 9ce99a17856f835ffd51f1f1e63aeb7e3136f0b63a152426510c761c5cd9573b
                                                                              • Instruction ID: 603cf24efee4e44dba3d7b67fdca6418f7f3bb0f897c199d75fec6e0f67c8d0b
                                                                              • Opcode Fuzzy Hash: 9ce99a17856f835ffd51f1f1e63aeb7e3136f0b63a152426510c761c5cd9573b
                                                                              • Instruction Fuzzy Hash: 8D514DB5D056588BEB68CF2B8D447CAFAF7AFC8340F04C1FA954CA6264DB740AC58E41
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502660625.0000000002800000.00000040.00000800.00020000.00000000.sdmp, Offset: 02800000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2800000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1bc39819268c4f7ed931db248cabe5ef358cf34a27caea03a267d728e85fd5b9
                                                                              • Instruction ID: 886a93d0f0acbbd0183b18c50244d03197814179ebe2eb475480eca7ea7504f5
                                                                              • Opcode Fuzzy Hash: 1bc39819268c4f7ed931db248cabe5ef358cf34a27caea03a267d728e85fd5b9
                                                                              • Instruction Fuzzy Hash: 674101B8D002088FDB50CFA9D985BAEBBF1BB49314F20942AE459BB290D7749845CF85
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000000.00000002.502839165.0000000002880000.00000040.00000800.00020000.00000000.sdmp, Offset: 02880000, based on PE: false
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_0_2_2880000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID: 0@&$G:]$P@)$m
                                                                              • API String ID: 0-460775039
                                                                              • Opcode ID: e1208a500a2af9a9c97a620567ddb5b0f16e04ab889f19edca794b03b347659a
                                                                              • Instruction ID: 8b2c19264a3f9000d0133a8518dc5010993c66f5708034db56e3446c53a25176
                                                                              • Opcode Fuzzy Hash: e1208a500a2af9a9c97a620567ddb5b0f16e04ab889f19edca794b03b347659a
                                                                              • Instruction Fuzzy Hash: FF012639A102494BD365CA28CC916AEFBB3AB85304B68D6A5C006CB359DA3CDE46CB40
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Execution Graph

                                                                              Execution Coverage:13.8%
                                                                              Dynamic/Decrypted Code Coverage:0.1%
                                                                              Signature Coverage:2.4%
                                                                              Total number of Nodes:1992
                                                                              Total number of Limit Nodes:96
                                                                              execution_graph 7721 10001080 sqlite3_open16 8066 4761cc __vbaChkstk __vbaOnError __vbaStrCopy 8067 474d56 124 API calls 8066->8067 8068 47623c __vbaStrMove __vbaStrCopy __vbaStrMove 8067->8068 8069 4785bc 21 API calls 8068->8069 8070 47627b 15 API calls 8069->8070 8071 4763d0 __vbaFreeObj 8070->8071 8072 477c4a __vbaChkstk __vbaStrCopy __vbaOnError __vbaChkstk 8077 477d52 __vbaChkstk __vbaOnError __vbaObjIs 8072->8077 8075 477d06 __vbaExitProc 8076 477d35 __vbaFreeStr 8075->8076 8078 477e90 __vbaObjSetAddref 8077->8078 8079 477dad __vbaStrCopy 8077->8079 8081 477eac __vbaExitProc 8078->8081 8080 474d56 124 API calls 8079->8080 8082 477dc3 __vbaStrMove __vbaStrCopy __vbaStrMove 8080->8082 8083 477cc2 6 API calls 8081->8083 8084 4785bc 21 API calls 8082->8084 8083->8075 8085 477e02 6 API calls 8084->8085 8085->8078 8589 1000189a 8590 100018a5 8589->8590 8591 100018aa 8589->8591 8603 10002fbc 8590->8603 8595 100017a4 8591->8595 8594 100018b8 8596 100017b0 __setmbcp 8595->8596 8600 1000184d __setmbcp 8596->8600 8601 100017fd ___DllMainCRTStartup 8596->8601 8607 1000166f 8596->8607 8598 1000182d 8599 1000166f __CRT_INIT@12 158 API calls 8598->8599 8598->8600 8599->8600 8600->8594 8601->8598 8601->8600 8602 1000166f __CRT_INIT@12 158 API calls 8601->8602 8602->8598 8604 10002fe1 8603->8604 8605 10002fee GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 8603->8605 8604->8605 8606 10002fe5 8604->8606 8605->8606 8606->8591 8608 100016fa 8607->8608 8609 1000167e 8607->8609 8611 10001700 8608->8611 8612 10001731 8608->8612 8656 10002ba6 HeapCreate 8609->8656 8617 1000171b 8611->8617 8623 10001689 8611->8623 8798 100023f1 8611->8798 8613 10001736 8612->8613 8614 1000178f 8612->8614 8801 10001ab9 TlsGetValue 8613->8801 8614->8623 8748 10001dd3 8614->8748 8617->8623 8625 100026a2 __ioterm 70 API calls 8617->8625 8623->8601 8624 10001695 __RTC_Initialize 8627 10001699 8624->8627 8632 100016a5 GetCommandLineA 8624->8632 8628 10001725 8625->8628 8759 10002bd6 8627->8759 8630 10001aed __mtterm 72 API calls 8628->8630 8631 1000172a 8630->8631 8634 10002bd6 __heap_term 4 API calls 8631->8634 8692 10002a23 8632->8692 8634->8623 8639 100016bf 8643 100016c3 8639->8643 8776 10002968 8639->8776 8640 10001783 8842 10001fce 8640->8842 8641 1000176c 8824 10001b2a 8641->8824 8765 10001aed 8643->8765 8645 10001773 GetCurrentThreadId 8645->8623 8648 100016cf 8654 100016e3 8648->8654 8733 100026f0 8648->8733 8655 100016e8 8654->8655 8793 100026a2 8654->8793 8655->8623 8657 10001684 8656->8657 8657->8623 8658 10001e41 GetModuleHandleW 8657->8658 8659 10001e55 8658->8659 8660 10001e5c 8658->8660 8663 1000213b __crt_waiting_on_module_handle 2 API calls 8659->8663 8661 10001fc4 8660->8661 8662 10001e66 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 8660->8662 8665 10001aed __mtterm 72 API calls 8661->8665 8664 10001eaf TlsAlloc 8662->8664 8666 10001e5b 8663->8666 8668 10001fc9 8664->8668 8669 10001efd TlsSetValue 8664->8669 8665->8668 8666->8660 8668->8624 8669->8668 8670 10001f0e 8669->8670 8855 10002400 8670->8855 8673 100019c3 __encode_pointer 7 API calls 8674 10001f1e 8673->8674 8675 100019c3 __encode_pointer 7 API calls 8674->8675 8676 10001f2e 8675->8676 8677 100019c3 __encode_pointer 7 API calls 8676->8677 8678 10001f3e 8677->8678 8679 100019c3 __encode_pointer 7 API calls 8678->8679 8680 10001f4e 8679->8680 8862 1000305a 8680->8862 8683 10001a3e __decode_pointer 7 API calls 8684 10001f6f 8683->8684 8684->8661 8685 100020a1 __calloc_crt 69 API calls 8684->8685 8686 10001f88 8685->8686 8686->8661 8687 10001a3e __decode_pointer 7 API calls 8686->8687 8688 10001fa2 8687->8688 8688->8661 8689 10001fa9 8688->8689 8690 10001b2a __getptd_noexit 69 API calls 8689->8690 8691 10001fb1 GetCurrentThreadId 8690->8691 8691->8668 8693 10002a41 GetEnvironmentStringsW 8692->8693 8694 10002a60 8692->8694 8695 10002a55 GetLastError 8693->8695 8696 10002a49 8693->8696 8694->8696 8697 10002af9 8694->8697 8695->8694 8698 10002a8b WideCharToMultiByte 8696->8698 8699 10002a7c GetEnvironmentStringsW 8696->8699 8700 10002b02 GetEnvironmentStrings 8697->8700 8702 100016b5 8697->8702 8705 10002aee FreeEnvironmentStringsW 8698->8705 8706 10002abf 8698->8706 8699->8698 8699->8702 8700->8702 8703 10002b12 8700->8703 8718 1000244e 8702->8718 8707 1000205c __malloc_crt 69 API calls 8703->8707 8705->8702 8877 1000205c 8706->8877 8709 10002b2c 8707->8709 8711 10002b33 FreeEnvironmentStringsA 8709->8711 8712 10002b3f _realloc 8709->8712 8711->8702 8716 10002b49 FreeEnvironmentStringsA 8712->8716 8713 10002acd WideCharToMultiByte 8714 10002ae7 8713->8714 8715 10002adf 8713->8715 8714->8705 8717 10001fce __setmbcp 69 API calls 8715->8717 8716->8702 8717->8714 9122 10002dcc 8718->9122 8720 1000245a GetStartupInfoA 8721 100020a1 __calloc_crt 69 API calls 8720->8721 8729 1000247b 8721->8729 8722 10002699 __setmbcp 8722->8639 8723 10002616 GetStdHandle 8728 100025e0 8723->8728 8724 100020a1 __calloc_crt 69 API calls 8724->8729 8725 1000267b SetHandleCount 8725->8722 8726 10002628 GetFileType 8726->8728 8727 10002563 8727->8722 8727->8728 8730 1000258c GetFileType 8727->8730 8732 10005486 __ioinit InitializeCriticalSectionAndSpinCount 8727->8732 8728->8722 8728->8723 8728->8725 8728->8726 8731 10005486 __ioinit InitializeCriticalSectionAndSpinCount 8728->8731 8729->8722 8729->8724 8729->8727 8729->8728 8730->8727 8731->8728 8732->8727 8734 100026f9 8733->8734 8737 100026fe _strlen 8733->8737 9123 10003c7a 8734->9123 8736 100020a1 __calloc_crt 69 API calls 8743 10002733 _strlen 8736->8743 8737->8736 8740 100016d8 8737->8740 8738 10002791 8739 10001fce __setmbcp 69 API calls 8738->8739 8739->8740 8740->8654 8787 1000222a 8740->8787 8741 100020a1 __calloc_crt 69 API calls 8741->8743 8742 100027b7 8744 10001fce __setmbcp 69 API calls 8742->8744 8743->8738 8743->8740 8743->8741 8743->8742 8745 1000551d _strcpy_s 69 API calls 8743->8745 8747 10002778 8743->8747 8744->8740 8745->8743 8746 10004df6 __invoke_watson 10 API calls 8746->8747 8747->8743 8747->8746 8749 10001de1 8748->8749 8750 10001e2c 8748->8750 8753 10001de7 TlsGetValue 8749->8753 8754 10001e0a 8749->8754 8751 10001e36 TlsSetValue 8750->8751 8752 10001e3f 8750->8752 8751->8752 8752->8623 8753->8754 8755 10001dfa TlsGetValue 8753->8755 8756 10001a3e __decode_pointer 7 API calls 8754->8756 8755->8754 8757 10001e21 8756->8757 9421 10001ca4 8757->9421 8760 10002c36 HeapDestroy 8759->8760 8761 10002bdf 8759->8761 8760->8623 8762 10002c24 HeapFree 8761->8762 8763 10002bfb VirtualFree HeapFree 8761->8763 8762->8760 8763->8763 8764 10002c23 8763->8764 8764->8762 8766 10001af7 8765->8766 8767 10001b03 8765->8767 8769 10001a3e __decode_pointer 7 API calls 8766->8769 8768 10001b17 TlsFree 8767->8768 8770 10001b25 8767->8770 8768->8770 8769->8767 8771 100030c1 DeleteCriticalSection 8770->8771 8772 100030d9 8770->8772 8773 10001fce __setmbcp 69 API calls 8771->8773 8774 100030eb DeleteCriticalSection 8772->8774 8775 100030f9 8772->8775 8773->8770 8774->8772 8775->8627 8777 10002982 GetModuleFileNameA 8776->8777 8778 1000297d 8776->8778 8780 100029a9 8777->8780 8779 10003c7a ___initmbctable 113 API calls 8778->8779 8779->8777 9465 100027ce 8780->9465 8783 1000205c __malloc_crt 69 API calls 8784 100029eb 8783->8784 8785 100027ce _parse_cmdline 79 API calls 8784->8785 8786 10002a05 8784->8786 8785->8786 8786->8648 8788 10002238 __IsNonwritableInCurrentImage 8787->8788 9477 10005082 8788->9477 8790 10002256 __initterm_e 8792 10002275 __IsNonwritableInCurrentImage __initterm 8790->8792 9481 1000506b 8790->9481 8792->8654 8795 100026ab 8793->8795 8794 100016f8 8794->8643 8795->8794 8796 10001fce __setmbcp 69 API calls 8795->8796 8797 100026bf DeleteCriticalSection 8795->8797 8796->8795 8797->8795 9581 100022af 8798->9581 8800 100023fc 8800->8617 8802 1000173b 8801->8802 8803 10001ace 8801->8803 8806 100020a1 8802->8806 8804 10001a3e __decode_pointer 7 API calls 8803->8804 8805 10001ad9 TlsSetValue 8804->8805 8805->8802 8808 100020aa 8806->8808 8809 10001747 8808->8809 8810 100020c8 Sleep 8808->8810 9604 100048ca 8808->9604 8809->8623 8812 10001a3e TlsGetValue 8809->8812 8811 100020dd 8810->8811 8811->8808 8811->8809 8813 10001a56 8812->8813 8814 10001a77 GetModuleHandleW 8812->8814 8813->8814 8817 10001a60 TlsGetValue 8813->8817 8815 10001a92 GetProcAddress 8814->8815 8816 10001a87 8814->8816 8823 10001a6f 8815->8823 8818 1000213b __crt_waiting_on_module_handle 2 API calls 8816->8818 8822 10001a6b 8817->8822 8819 10001a8d 8818->8819 8819->8815 8821 10001765 8819->8821 8820 10001aa2 RtlDecodePointer 8820->8821 8821->8640 8821->8641 8822->8814 8822->8823 8823->8820 8823->8821 9621 10002dcc 8824->9621 8826 10001b36 GetModuleHandleW 8827 10001b46 8826->8827 8828 10001b4c 8826->8828 8829 1000213b __crt_waiting_on_module_handle 2 API calls 8827->8829 8830 10001b64 GetProcAddress GetProcAddress 8828->8830 8831 10001b88 8828->8831 8829->8828 8830->8831 8832 100031d6 __lock 65 API calls 8831->8832 8833 10001ba7 InterlockedIncrement 8832->8833 9622 10001bff 8833->9622 8836 100031d6 __lock 65 API calls 8837 10001bc8 8836->8837 8838 10003352 ___addlocaleref 8 API calls 8837->8838 8839 10001be6 8838->8839 9625 10001c08 8839->9625 8841 10001bf3 __setmbcp 8841->8645 8843 10001fda __setmbcp 8842->8843 8844 10002019 8843->8844 8846 100031d6 __lock 67 API calls 8843->8846 8847 10002053 _realloc __setmbcp 8843->8847 8845 1000202e HeapFree 8844->8845 8844->8847 8845->8847 8848 10002040 8845->8848 8851 10001ff1 ___sbh_find_block 8846->8851 8847->8623 8849 10003cda __setmbcp 67 API calls 8848->8849 8850 10002045 GetLastError 8849->8850 8850->8847 8852 1000200b 8851->8852 9630 10003d1d 8851->9630 9637 10002024 8852->9637 8866 10001a35 8855->8866 8857 10002408 __init_pointers __initp_misc_winsig 8869 10005236 8857->8869 8860 100019c3 __encode_pointer 7 API calls 8861 10001f13 8860->8861 8861->8673 8863 10003065 8862->8863 8865 10001f5b 8863->8865 8872 10005486 8863->8872 8865->8661 8865->8683 8867 100019c3 __encode_pointer 7 API calls 8866->8867 8868 10001a3c 8867->8868 8868->8857 8870 100019c3 __encode_pointer 7 API calls 8869->8870 8871 1000243a 8870->8871 8871->8860 8876 10002dcc 8872->8876 8874 10005492 InitializeCriticalSectionAndSpinCount 8875 100054d6 __setmbcp 8874->8875 8875->8863 8876->8874 8879 10002065 8877->8879 8880 1000209b 8879->8880 8881 1000207c Sleep 8879->8881 8882 10004800 8879->8882 8880->8705 8880->8713 8881->8879 8883 100048b3 8882->8883 8892 10004812 8882->8892 8884 100054f5 __calloc_impl 7 API calls 8883->8884 8885 100048b9 8884->8885 8887 10003cda __setmbcp 68 API calls 8885->8887 8898 100048ab 8887->8898 8890 1000486f HeapAlloc 8890->8892 8892->8890 8893 1000489f 8892->8893 8896 100048a4 8892->8896 8892->8898 8899 10004dae 8892->8899 8908 10004c03 8892->8908 8942 100021bf 8892->8942 8945 100047b1 8892->8945 8953 100054f5 8892->8953 8956 10003cda 8893->8956 8897 10003cda __setmbcp 68 API calls 8896->8897 8897->8898 8898->8879 8959 10006c01 8899->8959 8902 10004dc2 8903 10004c03 __NMSG_WRITE 69 API calls 8902->8903 8907 10004de4 8902->8907 8905 10004dda 8903->8905 8904 10006c01 __set_error_mode 69 API calls 8904->8902 8906 10004c03 __NMSG_WRITE 69 API calls 8905->8906 8906->8907 8907->8892 8909 10004c17 8908->8909 8910 10006c01 __set_error_mode 66 API calls 8909->8910 8941 10004d72 8909->8941 8911 10004c39 8910->8911 8912 10004d77 GetStdHandle 8911->8912 8914 10006c01 __set_error_mode 66 API calls 8911->8914 8913 10004d85 _strlen 8912->8913 8912->8941 8917 10004d9e WriteFile 8913->8917 8913->8941 8915 10004c4a 8914->8915 8915->8912 8916 10004c5c 8915->8916 8916->8941 8968 1000551d 8916->8968 8917->8941 8920 10004c92 GetModuleFileNameA 8922 10004cb0 8920->8922 8926 10004cd3 _strlen 8920->8926 8924 1000551d _strcpy_s 66 API calls 8922->8924 8925 10004cc0 8924->8925 8925->8926 8927 10004df6 __invoke_watson 10 API calls 8925->8927 8937 10004d16 8926->8937 8984 10005e96 8926->8984 8927->8926 8931 10004d3a 8934 10005dd3 _strcat_s 66 API calls 8931->8934 8933 10004df6 __invoke_watson 10 API calls 8933->8931 8936 10004d4e 8934->8936 8935 10004df6 __invoke_watson 10 API calls 8935->8937 8938 10004df6 __invoke_watson 10 API calls 8936->8938 8940 10004d5f 8936->8940 8993 10005dd3 8937->8993 8938->8940 9002 10006a98 8940->9002 8941->8892 9040 10002194 GetModuleHandleW 8942->9040 8946 100047bd __setmbcp 8945->8946 8947 100047ee __setmbcp 8946->8947 9043 100031d6 8946->9043 8947->8892 8949 100047d3 9050 100044cc 8949->9050 8954 10001a3e __decode_pointer 7 API calls 8953->8954 8955 10005505 8954->8955 8955->8892 9108 10001c11 GetLastError 8956->9108 8958 10003cdf 8958->8896 8960 10006c10 8959->8960 8961 10004db5 8960->8961 8962 10003cda __setmbcp 69 API calls 8960->8962 8961->8902 8961->8904 8963 10006c33 8962->8963 8965 10004f1e 8963->8965 8966 10001a3e __decode_pointer 7 API calls 8965->8966 8967 10004f2e __invoke_watson 8966->8967 8969 10005535 8968->8969 8970 1000552e 8968->8970 8971 10003cda __setmbcp 69 API calls 8969->8971 8970->8969 8975 1000555b 8970->8975 8972 1000553a 8971->8972 8973 10004f1e _strcpy_s 7 API calls 8972->8973 8974 10004c7e 8973->8974 8974->8920 8977 10004df6 8974->8977 8975->8974 8976 10003cda __setmbcp 69 API calls 8975->8976 8976->8972 9029 10005f50 8977->9029 8979 10004e23 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 8980 10004ef3 __invoke_watson 8979->8980 8981 10004eff GetCurrentProcess TerminateProcess 8979->8981 8980->8981 9031 10001660 8981->9031 8983 10004c8f 8983->8920 8988 10005ea8 8984->8988 8985 10005eac 8986 10003cda __setmbcp 69 API calls 8985->8986 8987 10004d03 8985->8987 8992 10005ec8 8986->8992 8987->8935 8987->8937 8988->8985 8988->8987 8990 10005ef2 8988->8990 8989 10004f1e _strcpy_s 7 API calls 8989->8987 8990->8987 8991 10003cda __setmbcp 69 API calls 8990->8991 8991->8992 8992->8989 8994 10005de4 8993->8994 8996 10005deb 8993->8996 8994->8996 8999 10005e1f 8994->8999 8995 10003cda __setmbcp 69 API calls 8997 10005df0 8995->8997 8996->8995 8998 10004f1e _strcpy_s 7 API calls 8997->8998 9000 10004d29 8998->9000 8999->9000 9001 10003cda __setmbcp 69 API calls 8999->9001 9000->8931 9000->8933 9001->8997 9003 10001a35 _doexit 7 API calls 9002->9003 9004 10006aa8 9003->9004 9005 10006b43 9004->9005 9006 10006abb LoadLibraryA 9004->9006 9012 10001a3e __decode_pointer 7 API calls 9005->9012 9025 10006b6d 9005->9025 9007 10006ad0 GetProcAddress 9006->9007 9008 10006be5 9006->9008 9007->9008 9010 10006ae6 9007->9010 9008->8941 9009 10006b98 9014 10001a3e __decode_pointer 7 API calls 9009->9014 9013 100019c3 __encode_pointer 7 API calls 9010->9013 9011 10001a3e __decode_pointer 7 API calls 9022 10006bb0 9011->9022 9015 10006b60 9012->9015 9016 10006aec GetProcAddress 9013->9016 9014->9008 9017 10001a3e __decode_pointer 7 API calls 9015->9017 9018 100019c3 __encode_pointer 7 API calls 9016->9018 9017->9025 9019 10006b01 GetProcAddress 9018->9019 9020 100019c3 __encode_pointer 7 API calls 9019->9020 9021 10006b16 GetProcAddress 9020->9021 9023 100019c3 __encode_pointer 7 API calls 9021->9023 9022->9009 9024 10001a3e __decode_pointer 7 API calls 9022->9024 9026 10006b2b 9023->9026 9024->9009 9025->9009 9025->9011 9026->9005 9027 10006b35 GetProcAddress 9026->9027 9028 100019c3 __encode_pointer 7 API calls 9027->9028 9028->9005 9030 10005f5c __VEC_memzero 9029->9030 9030->8979 9032 10001668 9031->9032 9033 1000166a IsDebuggerPresent 9031->9033 9032->8983 9039 10003052 9033->9039 9036 1000198a SetUnhandledExceptionFilter UnhandledExceptionFilter 9037 100019a7 __invoke_watson 9036->9037 9038 100019af GetCurrentProcess TerminateProcess 9036->9038 9037->9038 9038->8983 9039->9036 9041 100021a8 GetProcAddress 9040->9041 9042 100021b8 ExitProcess 9040->9042 9041->9042 9044 100031eb 9043->9044 9045 100031fe EnterCriticalSection 9043->9045 9059 10003113 9044->9059 9045->8949 9047 100031f1 9047->9045 9085 1000216b 9047->9085 9053 100044fa 9050->9053 9051 10004593 9055 1000459c 9051->9055 9103 100040e3 9051->9103 9053->9051 9053->9055 9096 10004033 9053->9096 9056 100047f7 9055->9056 9107 100030fc LeaveCriticalSection 9056->9107 9058 100047fe 9058->8947 9060 1000311f __setmbcp 9059->9060 9061 10003145 9060->9061 9062 10004dae __FF_MSGBANNER 69 API calls 9060->9062 9063 1000205c __malloc_crt 69 API calls 9061->9063 9067 10003155 __setmbcp 9061->9067 9064 10003134 9062->9064 9066 10003160 9063->9066 9065 10004c03 __NMSG_WRITE 69 API calls 9064->9065 9068 1000313b 9065->9068 9069 10003176 9066->9069 9070 10003167 9066->9070 9067->9047 9071 100021bf _doexit 3 API calls 9068->9071 9073 100031d6 __lock 69 API calls 9069->9073 9072 10003cda __setmbcp 69 API calls 9070->9072 9071->9061 9072->9067 9074 1000317d 9073->9074 9075 100031b1 9074->9075 9076 10003185 9074->9076 9078 10001fce __setmbcp 69 API calls 9075->9078 9077 10005486 __ioinit InitializeCriticalSectionAndSpinCount 9076->9077 9079 10003190 9077->9079 9084 100031a2 9078->9084 9080 10001fce __setmbcp 69 API calls 9079->9080 9079->9084 9082 1000319c 9080->9082 9083 10003cda __setmbcp 69 API calls 9082->9083 9083->9084 9092 100031cd 9084->9092 9086 10004dae __FF_MSGBANNER 69 API calls 9085->9086 9087 10002175 9086->9087 9088 10004c03 __NMSG_WRITE 69 API calls 9087->9088 9089 1000217d 9088->9089 9090 10001a3e __decode_pointer 7 API calls 9089->9090 9091 10002188 9090->9091 9091->9045 9095 100030fc LeaveCriticalSection 9092->9095 9094 100031d4 9094->9067 9095->9094 9097 10004046 HeapReAlloc 9096->9097 9098 1000407a HeapAlloc 9096->9098 9099 10004064 9097->9099 9100 10004068 9097->9100 9098->9099 9101 1000409d VirtualAlloc 9098->9101 9099->9051 9100->9098 9101->9099 9102 100040b7 HeapFree 9101->9102 9102->9099 9104 100040fa 9103->9104 9104->9104 9105 10004122 VirtualAlloc 9104->9105 9106 10004141 9105->9106 9106->9055 9107->9058 9109 10001ab9 __getptd_noexit 9 API calls 9108->9109 9110 10001c28 9109->9110 9111 10001c7e SetLastError 9110->9111 9112 100020a1 __calloc_crt 66 API calls 9110->9112 9111->8958 9113 10001c3c 9112->9113 9113->9111 9114 10001a3e __decode_pointer 7 API calls 9113->9114 9115 10001c56 9114->9115 9116 10001c75 9115->9116 9117 10001c5d 9115->9117 9119 10001fce __setmbcp 66 API calls 9116->9119 9118 10001b2a __getptd_noexit 66 API calls 9117->9118 9120 10001c65 GetCurrentThreadId 9118->9120 9121 10001c7b 9119->9121 9120->9111 9121->9111 9122->8720 9124 10003c83 9123->9124 9125 10003c8a 9123->9125 9127 10003ae0 9124->9127 9125->8737 9128 10003aec __setmbcp 9127->9128 9158 10001c8a 9128->9158 9132 10003aff 9179 1000387f 9132->9179 9135 1000205c __malloc_crt 69 API calls 9136 10003b20 9135->9136 9137 10003c3f __setmbcp 9136->9137 9186 100038fb 9136->9186 9137->9125 9140 10003b50 InterlockedDecrement 9142 10003b60 9140->9142 9143 10003b71 InterlockedIncrement 9140->9143 9141 10003c4c 9141->9137 9144 10003c5f 9141->9144 9146 10001fce __setmbcp 69 API calls 9141->9146 9142->9143 9148 10001fce __setmbcp 69 API calls 9142->9148 9143->9137 9145 10003b87 9143->9145 9147 10003cda __setmbcp 69 API calls 9144->9147 9145->9137 9150 100031d6 __lock 69 API calls 9145->9150 9146->9144 9147->9137 9149 10003b70 9148->9149 9149->9143 9152 10003b9b InterlockedDecrement 9150->9152 9153 10003c17 9152->9153 9154 10003c2a InterlockedIncrement 9152->9154 9153->9154 9156 10001fce __setmbcp 69 API calls 9153->9156 9196 10003c41 9154->9196 9157 10003c29 9156->9157 9157->9154 9159 10001c11 __getptd_noexit 69 API calls 9158->9159 9160 10001c92 9159->9160 9161 1000216b __amsg_exit 69 API calls 9160->9161 9162 10001c9f 9160->9162 9161->9162 9163 10003754 9162->9163 9164 10003760 __setmbcp 9163->9164 9165 10001c8a __getptd 69 API calls 9164->9165 9166 10003765 9165->9166 9167 10003777 9166->9167 9168 100031d6 __lock 69 API calls 9166->9168 9174 1000216b __amsg_exit 69 API calls 9167->9174 9175 10003785 __setmbcp 9167->9175 9169 10003795 9168->9169 9170 100037de 9169->9170 9171 100037c6 InterlockedIncrement 9169->9171 9172 100037ac InterlockedDecrement 9169->9172 9199 100037ef 9170->9199 9171->9170 9172->9171 9176 100037b7 9172->9176 9174->9175 9175->9132 9176->9171 9177 10001fce __setmbcp 69 API calls 9176->9177 9178 100037c5 9177->9178 9178->9171 9203 100037f8 9179->9203 9182 100038bc 9184 100038c1 GetACP 9182->9184 9185 100038ae 9182->9185 9183 1000389e GetOEMCP 9183->9185 9184->9185 9185->9135 9185->9137 9187 1000387f getSystemCP 81 API calls 9186->9187 9190 1000391b 9187->9190 9188 10001660 __atodbl_l 5 API calls 9191 10003ade 9188->9191 9189 10003926 setSBCS 9189->9188 9190->9189 9192 1000396a IsValidCodePage 9190->9192 9195 1000398f _memset __setmbcp_nolock 9190->9195 9191->9140 9191->9141 9192->9189 9193 1000397c GetCPInfo 9192->9193 9193->9189 9193->9195 9294 100035c1 GetCPInfo 9195->9294 9420 100030fc LeaveCriticalSection 9196->9420 9198 10003c48 9198->9137 9202 100030fc LeaveCriticalSection 9199->9202 9201 100037f6 9201->9167 9202->9201 9204 1000380b 9203->9204 9205 10003858 9203->9205 9206 10001c8a __getptd 69 API calls 9204->9206 9205->9182 9205->9183 9207 10003810 9206->9207 9208 10003838 9207->9208 9211 100034b8 9207->9211 9208->9205 9210 10003754 __setmbcp 71 API calls 9208->9210 9210->9205 9212 100034c4 __setmbcp 9211->9212 9213 10001c8a __getptd 69 API calls 9212->9213 9214 100034c9 9213->9214 9215 100034f7 9214->9215 9217 100034db 9214->9217 9216 100031d6 __lock 69 API calls 9215->9216 9218 100034fe 9216->9218 9219 10001c8a __getptd 69 API calls 9217->9219 9226 1000347a 9218->9226 9221 100034e0 9219->9221 9224 100034ee __setmbcp 9221->9224 9225 1000216b __amsg_exit 69 API calls 9221->9225 9224->9208 9225->9224 9227 100034b0 9226->9227 9228 1000347e 9226->9228 9234 10003522 9227->9234 9228->9227 9237 10003352 InterlockedIncrement 9228->9237 9230 10003491 9230->9227 9249 100033e1 9230->9249 9293 100030fc LeaveCriticalSection 9234->9293 9236 10003529 9236->9221 9238 10003370 InterlockedIncrement 9237->9238 9239 10003373 9237->9239 9238->9239 9240 10003380 9239->9240 9241 1000337d InterlockedIncrement 9239->9241 9242 1000338a InterlockedIncrement 9240->9242 9243 1000338d 9240->9243 9241->9240 9242->9243 9244 10003397 InterlockedIncrement 9243->9244 9246 1000339a 9243->9246 9244->9246 9245 100033b3 InterlockedIncrement 9245->9246 9246->9245 9247 100033c3 InterlockedIncrement 9246->9247 9248 100033ce InterlockedIncrement 9246->9248 9247->9246 9248->9230 9250 100033f2 InterlockedDecrement 9249->9250 9251 10003475 9249->9251 9252 10003407 InterlockedDecrement 9250->9252 9253 1000340a 9250->9253 9251->9227 9263 10003209 9251->9263 9252->9253 9254 10003414 InterlockedDecrement 9253->9254 9255 10003417 9253->9255 9254->9255 9256 10003421 InterlockedDecrement 9255->9256 9257 10003424 9255->9257 9256->9257 9258 1000342e InterlockedDecrement 9257->9258 9259 10003431 9257->9259 9258->9259 9260 1000344a InterlockedDecrement 9259->9260 9261 1000345a InterlockedDecrement 9259->9261 9262 10003465 InterlockedDecrement 9259->9262 9260->9259 9261->9259 9262->9251 9264 10003220 9263->9264 9265 1000328d 9263->9265 9264->9265 9268 10003254 9264->9268 9278 10001fce __setmbcp 69 API calls 9264->9278 9266 100032da 9265->9266 9267 10001fce __setmbcp 69 API calls 9265->9267 9269 10005b4b ___free_lc_time 69 API calls 9266->9269 9275 10003301 9266->9275 9270 100032ae 9267->9270 9271 10003275 9268->9271 9280 10001fce __setmbcp 69 API calls 9268->9280 9273 100032fa 9269->9273 9272 10001fce __setmbcp 69 API calls 9270->9272 9276 10001fce __setmbcp 69 API calls 9271->9276 9274 100032c1 9272->9274 9279 10001fce __setmbcp 69 API calls 9273->9279 9281 10001fce __setmbcp 69 API calls 9274->9281 9277 10003346 9275->9277 9287 10001fce 69 API calls __setmbcp 9275->9287 9282 10003282 9276->9282 9283 10001fce __setmbcp 69 API calls 9277->9283 9284 10003249 9278->9284 9279->9275 9285 1000326a 9280->9285 9286 100032cf 9281->9286 9288 10001fce __setmbcp 69 API calls 9282->9288 9289 1000334c 9283->9289 9290 10005d25 ___free_lconv_mon 69 API calls 9284->9290 9291 10005ce0 ___free_lconv_num 69 API calls 9285->9291 9292 10001fce __setmbcp 69 API calls 9286->9292 9287->9275 9288->9265 9289->9227 9290->9268 9291->9271 9292->9266 9293->9236 9297 100035f5 _memset 9294->9297 9303 100036a7 9294->9303 9304 10006212 9297->9304 9299 10001660 __atodbl_l 5 API calls 9301 10003752 9299->9301 9301->9195 9302 10006645 ___crtLCMapStringA 104 API calls 9302->9303 9303->9299 9305 100037f8 _LocaleUpdate::_LocaleUpdate 79 API calls 9304->9305 9306 10006225 9305->9306 9314 10006058 9306->9314 9309 10006645 9310 100037f8 _LocaleUpdate::_LocaleUpdate 79 API calls 9309->9310 9311 10006658 9310->9311 9373 100062a0 9311->9373 9315 10006079 GetStringTypeW 9314->9315 9319 100060a4 9314->9319 9316 10006091 9315->9316 9317 10006099 GetLastError 9315->9317 9320 100060dd MultiByteToWideChar 9316->9320 9337 10006185 9316->9337 9317->9319 9318 1000618b 9342 100072b8 GetLocaleInfoA 9318->9342 9319->9316 9319->9318 9326 1000610a 9320->9326 9320->9337 9322 10001660 __atodbl_l 5 API calls 9324 10003662 9322->9324 9324->9309 9325 100061dc GetStringTypeA 9329 100061f7 9325->9329 9325->9337 9330 1000611f _memset __alloca_probe_16 9326->9330 9331 10004800 _malloc 69 API calls 9326->9331 9328 10006158 MultiByteToWideChar 9333 1000616e GetStringTypeW 9328->9333 9334 1000617f 9328->9334 9335 10001fce __setmbcp 69 API calls 9329->9335 9330->9328 9330->9337 9331->9330 9333->9334 9338 10005db3 9334->9338 9335->9337 9337->9322 9339 10005dbf 9338->9339 9341 10005dd0 9338->9341 9340 10001fce __setmbcp 69 API calls 9339->9340 9339->9341 9340->9341 9341->9337 9343 100072e6 9342->9343 9344 100072eb 9342->9344 9346 10001660 __atodbl_l 5 API calls 9343->9346 9345 100072a2 ___ansicp 92 API calls 9344->9345 9345->9343 9347 100061af 9346->9347 9347->9325 9347->9337 9348 10007301 9347->9348 9349 100073cb 9348->9349 9350 10007341 GetCPInfo 9348->9350 9353 10001660 __atodbl_l 5 API calls 9349->9353 9351 100073b6 MultiByteToWideChar 9350->9351 9352 10007358 9350->9352 9351->9349 9357 10007371 _strlen 9351->9357 9352->9351 9354 1000735e GetCPInfo 9352->9354 9355 100061d0 9353->9355 9354->9351 9356 1000736b 9354->9356 9355->9325 9355->9337 9356->9351 9356->9357 9358 10004800 _malloc 69 API calls 9357->9358 9361 100073a3 _memset __alloca_probe_16 9357->9361 9358->9361 9359 10007400 MultiByteToWideChar 9360 10007418 9359->9360 9370 10007437 9359->9370 9362 1000743c 9360->9362 9363 1000741f WideCharToMultiByte 9360->9363 9361->9349 9361->9359 9365 10007447 WideCharToMultiByte 9362->9365 9366 1000745b 9362->9366 9363->9370 9364 10005db3 __freea 69 API calls 9364->9349 9365->9366 9365->9370 9367 100020a1 __calloc_crt 69 API calls 9366->9367 9368 10007463 9367->9368 9369 1000746c WideCharToMultiByte 9368->9369 9368->9370 9369->9370 9371 1000747e 9369->9371 9370->9364 9372 10001fce __setmbcp 69 API calls 9371->9372 9372->9370 9374 100062c1 LCMapStringW 9373->9374 9378 100062dc 9373->9378 9375 100062e4 GetLastError 9374->9375 9374->9378 9375->9378 9376 100064da 9380 100072b8 ___ansicp 93 API calls 9376->9380 9377 10006336 9379 1000634f MultiByteToWideChar 9377->9379 9401 100064d1 9377->9401 9378->9376 9378->9377 9387 1000637c 9379->9387 9379->9401 9382 10006502 9380->9382 9381 10001660 __atodbl_l 5 API calls 9383 10003682 9381->9383 9384 100065f6 LCMapStringA 9382->9384 9385 1000651b 9382->9385 9382->9401 9383->9302 9399 10006552 9384->9399 9388 10007301 ___convertcp 76 API calls 9385->9388 9386 100063cd MultiByteToWideChar 9389 100063e6 LCMapStringW 9386->9389 9417 100064c8 9386->9417 9390 10004800 _malloc 69 API calls 9387->9390 9395 10006395 __alloca_probe_16 9387->9395 9391 1000652d 9388->9391 9393 10006407 9389->9393 9389->9417 9390->9395 9396 10006537 LCMapStringA 9391->9396 9391->9401 9392 10005db3 __freea 69 API calls 9392->9401 9397 10006410 9393->9397 9405 10006439 9393->9405 9394 10001fce __setmbcp 69 API calls 9398 1000661d 9394->9398 9395->9386 9395->9401 9396->9399 9403 10006559 9396->9403 9402 10006422 LCMapStringW 9397->9402 9397->9417 9400 10001fce __setmbcp 69 API calls 9398->9400 9398->9401 9399->9394 9399->9398 9400->9401 9401->9381 9402->9417 9407 1000656a _memset __alloca_probe_16 9403->9407 9408 10004800 _malloc 69 API calls 9403->9408 9404 10006488 LCMapStringW 9409 100064a0 WideCharToMultiByte 9404->9409 9410 100064c2 9404->9410 9406 10004800 _malloc 69 API calls 9405->9406 9411 10006454 __alloca_probe_16 9405->9411 9406->9411 9407->9399 9412 100065a8 LCMapStringA 9407->9412 9408->9407 9409->9410 9413 10005db3 __freea 69 API calls 9410->9413 9411->9404 9411->9417 9414 100065c4 9412->9414 9415 100065c8 9412->9415 9413->9417 9419 10005db3 __freea 69 API calls 9414->9419 9418 10007301 ___convertcp 76 API calls 9415->9418 9417->9392 9418->9414 9419->9399 9420->9198 9422 10001cb0 __setmbcp 9421->9422 9423 10001db2 __setmbcp 9422->9423 9424 10001cc8 9422->9424 9425 10001fce __setmbcp 69 API calls 9422->9425 9423->8750 9426 10001cd6 9424->9426 9427 10001fce __setmbcp 69 API calls 9424->9427 9425->9424 9428 10001ce4 9426->9428 9430 10001fce __setmbcp 69 API calls 9426->9430 9427->9426 9429 10001cf2 9428->9429 9431 10001fce __setmbcp 69 API calls 9428->9431 9432 10001d00 9429->9432 9433 10001fce __setmbcp 69 API calls 9429->9433 9430->9428 9431->9429 9434 10001d0e 9432->9434 9435 10001fce __setmbcp 69 API calls 9432->9435 9433->9432 9436 10001d1c 9434->9436 9438 10001fce __setmbcp 69 API calls 9434->9438 9435->9434 9437 10001d2d 9436->9437 9439 10001fce __setmbcp 69 API calls 9436->9439 9440 100031d6 __lock 69 API calls 9437->9440 9438->9436 9439->9437 9441 10001d35 9440->9441 9442 10001d41 InterlockedDecrement 9441->9442 9443 10001d5a 9441->9443 9442->9443 9444 10001d4c 9442->9444 9457 10001dbe 9443->9457 9444->9443 9447 10001fce __setmbcp 69 API calls 9444->9447 9447->9443 9448 100031d6 __lock 69 API calls 9449 10001d6e 9448->9449 9450 10001d9f 9449->9450 9451 100033e1 ___removelocaleref 8 API calls 9449->9451 9460 10001dca 9450->9460 9455 10001d83 9451->9455 9454 10001fce __setmbcp 69 API calls 9454->9423 9455->9450 9456 10003209 ___freetlocinfo 69 API calls 9455->9456 9456->9450 9463 100030fc LeaveCriticalSection 9457->9463 9459 10001d67 9459->9448 9464 100030fc LeaveCriticalSection 9460->9464 9462 10001dac 9462->9454 9463->9459 9464->9462 9467 100027ed 9465->9467 9469 1000285a 9467->9469 9471 1000566e 9467->9471 9468 10002958 9468->8783 9468->8786 9469->9468 9470 1000566e 79 API calls _parse_cmdline 9469->9470 9470->9469 9474 1000561b 9471->9474 9475 100037f8 _LocaleUpdate::_LocaleUpdate 79 API calls 9474->9475 9476 1000562e 9475->9476 9476->9467 9478 10005088 9477->9478 9479 100019c3 __encode_pointer 7 API calls 9478->9479 9480 100050a0 9478->9480 9479->9478 9480->8790 9484 1000502f 9481->9484 9483 10005078 9483->8792 9485 1000503b __setmbcp 9484->9485 9492 100021d7 9485->9492 9491 1000505c __setmbcp 9491->9483 9493 100031d6 __lock 69 API calls 9492->9493 9494 100021de 9493->9494 9495 10004f44 9494->9495 9496 10001a3e __decode_pointer 7 API calls 9495->9496 9497 10004f58 9496->9497 9498 10001a3e __decode_pointer 7 API calls 9497->9498 9499 10004f68 9498->9499 9507 10004feb 9499->9507 9515 100069f5 9499->9515 9501 10004f86 9504 10004faa 9501->9504 9511 10004fd2 9501->9511 9528 100020ed 9501->9528 9502 100019c3 __encode_pointer 7 API calls 9503 10004fe0 9502->9503 9505 100019c3 __encode_pointer 7 API calls 9503->9505 9504->9507 9508 100020ed __realloc_crt 75 API calls 9504->9508 9509 10004fc0 9504->9509 9505->9507 9512 10005065 9507->9512 9508->9509 9509->9507 9510 100019c3 __encode_pointer 7 API calls 9509->9510 9510->9511 9511->9502 9577 100021e0 9512->9577 9516 10006a01 __setmbcp 9515->9516 9517 10006a11 9516->9517 9518 10006a2e 9516->9518 9520 10003cda __setmbcp 69 API calls 9517->9520 9519 10006a6f HeapSize 9518->9519 9521 100031d6 __lock 69 API calls 9518->9521 9524 10006a26 __setmbcp 9519->9524 9522 10006a16 9520->9522 9525 10006a3e ___sbh_find_block 9521->9525 9523 10004f1e _strcpy_s 7 API calls 9522->9523 9523->9524 9524->9501 9533 10006a8f 9525->9533 9530 100020f6 9528->9530 9531 10002135 9530->9531 9532 10002116 Sleep 9530->9532 9537 100049e8 9530->9537 9531->9504 9532->9530 9536 100030fc LeaveCriticalSection 9533->9536 9535 10006a6a 9535->9519 9535->9524 9536->9535 9538 100049f4 __setmbcp 9537->9538 9539 10004a09 9538->9539 9540 100049fb 9538->9540 9541 10004a10 9539->9541 9542 10004a1c 9539->9542 9543 10004800 _malloc 69 API calls 9540->9543 9544 10001fce __setmbcp 69 API calls 9541->9544 9549 10004b8e 9542->9549 9571 10004a29 ___sbh_resize_block _realloc ___sbh_find_block 9542->9571 9558 10004a03 _realloc __setmbcp 9543->9558 9544->9558 9545 10004bc1 9546 100054f5 __calloc_impl 7 API calls 9545->9546 9550 10004bc7 9546->9550 9547 100031d6 __lock 69 API calls 9547->9571 9548 10004b93 HeapReAlloc 9548->9549 9548->9558 9549->9545 9549->9548 9551 10004be5 9549->9551 9553 100054f5 __calloc_impl 7 API calls 9549->9553 9555 10004bdb 9549->9555 9552 10003cda __setmbcp 69 API calls 9550->9552 9554 10003cda __setmbcp 69 API calls 9551->9554 9551->9558 9552->9558 9553->9549 9556 10004bee GetLastError 9554->9556 9559 10003cda __setmbcp 69 API calls 9555->9559 9556->9558 9558->9530 9560 10004b5c 9559->9560 9560->9558 9562 10004b61 GetLastError 9560->9562 9561 10004ab4 HeapAlloc 9561->9571 9562->9558 9563 10004b09 HeapReAlloc 9563->9571 9564 100044cc ___sbh_alloc_block 5 API calls 9564->9571 9565 10004b74 9565->9558 9567 10003cda __setmbcp 69 API calls 9565->9567 9566 100054f5 __calloc_impl 7 API calls 9566->9571 9569 10004b81 9567->9569 9568 10004b57 9570 10003cda __setmbcp 69 API calls 9568->9570 9569->9556 9569->9558 9570->9560 9571->9545 9571->9547 9571->9558 9571->9561 9571->9563 9571->9564 9571->9565 9571->9566 9571->9568 9572 10003d1d VirtualFree VirtualFree HeapFree __VEC_memcpy ___sbh_free_block 9571->9572 9573 10004b2c 9571->9573 9572->9571 9576 100030fc LeaveCriticalSection 9573->9576 9575 10004b33 9575->9571 9576->9575 9580 100030fc LeaveCriticalSection 9577->9580 9579 100021e7 9579->9491 9580->9579 9582 100022bb __setmbcp 9581->9582 9583 100031d6 __lock 69 API calls 9582->9583 9584 100022c2 9583->9584 9586 10001a3e __decode_pointer 7 API calls 9584->9586 9590 1000237b __initterm 9584->9590 9588 100022f9 9586->9588 9588->9590 9592 10001a3e __decode_pointer 7 API calls 9588->9592 9589 100023c3 __setmbcp 9589->8800 9598 100023c6 9590->9598 9597 1000230e 9592->9597 9593 100023ba 9594 100021bf _doexit 3 API calls 9593->9594 9594->9589 9595 10001a3e 7 API calls __decode_pointer 9595->9597 9596 10001a35 7 API calls _doexit 9596->9597 9597->9590 9597->9595 9597->9596 9599 100023a7 9598->9599 9600 100023cc 9598->9600 9599->9589 9602 100030fc LeaveCriticalSection 9599->9602 9603 100030fc LeaveCriticalSection 9600->9603 9602->9593 9603->9599 9605 100048d6 __setmbcp 9604->9605 9606 100048ee 9605->9606 9615 1000490d _memset 9605->9615 9607 10003cda __setmbcp 68 API calls 9606->9607 9608 100048f3 9607->9608 9609 10004f1e _strcpy_s 7 API calls 9608->9609 9611 10004903 __setmbcp 9609->9611 9610 1000497f RtlAllocateHeap 9610->9615 9611->8808 9612 100054f5 __calloc_impl 7 API calls 9612->9615 9613 100031d6 __lock 68 API calls 9613->9615 9614 100044cc ___sbh_alloc_block 5 API calls 9614->9615 9615->9610 9615->9611 9615->9612 9615->9613 9615->9614 9617 100049c6 9615->9617 9620 100030fc LeaveCriticalSection 9617->9620 9619 100049cd 9619->9615 9620->9619 9621->8826 9628 100030fc LeaveCriticalSection 9622->9628 9624 10001bc1 9624->8836 9629 100030fc LeaveCriticalSection 9625->9629 9627 10001c0f 9627->8841 9628->9624 9629->9627 9631 10003ffe 9630->9631 9632 10003d5c 9630->9632 9631->8852 9632->9631 9633 10003f48 VirtualFree 9632->9633 9634 10003fac 9633->9634 9634->9631 9635 10003fbb VirtualFree HeapFree 9634->9635 9640 10006690 9635->9640 9644 100030fc LeaveCriticalSection 9637->9644 9639 1000202b 9639->8844 9641 100066a8 9640->9641 9642 100066cf __VEC_memcpy 9641->9642 9643 100066d7 9641->9643 9642->9643 9643->9631 9644->9639 9985 477658 __vbaChkstk __vbaOnError 9991 47782c __vbaChkstk __vbaStrCopy __vbaStrCopy __vbaOnError 9985->9991 9987 4776bf __vbaVarMove 9988 47782c 40 API calls 9987->9988 9989 4776ea 15 API calls 9988->9989 9990 477809 __vbaFreeVar __vbaFreeVar 9989->9990 9998 4779de __vbaChkstk __vbaStrCopy __vbaOnError __vbaObjIs 9991->9998 9993 47788d __vbaObjSet __vbaForEachCollAd 9994 477924 9993->9994 9995 4778ac 9 API calls 9994->9995 9996 47792a #520 __vbaStrVarMove __vbaStrMove __vbaFreeVar __vbaExitProc 9994->9996 9995->9996 9997 477999 6 API calls 9996->9997 9997->9987 9999 477a57 __vbaNew __vbaObjSet 9998->9999 10000 477a73 __vbaOnError 9998->10000 9999->10000 10001 477aad 10000->10001 10002 477ade 10001->10002 10003 477abe __vbaHresultCheckObj 10001->10003 10004 477ae5 __vbaObjVar __vbaObjSetAddref __vbaFreeVar 10002->10004 10003->10004 10005 477bf4 __vbaExitProc 10004->10005 10006 477c25 __vbaFreeObj __vbaFreeStr 10005->10006 10006->9993 7722 10001120 sqlite3_prepare16_v2 7783 471ce0 __vbaChkstk 7784 471d29 __vbaOnError __vbaStrCopy 7783->7784 7960 474d56 __vbaChkstk __vbaOnError __vbaLenBstr 7784->7960 7786 471d5b __vbaStrMove __vbaStrCopy __vbaStrMove 7988 4785bc __vbaChkstk __vbaLenBstr 7786->7988 7788 471d9a 10 API calls 7789 4729e7 __vbaStrCopy 7788->7789 7790 471e97 7788->7790 7791 474d56 124 API calls 7789->7791 7792 471ea4 __vbaNew2 7790->7792 7793 471ebd 7790->7793 7794 472a04 __vbaStrMove __vbaStrCopy __vbaStrMove 7791->7794 7792->7793 7799 471f20 7793->7799 7800 471f00 __vbaHresultCheckObj 7793->7800 7795 4785bc 21 API calls 7794->7795 7796 472a43 6 API calls 7795->7796 7797 472ade __vbaStrCopy 7796->7797 7798 47308d __vbaStrCopy 7796->7798 7803 474d56 124 API calls 7797->7803 7802 474d56 124 API calls 7798->7802 7801 471f27 __vbaVarSetObj __vbaVarLateMemCallLd __vbaVarZero __vbaForEachVar 7799->7801 7800->7801 7880 4725c0 7801->7880 7804 4730aa __vbaStrMove __vbaStrCopy __vbaStrMove 7802->7804 7805 472afb __vbaStrMove __vbaStrCopy __vbaStrMove 7803->7805 7808 4785bc 21 API calls 7804->7808 7809 4785bc 21 API calls 7805->7809 7806 4729a4 __vbaCastObj __vbaObjSet #529 7806->7789 7807 471fae __vbaStrCopy 7810 474d56 124 API calls 7807->7810 7811 4730f2 #666 __vbaStrCopy 7808->7811 7812 472b3a __vbaStrMove 7809->7812 7813 471fcb __vbaStrMove __vbaStrCopy __vbaStrMove 7810->7813 7814 474d56 124 API calls 7811->7814 7815 472b63 7812->7815 7816 472b4a __vbaNew2 7812->7816 7817 4785bc 21 API calls 7813->7817 7818 47312b __vbaStrMove __vbaStrCopy __vbaStrMove 7814->7818 7819 472b6c __vbaStrMove 7815->7819 7816->7819 7820 47200a 7 API calls 7817->7820 7821 4785bc 21 API calls 7818->7821 7824 472bae 7819->7824 7822 4720c3 __vbaStrCopy 7820->7822 7820->7880 7823 473173 7 API calls 7821->7823 7828 474d56 124 API calls 7822->7828 7829 473265 __vbaStrCat __vbaStrMove __vbaStrCopy 7823->7829 7830 47353c __vbaStrCopy 7823->7830 7826 472bdf 7824->7826 7827 472bbf __vbaHresultCheckObj 7824->7827 7825 4726ce __vbaNew2 7825->7880 7832 472be6 __vbaVarSetObj __vbaFreeStrList __vbaVarLateMemCallLd __vbaVarZero __vbaForEachVar 7826->7832 7827->7832 7833 4720e0 __vbaStrMove __vbaStrCopy __vbaStrMove 7828->7833 7834 474d56 124 API calls 7829->7834 7831 474d56 124 API calls 7830->7831 7835 473559 __vbaStrMove __vbaStrCopy __vbaStrMove 7831->7835 7836 473080 7832->7836 7837 4785bc 21 API calls 7833->7837 7838 4732a3 __vbaStrMove __vbaStrCopy __vbaStrMove 7834->7838 7840 4785bc 21 API calls 7835->7840 7836->7798 7839 472c8f __vbaStrCopy 7836->7839 7841 472125 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy 7837->7841 7842 4785bc 21 API calls 7838->7842 7844 474d56 124 API calls 7839->7844 7843 4735a1 #666 __vbaStrCopy 7840->7843 7846 474d56 124 API calls 7841->7846 7847 4732eb #666 __vbaStrCopy 7842->7847 7848 474d56 124 API calls 7843->7848 7849 472cac __vbaStrMove __vbaStrCopy __vbaStrMove 7844->7849 7845 472727 __vbaHresultCheckObj 7850 47274e __vbaLenBstr __vbaFreeStr 7845->7850 7851 47217a __vbaStrMove __vbaStrCopy __vbaStrMove 7846->7851 7852 474d56 124 API calls 7847->7852 7853 4735da __vbaStrMove __vbaStrCopy __vbaStrMove 7848->7853 7854 4785bc 21 API calls 7849->7854 7855 472965 __vbaNextEachVar 7850->7855 7850->7880 7856 4785bc 21 API calls 7851->7856 7857 473324 __vbaStrMove __vbaStrCopy __vbaStrMove 7852->7857 7859 4785bc 21 API calls 7853->7859 7860 472ceb 7 API calls 7854->7860 7855->7880 7862 4721b9 __vbaStrMove 7856->7862 7858 4785bc 21 API calls 7857->7858 7864 47336c __vbaStrMove 7858->7864 7865 473622 7 API calls 7859->7865 7866 472da4 __vbaStrCopy 7860->7866 7867 47304e __vbaNextEachVar 7860->7867 7861 47278d __vbaNew2 7861->7880 7863 4721c9 __vbaNew2 7862->7863 7883 4721e2 7862->7883 7868 4721eb __vbaVarCat __vbaStrVarVal 7863->7868 7869 47337f __vbaNew2 7864->7869 7870 473398 7864->7870 7871 473714 __vbaStrCat __vbaStrMove __vbaStrCopy 7865->7871 7872 4739eb __vbaCastObj __vbaObjSet 7865->7872 7873 474d56 124 API calls 7866->7873 7867->7836 7868->7883 7874 4733a1 __vbaVarAdd __vbaStrVarVal 7869->7874 7870->7874 7875 474d56 124 API calls 7871->7875 7918 472385 12 API calls 7872->7918 7876 472dc1 __vbaStrMove __vbaStrCopy __vbaStrMove 7873->7876 7885 473416 7874->7885 7878 473752 __vbaStrMove __vbaStrCopy __vbaStrMove 7875->7878 7879 4785bc 21 API calls 7876->7879 7886 4785bc 21 API calls 7878->7886 7887 472e06 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy 7879->7887 7880->7806 7880->7807 7880->7825 7880->7845 7880->7850 7880->7855 7880->7861 7881 4727e6 __vbaHresultCheckObj 7880->7881 7882 47280d __vbaStrCat __vbaStrMove __vbaStrCopy __vbaStrMove 7880->7882 7897 47287f __vbaHresultCheckObj 7880->7897 7902 4728a6 __vbaFreeStrList 7880->7902 7914 4728e9 __vbaNew2 7880->7914 7926 47293e __vbaHresultCheckObj 7880->7926 7951 476bf2 3 API calls 7880->7951 7954 4725e8 __vbaNew2 7880->7954 7955 472625 __vbaSetSystemError 7880->7955 7958 472680 __vbaHresultCheckObj 7880->7958 7959 4726a7 __vbaFreeStrList 7880->7959 7881->7882 7882->7880 7883->7868 7884 472265 __vbaHresultCheckObj 7883->7884 7888 47228c __vbaFreeStrList __vbaFreeVarList __vbaCastObj __vbaObjSet __vbaStrCopy 7883->7888 7884->7888 7889 473447 7885->7889 7890 473427 __vbaHresultCheckObj 7885->7890 7891 47379a #666 __vbaStrCopy 7886->7891 7892 474d56 124 API calls 7887->7892 7893 474d56 124 API calls 7888->7893 7894 47344e __vbaFreeStrList __vbaFreeVarList __vbaStrCopy __vbaStrCopy 7889->7894 7890->7894 7895 474d56 124 API calls 7891->7895 7896 472e5b __vbaStrMove __vbaStrCopy __vbaStrMove 7892->7896 7898 472300 __vbaStrMove __vbaStrCopy __vbaStrMove 7893->7898 7904 4734f4 7894->7904 7899 4737d3 __vbaStrMove __vbaStrCopy __vbaStrMove 7895->7899 7900 4785bc 21 API calls 7896->7900 7897->7902 7903 4785bc 21 API calls 7898->7903 7905 4785bc 21 API calls 7899->7905 7901 472e9a __vbaStrMove 7900->7901 7907 472eaa __vbaNew2 7901->7907 7932 472ec3 7901->7932 7902->7855 7902->7880 7908 47233f __vbaStrMove __vbaFreeStrList 7903->7908 7909 473523 7904->7909 7910 473503 __vbaHresultCheckObj 7904->7910 7906 47381b __vbaStrMove 7905->7906 7911 473847 7906->7911 7912 47382e __vbaNew2 7906->7912 7913 472ecc __vbaVarAdd __vbaStrVarVal 7907->7913 7995 476776 __vbaChkstk __vbaStrCopy __vbaOnError __vbaStrCmp 7908->7995 7916 47352a __vbaFreeStrList 7909->7916 7910->7916 7917 473850 __vbaVarAdd __vbaStrVarVal 7911->7917 7912->7917 7913->7932 7914->7880 7916->7830 7920 4738c5 7917->7920 7923 4738f6 7920->7923 7924 4738d6 __vbaHresultCheckObj 7920->7924 7921 472f46 __vbaHresultCheckObj 7925 472f6d 6 API calls 7921->7925 7922 472375 7922->7918 7927 4723b2 __vbaStrCat __vbaStrMove 7922->7927 8019 476ab6 __vbaChkstk __vbaStrCopy #644 7922->8019 7928 4738fd __vbaFreeStrList __vbaFreeVarList __vbaStrCopy __vbaStrCopy 7923->7928 7924->7928 7925->7932 7926->7855 8022 476b5c __vbaChkstk __vbaStrCopy #644 __vbaLenBstr 7927->8022 7931 4739a3 7928->7931 7930 4723dd __vbaFreeStr 7930->7918 7944 4723fa 7930->7944 7934 4739d2 7931->7934 7935 4739b2 __vbaHresultCheckObj 7931->7935 7932->7913 7932->7921 7932->7925 7933 473015 __vbaHresultCheckObj 7932->7933 7936 47303c __vbaFreeStrList 7932->7936 7933->7936 7938 4739d9 __vbaFreeStrList 7934->7938 7935->7938 7936->7867 7938->7872 7939 4724f8 __vbaStrCopy 7940 474d56 124 API calls 7939->7940 7942 472515 __vbaStrMove __vbaStrCopy __vbaStrMove 7940->7942 7941 472422 __vbaNew2 7941->7944 7943 4785bc 21 API calls 7942->7943 7945 472554 __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove 7943->7945 7944->7939 7944->7941 7946 47245f __vbaSetSystemError 7944->7946 7952 4724ba __vbaHresultCheckObj 7944->7952 7953 4724e1 __vbaFreeStrList 7944->7953 8027 476bf2 __vbaChkstk 7944->8027 7948 476b5c 8 API calls 7945->7948 8030 476c42 __vbaChkstk __vbaOnError 7946->8030 7950 4725a3 __vbaFreeStr 7948->7950 7950->7880 7950->7918 7951->7880 7952->7953 7953->7944 7954->7880 7956 476c42 17 API calls 7955->7956 7957 47263b __vbaStrMove __vbaStrCat __vbaStrMove 7956->7957 7957->7880 7958->7959 7959->7880 7964 474dd3 7960->7964 7961 474df4 9 API calls 7961->7964 7962 474ea9 7962->7786 7963 474ef6 17 API calls 7965 4750bb 7963->7965 7964->7961 7964->7962 7964->7963 7966 4750ec 7965->7966 7967 4750cc __vbaHresultCheckObj 7965->7967 7968 4750f3 __vbaFreeObj __vbaLenBstr #709 7966->7968 7967->7968 7969 475137 #618 __vbaStrMove 7968->7969 7970 4751b0 __vbaErrorOverflow 7968->7970 7971 4751b5 7969->7971 7972 4751b5 18 API calls 7970->7972 7973 475155 __vbaFreeStr 7971->7973 7974 4752e6 __vbaStrCopy 7972->7974 7975 4755a5 #685 __vbaObjSet 7972->7975 7976 47518f __vbaFreeVar 7973->7976 7977 474d56 21 API calls 7974->7977 7978 4755d9 7975->7978 7976->7786 7979 475303 __vbaStrMove __vbaStrCopy __vbaStrMove 7977->7979 7980 47560a 7978->7980 7981 4755ea __vbaHresultCheckObj 7978->7981 7982 4785bc 21 API calls 7979->7982 7984 475611 __vbaFreeObj 7980->7984 7981->7984 7983 475342 __vbaStrMove __vbaStrMove #716 __vbaVarZero __vbaFreeStrList 7982->7983 7985 4753af 31 API calls 7983->7985 7986 475682 __vbaFreeVar __vbaFreeStr __vbaFreeStr 7984->7986 7985->7985 7987 475597 7985->7987 7986->7786 7987->7975 7989 478616 7988->7989 7990 478622 6 API calls 7989->7990 7991 47871b __vbaStrCopy 7989->7991 7992 478777 __vbaErrorOverflow 7990->7992 7993 478692 10 API calls 7990->7993 7994 47875a __vbaFreeStr 7991->7994 7993->7991 7994->7788 7996 4767ff #619 __vbaVarTstNe __vbaFreeVar 7995->7996 7997 4767ea __vbaStrCopy 7995->7997 7998 476851 __vbaStrCat __vbaStrMove 7996->7998 7999 47686f 7996->7999 7997->7996 7998->7999 8000 476883 __vbaStrCat __vbaStrMove __vbaStrToAnsi 7999->8000 8001 476968 7999->8001 8046 4602f4 8000->8046 8003 47697c __vbaStrCat __vbaStrMove __vbaStrToAnsi 8001->8003 8004 476a5a __vbaFreeStr 8001->8004 8006 4602f4 8003->8006 8004->7922 8009 4769aa __vbaSetSystemError __vbaFreeStrList 8006->8009 8009->8004 8010 4769dc #685 __vbaObjSet 8009->8010 8014 476a04 8010->8014 8016 476a0f __vbaHresultCheckObj 8014->8016 8017 476a29 8014->8017 8018 476a30 __vbaFreeStrList __vbaFreeObj 8016->8018 8017->8018 8018->8004 8048 4603a0 _sqlite3_stdcall_open16 8019->8048 8021 476b04 __vbaSetSystemError __vbaFreeStr 8021->7922 8023 476bb1 8022->8023 8024 476bed __vbaErrorOverflow 8022->8024 8050 4605a8 _sqlite3_stdcall_prepare16_v2 8023->8050 8026 476bbd __vbaSetSystemError __vbaFreeStr 8026->7930 8052 4605f8 _sqlite3_stdcall_step 8027->8052 8054 460804 8030->8054 8047 4602fd 8046->8047 8049 4603a9 8048->8049 8051 4605b1 8050->8051 8053 460601 8052->8053 8055 46080d 8054->8055 8058 46b36c __vbaChkstk 8059 46b3b6 8058->8059 8060 46b3c1 __vbaSetSystemError 8059->8060 8064 460338 8060->8064 8065 460341 8064->8065 8570 10001a35 8573 100019c3 TlsGetValue 8570->8573 8574 100019db 8573->8574 8575 100019fc GetModuleHandleW 8573->8575 8574->8575 8578 100019e5 TlsGetValue 8574->8578 8576 10001a17 GetProcAddress 8575->8576 8577 10001a0c 8575->8577 8584 100019f4 8576->8584 8585 1000213b 8577->8585 8583 100019f0 8578->8583 8581 10001a27 RtlEncodePointer 8582 10001a2f 8581->8582 8583->8575 8583->8584 8584->8581 8584->8582 8586 10002146 Sleep GetModuleHandleW 8585->8586 8587 10002164 8586->8587 8588 10001a12 8586->8588 8587->8586 8587->8588 8588->8576 8588->8582 9645 46b3fc __vbaChkstk 9646 46b44f __vbaOnError 9645->9646 9647 46c681 9646->9647 9648 46b47a 9646->9648 9651 46c899 __vbaErrorOverflow __vbaChkstk 9647->9651 9652 46c670 9647->9652 9649 46b4a5 9648->9649 9650 46b48a __vbaNew2 9648->9650 9657 46b503 9649->9657 9658 46b4e3 __vbaHresultCheckObj 9649->9658 9650->9649 9655 46c8ef __vbaOnError 9651->9655 9653 46c6b0 __vbaNew2 9652->9653 9654 46c6cb 9652->9654 9653->9654 9662 46c729 9654->9662 9663 46c709 __vbaHresultCheckObj 9654->9663 9656 46c916 9655->9656 9659 46b50a __vbaLenBstr __vbaFreeStr 9657->9659 9658->9659 9660 46b795 9659->9660 9661 46b539 9659->9661 9665 46b7c7 9660->9665 9666 46b7ac __vbaNew2 9660->9666 9667 46b564 9661->9667 9668 46b549 __vbaNew2 9661->9668 9664 46c730 __vbaChkstk 9662->9664 9663->9664 9669 46c76d 9664->9669 9675 46b825 9665->9675 9676 46b805 __vbaHresultCheckObj 9665->9676 9666->9665 9672 46b5c2 9667->9672 9673 46b5a2 __vbaHresultCheckObj 9667->9673 9668->9667 9670 46c79e 9669->9670 9671 46c77e __vbaHresultCheckObj 9669->9671 9674 46c7a5 __vbaStrMove 9670->9674 9671->9674 9677 46b5c9 __vbaStrCopy 9672->9677 9673->9677 9681 46c7d2 9674->9681 9678 46b82c __vbaLenBstr __vbaFreeStr 9675->9678 9676->9678 9680 474d56 124 API calls 9677->9680 9679 46b85b 9678->9679 9750 46bab7 9678->9750 9682 46b886 9679->9682 9683 46b86b __vbaNew2 9679->9683 9684 46b5df __vbaStrMove __vbaStrCopy __vbaStrMove 9680->9684 9685 46c801 9681->9685 9686 46c7e1 __vbaHresultCheckObj 9681->9686 9695 46b8e4 9682->9695 9696 46b8c4 __vbaHresultCheckObj 9682->9696 9683->9682 9689 4785bc 21 API calls 9684->9689 9690 46c808 __vbaFreeStr __vbaFreeObj 9685->9690 9686->9690 9687 46bace __vbaNew2 9688 46bae9 9687->9688 9693 46bb47 9688->9693 9694 46bb27 __vbaHresultCheckObj 9688->9694 9691 46b61e __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrMove __vbaStrMove 9689->9691 9692 46c879 9690->9692 9697 46b696 9691->9697 9698 46bb4e __vbaLenBstr __vbaFreeStr 9693->9698 9694->9698 9699 46b8eb __vbaStrCopy 9695->9699 9696->9699 9700 46b6c5 9697->9700 9701 46b6a5 __vbaHresultCheckObj 9697->9701 9702 46bb7d 9698->9702 9776 46bdd9 9698->9776 9703 474d56 124 API calls 9699->9703 9704 46b6cc __vbaFreeStrList 9700->9704 9701->9704 9705 46bb8d __vbaNew2 9702->9705 9706 46bba8 9702->9706 9707 46b901 __vbaStrMove __vbaStrCopy __vbaStrMove 9703->9707 9704->9660 9710 46b710 9704->9710 9705->9706 9717 46bc06 9706->9717 9718 46bbe6 __vbaHresultCheckObj 9706->9718 9713 4785bc 21 API calls 9707->9713 9708 46bdf0 __vbaNew2 9709 46be0b 9708->9709 9715 46be69 9709->9715 9716 46be49 __vbaHresultCheckObj 9709->9716 9711 46b720 __vbaNew2 9710->9711 9712 46b73b 9710->9712 9711->9712 9712->9660 9721 46b775 __vbaHresultCheckObj 9712->9721 9714 46b940 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrMove __vbaStrMove 9713->9714 9719 46b9b8 9714->9719 9720 46be70 __vbaLenBstr __vbaFreeStr 9715->9720 9716->9720 9722 46bc0d __vbaStrCopy 9717->9722 9718->9722 9723 46b9e7 9719->9723 9724 46b9c7 __vbaHresultCheckObj 9719->9724 9726 46c102 __vbaStrCopy 9720->9726 9727 46be9f 9720->9727 9721->9660 9728 474d56 124 API calls 9722->9728 9725 46b9ee __vbaFreeStrList 9723->9725 9724->9725 9730 46ba32 9725->9730 9725->9750 9729 474d56 124 API calls 9726->9729 9731 46beaf __vbaNew2 9727->9731 9732 46beca 9727->9732 9733 46bc23 __vbaStrMove __vbaStrCopy __vbaStrMove 9728->9733 9734 46c11f __vbaStrMove __vbaStrCopy __vbaStrMove 9729->9734 9735 46ba42 __vbaNew2 9730->9735 9736 46ba5d 9730->9736 9731->9732 9744 46bf28 9732->9744 9745 46bf08 __vbaHresultCheckObj 9732->9745 9737 4785bc 21 API calls 9733->9737 9738 4785bc 21 API calls 9734->9738 9735->9736 9736->9750 9751 46ba97 __vbaHresultCheckObj 9736->9751 9739 46bc62 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrMove __vbaStrMove 9737->9739 9740 46c15e 8 API calls 9738->9740 9741 46bcda 9739->9741 9742 46c205 __vbaStrCopy 9740->9742 9743 46c3b9 __vbaStrCopy 9740->9743 9746 46bd09 9741->9746 9747 46bce9 __vbaHresultCheckObj 9741->9747 9749 474d56 124 API calls 9742->9749 9748 474d56 124 API calls 9743->9748 9752 46bf2f __vbaStrCopy 9744->9752 9745->9752 9753 46bd10 __vbaFreeStrList 9746->9753 9747->9753 9754 46c3d6 __vbaStrMove __vbaStrCopy __vbaStrMove 9748->9754 9755 46c222 __vbaStrMove __vbaStrCopy __vbaStrMove 9749->9755 9750->9687 9750->9688 9751->9750 9756 474d56 124 API calls 9752->9756 9758 46bd54 9753->9758 9753->9776 9759 4785bc 21 API calls 9754->9759 9760 4785bc 21 API calls 9755->9760 9757 46bf45 __vbaStrMove __vbaStrCopy __vbaStrMove 9756->9757 9761 4785bc 21 API calls 9757->9761 9762 46bd64 __vbaNew2 9758->9762 9763 46bd7f 9758->9763 9764 46c415 8 API calls 9759->9764 9765 46c261 __vbaStrMove __vbaStrCopy 9760->9765 9766 46bf84 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrMove __vbaStrMove 9761->9766 9762->9763 9763->9776 9777 46bdb9 __vbaHresultCheckObj 9763->9777 9764->9652 9767 46c4bc __vbaStrCopy 9764->9767 9768 474d56 124 API calls 9765->9768 9771 46bffc 9766->9771 9769 474d56 124 API calls 9767->9769 9770 46c281 __vbaStrMove __vbaStrCopy __vbaStrMove 9768->9770 9772 46c4d9 __vbaStrMove __vbaStrCopy __vbaStrMove 9769->9772 9773 4785bc 21 API calls 9770->9773 9774 46c02b 9771->9774 9775 46c00b __vbaHresultCheckObj 9771->9775 9778 4785bc 21 API calls 9772->9778 9779 46c2c0 6 API calls 9773->9779 9780 46c032 __vbaFreeStrList 9774->9780 9775->9780 9776->9708 9776->9709 9777->9776 9781 46c518 __vbaStrMove __vbaStrCopy 9778->9781 9784 46c341 9779->9784 9780->9726 9782 46c076 9780->9782 9783 474d56 124 API calls 9781->9783 9787 46c086 __vbaNew2 9782->9787 9788 46c0a1 9782->9788 9789 46c538 __vbaStrMove __vbaStrCopy __vbaStrMove 9783->9789 9785 46c370 9784->9785 9786 46c350 __vbaHresultCheckObj 9784->9786 9790 46c377 __vbaFreeStrList 9785->9790 9786->9790 9787->9788 9794 46c0fb 9788->9794 9795 46c0db __vbaHresultCheckObj 9788->9795 9791 4785bc 21 API calls 9789->9791 9790->9743 9792 46c577 6 API calls 9791->9792 9793 46c5f8 9792->9793 9796 46c627 9793->9796 9797 46c607 __vbaHresultCheckObj 9793->9797 9794->9726 9795->9726 9798 46c62e __vbaFreeStrList 9796->9798 9797->9798 9798->9652 7705 474207 __vbaChkstk __vbaOnError __vbaStrCopy 7706 474294 7705->7706 7707 47427c __vbaNew2 7705->7707 7708 4742d4 7706->7708 7709 4742bd __vbaHresultCheckObj 7706->7709 7707->7706 7710 4742e9 __vbaSetSystemError 7708->7710 7709->7708 7711 474307 #525 __vbaStrMove __vbaStrToAnsi 7710->7711 7712 4743be __vbaFreeStr 7710->7712 7719 460a90 7711->7719 7720 460a99 7719->7720 9799 47049c __vbaChkstk 9800 4704e5 __vbaAryConstruct2 __vbaOnError __vbaStrCopy 9799->9800 9801 474d56 124 API calls 9800->9801 9802 470527 __vbaStrMove __vbaStrCopy __vbaStrMove 9801->9802 9803 4785bc 21 API calls 9802->9803 9804 47056c __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy 9803->9804 9805 474d56 124 API calls 9804->9805 9806 4705c1 __vbaStrMove __vbaStrCopy 9805->9806 9807 474d56 124 API calls 9806->9807 9808 4705e1 __vbaStrMove __vbaStrCopy __vbaStrMove 9807->9808 9809 4785bc 21 API calls 9808->9809 9810 470620 __vbaStrCopy __vbaStrMove 9809->9810 9811 470671 __vbaGenerateBoundsError 9810->9811 9812 470668 9810->9812 9813 47067c #667 __vbaStrMove 9811->9813 9812->9813 9814 4785bc 21 API calls 9813->9814 9815 4706a0 7 API calls 9814->9815 9816 474d56 124 API calls 9815->9816 9817 47072b __vbaStrMove __vbaStrCopy 9816->9817 9818 474d56 124 API calls 9817->9818 9819 47074b __vbaStrMove __vbaStrCopy __vbaStrMove 9818->9819 9820 4785bc 21 API calls 9819->9820 9821 47078a __vbaStrCopy __vbaStrMove 9820->9821 9822 4707d5 9821->9822 9823 4707de __vbaGenerateBoundsError 9821->9823 9824 4707e9 #667 __vbaStrMove 9822->9824 9823->9824 9825 4785bc 21 API calls 9824->9825 9826 47080d 7 API calls 9825->9826 9827 474d56 124 API calls 9826->9827 9828 470898 __vbaStrMove __vbaStrCopy 9827->9828 9829 474d56 124 API calls 9828->9829 9830 4708b8 __vbaStrMove __vbaStrCopy __vbaStrMove 9829->9830 9831 4785bc 21 API calls 9830->9831 9832 4708f7 __vbaStrCopy __vbaStrMove 9831->9832 9833 470942 9832->9833 9834 47094b __vbaGenerateBoundsError 9832->9834 9835 470956 #667 __vbaStrMove 9833->9835 9834->9835 9836 4785bc 21 API calls 9835->9836 9837 47097a 7 API calls 9836->9837 9838 474d56 124 API calls 9837->9838 9839 470a05 __vbaStrMove __vbaStrCopy 9838->9839 9840 474d56 124 API calls 9839->9840 9841 470a25 __vbaStrMove __vbaStrCopy __vbaStrMove 9840->9841 9842 4785bc 21 API calls 9841->9842 9843 470a64 __vbaStrCopy __vbaStrMove 9842->9843 9844 470aaf 9843->9844 9845 470ab8 __vbaGenerateBoundsError 9843->9845 9846 470ac3 #667 __vbaStrMove 9844->9846 9845->9846 9847 4785bc 21 API calls 9846->9847 9848 470ae7 7 API calls 9847->9848 9849 474d56 124 API calls 9848->9849 9850 470b72 __vbaStrMove __vbaStrCopy 9849->9850 9851 474d56 124 API calls 9850->9851 9852 470b92 __vbaStrMove __vbaStrCopy __vbaStrMove 9851->9852 9853 4785bc 21 API calls 9852->9853 9854 470bd1 __vbaStrCopy __vbaStrMove 9853->9854 9855 470c25 __vbaGenerateBoundsError 9854->9855 9856 470c1c 9854->9856 9857 470c30 #667 __vbaStrMove 9855->9857 9856->9857 9858 4785bc 21 API calls 9857->9858 9859 470c54 7 API calls 9858->9859 9860 474d56 124 API calls 9859->9860 9861 470cdf __vbaStrMove __vbaStrCopy 9860->9861 9862 474d56 124 API calls 9861->9862 9863 470cff __vbaStrMove __vbaStrCopy __vbaStrMove 9862->9863 9864 4785bc 21 API calls 9863->9864 9865 470d3e __vbaStrCopy __vbaStrMove 9864->9865 9866 470d92 __vbaGenerateBoundsError 9865->9866 9867 470d89 9865->9867 9868 470d9d #667 __vbaStrMove 9866->9868 9867->9868 9869 4785bc 21 API calls 9868->9869 9870 470dc1 7 API calls 9869->9870 9871 474d56 124 API calls 9870->9871 9872 470e4c __vbaStrMove __vbaStrCopy 9871->9872 9873 474d56 124 API calls 9872->9873 9874 470e6c __vbaStrMove __vbaStrCopy __vbaStrMove 9873->9874 9875 4785bc 21 API calls 9874->9875 9876 470eab __vbaStrCopy __vbaStrMove 9875->9876 9877 470ef6 9876->9877 9878 470eff __vbaGenerateBoundsError 9876->9878 9879 470f0a #667 __vbaStrMove 9877->9879 9878->9879 9880 4785bc 21 API calls 9879->9880 9881 470f2e 7 API calls 9880->9881 9882 474d56 124 API calls 9881->9882 9883 470fb9 __vbaStrMove __vbaStrCopy 9882->9883 9884 474d56 124 API calls 9883->9884 9885 470fd9 __vbaStrMove __vbaStrCopy __vbaStrMove 9884->9885 9886 4785bc 21 API calls 9885->9886 9887 471018 __vbaStrCopy __vbaStrMove 9886->9887 9888 471063 9887->9888 9889 47106c __vbaGenerateBoundsError 9887->9889 9890 471077 #667 __vbaStrMove 9888->9890 9889->9890 9891 4785bc 21 API calls 9890->9891 9892 47109b 7 API calls 9891->9892 9893 474d56 124 API calls 9892->9893 9894 471126 __vbaStrMove __vbaStrCopy 9893->9894 9895 474d56 124 API calls 9894->9895 9896 471146 __vbaStrMove __vbaStrCopy __vbaStrMove 9895->9896 9897 4785bc 21 API calls 9896->9897 9898 471185 __vbaStrCopy __vbaStrMove 9897->9898 9899 4711d0 9898->9899 9900 4711d9 __vbaGenerateBoundsError 9898->9900 9901 4711e4 #667 __vbaStrMove 9899->9901 9900->9901 9902 4785bc 21 API calls 9901->9902 9903 471208 7 API calls 9902->9903 9904 474d56 124 API calls 9903->9904 9905 471293 __vbaStrMove __vbaStrCopy 9904->9905 9906 474d56 124 API calls 9905->9906 9907 4712b3 __vbaStrMove __vbaStrCopy __vbaStrMove 9906->9907 9908 4785bc 21 API calls 9907->9908 9909 4712f2 #666 __vbaStrCopy __vbaStrMove 9908->9909 9910 4785bc 21 API calls 9909->9910 9911 47134a 9910->9911 9912 471376 __vbaGenerateBoundsError 9911->9912 9913 47136d 9911->9913 9914 471381 6 API calls 9912->9914 9913->9914 9915 471447 9914->9915 9916 471762 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 9915->9916 9919 471472 9915->9919 9920 47147b __vbaGenerateBoundsError 9915->9920 9917 4717e4 9916->9917 9918 4717c1 __vbaStrCopy 9916->9918 9923 4717f5 __vbaSetSystemError __vbaStrCopy 9917->9923 9966 474402 8 API calls 9918->9966 9921 471486 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 9919->9921 9920->9921 9924 4716ce 9921->9924 9925 4714eb #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 9921->9925 9927 474d56 124 API calls 9923->9927 9924->9916 9928 471549 #531 9925->9928 9929 471558 9925->9929 9926 4717dc __vbaFreeStr 9926->9917 9930 471817 __vbaStrMove __vbaStrCopy __vbaStrMove 9927->9930 9928->9929 9931 471572 9929->9931 9932 47157b __vbaGenerateBoundsError 9929->9932 9933 4785bc 21 API calls 9930->9933 9935 4715a2 __vbaGenerateBoundsError 9931->9935 9936 471599 9931->9936 9932->9931 9934 471856 8 API calls 9933->9934 9937 471ada __vbaAryDestruct __vbaFreeStr 9934->9937 9938 471909 9934->9938 9935->9936 9941 4715c0 9936->9941 9942 4715c9 __vbaGenerateBoundsError 9936->9942 9974 47495c 10 API calls 9938->9974 9944 4715d4 __vbaLenBstr #709 9941->9944 9942->9944 9943 471918 __vbaStrCopy 9945 474d56 124 API calls 9943->9945 9946 471625 8 API calls 9944->9946 9947 471b93 __vbaErrorOverflow __vbaChkstk 9944->9947 9948 471935 __vbaStrMove __vbaStrCopy __vbaStrMove 9945->9948 9946->9924 9949 4716d3 9946->9949 9952 471bdf __vbaOnError __vbaStrCopy __vbaStrCopy __vbaRecUniToAnsi 9947->9952 9953 4785bc 21 API calls 9948->9953 9950 4716f6 __vbaGenerateBoundsError 9949->9950 9951 4716ed 9949->9951 9950->9951 9951->9924 9959 47172f __vbaHresultCheckObj 9951->9959 9983 460adc 9952->9983 9955 471974 __vbaStrMove __vbaStrCopy 9953->9955 9957 474d56 124 API calls 9955->9957 9958 471994 __vbaStrMove __vbaStrCopy __vbaStrMove 9957->9958 9960 4785bc 21 API calls 9958->9960 9959->9924 9961 4719d3 6 API calls 9960->9961 9962 471a57 9961->9962 9963 471a86 9962->9963 9964 471a66 __vbaHresultCheckObj 9962->9964 9965 471a8d __vbaFreeStrList 9963->9965 9964->9965 9965->9937 9967 474d56 124 API calls 9966->9967 9968 4744bc __vbaStrMove 9967->9968 9969 474957 __vbaErrorOverflow 9968->9969 9970 474500 #632 __vbaStrCopy __vbaStrMove 9968->9970 9971 4785bc 21 API calls 9970->9971 9972 474546 47 API calls 9971->9972 9973 474919 __vbaFreeVar __vbaFreeObj __vbaFreeVar __vbaFreeStr __vbaFreeObj 9972->9973 9973->9926 9975 474b62 __vbaI2I4 9974->9975 9978 474be8 9975->9978 9977 474cdd #580 #532 9979 474d27 __vbaFreeStr __vbaFreeStr __vbaFreeObj 9977->9979 9978->9977 9980 474c54 __vbaStrVarMove __vbaStrMove __vbaFreeVar #579 9978->9980 9979->9943 9981 474c9d #580 #529 9980->9981 9982 474c8c 9980->9982 9981->9977 9982->9981 9984 460ae5 9983->9984 7723 10001160 sqlite3_step 7724 473b27 __vbaChkstk __vbaOnError __vbaObjSetAddref 7725 473b93 7724->7725 7726 473bc7 7725->7726 7727 473ba4 __vbaHresultCheckObj 7725->7727 7728 473bce __vbaI2I4 7726->7728 7727->7728 7729 473bea 7728->7729 7730 473c1e 7729->7730 7731 473bfb __vbaHresultCheckObj 7729->7731 7732 473c6f 7730->7732 7733 473c4c __vbaHresultCheckObj 7730->7733 7731->7730 7734 473cc0 7732->7734 7735 473c9d __vbaHresultCheckObj 7732->7735 7733->7732 7736 473cc7 __vbaI2I4 7734->7736 7735->7736 7737 473ce4 7736->7737 7738 473cf5 __vbaHresultCheckObj 7737->7738 7739 473d18 7737->7739 7738->7739 7740 473d6e 7739->7740 7741 473d4b __vbaHresultCheckObj 7739->7741 7742 4741fd 7740->7742 7743 473d8b __vbaFpI4 7740->7743 7741->7740 7745 474202 __vbaErrorOverflow 7742->7745 7744 473db8 7743->7744 7746 474174 __vbaObjSetAddref __vbaFileOpen __vbaPutOwner3 __vbaFileClose __vbaExitProc 7744->7746 7750 473df3 __vbaHresultCheckObj 7744->7750 7751 473e16 7744->7751 7748 474207 __vbaChkstk __vbaOnError __vbaStrCopy 7745->7748 7747 4741d5 __vbaFreeObj __vbaAryDestruct 7746->7747 7749 47427c __vbaNew2 7748->7749 7753 474294 7748->7753 7749->7753 7750->7751 7751->7742 7752 473e33 __vbaFpI4 7751->7752 7758 473e60 7752->7758 7754 4742d4 7753->7754 7755 4742bd __vbaHresultCheckObj 7753->7755 7757 4742e9 __vbaSetSystemError 7754->7757 7755->7754 7756 474165 7756->7746 7759 474307 #525 __vbaStrMove __vbaStrToAnsi 7757->7759 7760 4743be __vbaFreeStr 7757->7760 7758->7756 7764 473f01 7758->7764 7765 473ede __vbaHresultCheckObj 7758->7765 7761 460a90 7759->7761 7763 47433e __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 7761->7763 7763->7760 7766 474371 __vbaInStr 7763->7766 7764->7742 7769 473f3f __vbaFpI4 7764->7769 7765->7764 7767 47438e #616 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr 7766->7767 7768 4743fd __vbaErrorOverflow 7766->7768 7767->7760 7770 473ff1 __vbaUbound 7769->7770 7771 473f51 7769->7771 7770->7756 7772 474004 7770->7772 7773 473fc6 7771->7773 7774 473fa3 __vbaHresultCheckObj 7771->7774 7776 47408d 7772->7776 7777 47406a __vbaHresultCheckObj 7772->7777 7775 473fcd __vbaRedim 7773->7775 7774->7775 7775->7756 7778 474094 __vbaPowerR8 7776->7778 7777->7778 7779 4740c1 7778->7779 7780 4740c9 _adj_fdivr_m64 7778->7780 7779->7742 7781 4740e4 6 API calls 7779->7781 7780->7779 7781->7745 7782 47413c __vbaDerefAry1 __vbaFreeStr __vbaFreeVarList 7781->7782 7782->7756 8056 403528 #100 8057 403567 8056->8057 8086 48d3a5 __vbaChkstk __vbaOnError 8087 476776 31 API calls 8086->8087 8088 48d40a 8087->8088 8089 48d420 9 API calls 8088->8089 8090 476ab6 6 API calls 8088->8090 8092 48d43a 8090->8092 8092->8089 8093 476b5c 8 API calls 8092->8093 8223 48d470 8093->8223 8094 476bf2 3 API calls 8094->8223 8095 48e971 8312 476c1a __vbaChkstk 8095->8312 8097 48d4ba __vbaSetSystemError 8100 476c42 17 API calls 8097->8100 8101 48d4d0 __vbaVarMove 8100->8101 8226 4607b8 8101->8226 8122 48e187 __vbaSetSystemError 8122->8223 8123 48d7fe __vbaAryMove 8125 48eaa2 __vbaErrorOverflow 8123->8125 8123->8223 8127 48eaa7 __vbaChkstk __vbaStrCopy 8125->8127 8126 48e1af 6 API calls 8126->8223 8128 48eaf2 8127->8128 8129 48e25c __vbaNew2 8130 48e281 __vbaVarCat __vbaVarCat __vbaStrVarMove __vbaStrMove 8129->8130 8130->8223 8132 48e321 __vbaHresultCheckObj 8134 48e348 __vbaFreeStr __vbaFreeVarList __vbaStrCopy 8132->8134 8133 48d8bf __vbaUbound __vbaInStr 8135 48d93e __vbaUbound 8133->8135 8136 48d8f7 __vbaUbound 8133->8136 8137 474d56 124 API calls 8134->8137 8135->8125 8139 48d95b 8135->8139 8275 4774f6 __vbaChkstk __vbaStrCopy 8136->8275 8141 48e38e __vbaStrMove 8137->8141 8140 4774f6 14 API calls 8139->8140 8143 48d982 __vbaStrMove 8140->8143 8144 48e3bf 8141->8144 8145 48e3a4 __vbaNew2 8141->8145 8146 48d98c __vbaStrCmp __vbaVarCmpNe __vbaVarAnd __vbaBoolVarNull __vbaFreeVar 8143->8146 8147 48e3c9 __vbaStrCopy __vbaStrMove 8144->8147 8145->8147 8146->8223 8148 4785bc 21 API calls 8147->8148 8150 48e41e __vbaVarCat __vbaVarCat __vbaStrVarMove __vbaStrMove 8148->8150 8149 48da2f __vbaNew2 8151 48da54 __vbaVarCat __vbaVarCat __vbaStrVarMove __vbaStrMove 8149->8151 8152 48e498 8150->8152 8151->8223 8153 48e4a9 __vbaHresultCheckObj 8152->8153 8155 48e4d0 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy 8152->8155 8153->8155 8154 48daf4 __vbaHresultCheckObj 8156 48db1b __vbaFreeStr __vbaFreeVarList __vbaStrCopy 8154->8156 8157 474d56 124 API calls 8155->8157 8158 474d56 124 API calls 8156->8158 8159 48e53f __vbaStrMove 8157->8159 8160 48db61 __vbaStrMove 8158->8160 8161 48e570 8159->8161 8162 48e555 __vbaNew2 8159->8162 8163 48db92 8160->8163 8164 48db77 __vbaNew2 8160->8164 8166 48e57a __vbaStrCopy __vbaStrMove 8161->8166 8162->8166 8165 48db9c __vbaStrCopy __vbaStrMove 8163->8165 8164->8165 8167 4785bc 21 API calls 8165->8167 8168 4785bc 21 API calls 8166->8168 8169 48dbf1 __vbaVarCat __vbaVarCat __vbaStrVarMove __vbaStrMove 8167->8169 8170 48e5cf __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 8168->8170 8172 48dc6b 8169->8172 8171 48e622 8170->8171 8173 48e633 __vbaHresultCheckObj 8171->8173 8175 48e65a __vbaFreeStrList __vbaStrCopy 8171->8175 8174 48dc7c __vbaHresultCheckObj 8172->8174 8176 48dca3 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy 8172->8176 8173->8175 8174->8176 8177 474d56 124 API calls 8175->8177 8178 474d56 124 API calls 8176->8178 8179 48e6b8 __vbaStrMove 8177->8179 8180 48dd12 __vbaStrMove 8178->8180 8181 48e6e9 8179->8181 8182 48e6ce __vbaNew2 8179->8182 8183 48dd28 __vbaNew2 8180->8183 8184 48dd43 8180->8184 8185 48e6f3 __vbaStrCopy __vbaStrMove 8181->8185 8182->8185 8186 48dd4d __vbaStrCopy __vbaStrMove 8183->8186 8184->8186 8187 4785bc 21 API calls 8185->8187 8188 4785bc 21 API calls 8186->8188 8189 48e748 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 8187->8189 8190 48dda2 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 8188->8190 8192 48e79d 8189->8192 8191 48ddf5 8190->8191 8193 48de06 __vbaHresultCheckObj 8191->8193 8195 48de2d __vbaFreeStrList __vbaStrCopy 8191->8195 8194 48e7ae __vbaHresultCheckObj 8192->8194 8196 48e7d5 __vbaFreeStrList __vbaStrCopy 8192->8196 8193->8195 8194->8196 8198 474d56 124 API calls 8195->8198 8197 474d56 124 API calls 8196->8197 8199 48e833 __vbaStrMove 8197->8199 8200 48de8b __vbaStrMove 8198->8200 8201 48e849 __vbaNew2 8199->8201 8202 48e864 8199->8202 8203 48debc 8200->8203 8204 48dea1 __vbaNew2 8200->8204 8205 48e86e __vbaStrCopy __vbaStrMove 8201->8205 8202->8205 8206 48dec6 __vbaStrCopy __vbaStrMove 8203->8206 8204->8206 8207 4785bc 21 API calls 8205->8207 8208 4785bc 21 API calls 8206->8208 8209 48e8c3 __vbaStrMove __vbaStrCat __vbaStrMove 8207->8209 8210 48df1b __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 8208->8210 8209->8223 8211 48df70 8210->8211 8213 48df81 __vbaHresultCheckObj 8211->8213 8215 48dfa8 __vbaFreeStrList __vbaStrCopy 8211->8215 8212 48e911 __vbaHresultCheckObj 8214 48e938 __vbaFreeStrList 8212->8214 8213->8215 8214->8223 8216 474d56 124 API calls 8215->8216 8217 48e006 __vbaStrMove 8216->8217 8218 48e01c __vbaNew2 8217->8218 8219 48e037 8217->8219 8220 48e041 __vbaStrCopy __vbaStrMove 8218->8220 8219->8220 8221 4785bc 21 API calls 8220->8221 8222 48e096 __vbaStrMove __vbaStrCat __vbaStrMove 8221->8222 8222->8223 8223->8089 8223->8094 8223->8095 8223->8097 8223->8122 8223->8125 8223->8129 8223->8130 8223->8132 8223->8133 8223->8134 8223->8149 8223->8151 8223->8154 8223->8156 8223->8212 8223->8214 8224 48e0e4 __vbaHresultCheckObj 8223->8224 8225 48e10b __vbaFreeStrList __vbaStrCopy 8223->8225 8228 48b4e1 __vbaChkstk __vbaOnError __vbaStrCopy 8223->8228 8255 477092 __vbaChkstk __vbaOnError 8223->8255 8281 476607 __vbaChkstk __vbaOnError 8223->8281 8224->8225 8225->8223 8227 4607c1 8226->8227 8229 474d56 124 API calls 8228->8229 8230 48b551 __vbaStrMove __vbaStrCopy __vbaStrMove 8229->8230 8231 4785bc 21 API calls 8230->8231 8232 48b595 __vbaStrMove __vbaStrCat __vbaStrMove 8231->8232 8318 47877c __vbaChkstk __vbaOnError 8232->8318 8234 48b5b8 __vbaStrMove 8330 48eb05 __vbaChkstk __vbaOnError __vbaStrCopy __vbaOnError 8234->8330 8236 48b5cb __vbaObjSet __vbaFreeStrList __vbaObjIs 8237 48b700 8236->8237 8238 48b617 8236->8238 8344 475e4f __vbaChkstk __vbaOnError __vbaNew __vbaObjSet __vbaStrCopy 8237->8344 8342 48eaa7 __vbaChkstk __vbaStrCopy 8238->8342 8242 48b710 __vbaAryMove __vbaUbound 8244 48b8c9 8 API calls 8242->8244 8245 48b742 __vbaRedim __vbaAryLock __vbaAryLock __vbaUbound 8242->8245 8243 48b65d 7 API calls 8243->8237 8246 48ba52 __vbaFreeStr __vbaFreeStr __vbaFreeStr __vbaFreeVar 8244->8246 8247 48b973 11 API calls 8244->8247 8245->8244 8248 48b78c __vbaDerefAry1 __vbaDerefAry1 8245->8248 8246->8123 8247->8246 8368 460088 8248->8368 8256 4770e5 __vbaRedim #644 8255->8256 8257 477339 __vbaErrorOverflow 8255->8257 8564 4602ac 8256->8564 8279 47754a 8275->8279 8276 477565 __vbaDerefAry1 __vbaStrUI1 __vbaStrMove __vbaStrCmp __vbaFreeStr 8277 4775ab 6 API calls 8276->8277 8276->8279 8277->8279 8278 47760a __vbaStrMove 8278->8146 8279->8276 8279->8278 8280 477653 __vbaErrorOverflow 8279->8280 8282 476667 8281->8282 8292 47666c 8281->8292 8282->8126 8283 476771 __vbaErrorOverflow 8284 476776 __vbaChkstk __vbaStrCopy __vbaOnError __vbaStrCmp 8283->8284 8286 4767ff #619 __vbaVarTstNe __vbaFreeVar 8284->8286 8287 4767ea __vbaStrCopy 8284->8287 8285 476723 8293 476735 __vbaSetSystemError 8285->8293 8288 476851 __vbaStrCat __vbaStrMove 8286->8288 8289 47686f 8286->8289 8287->8286 8288->8289 8290 476883 __vbaStrCat __vbaStrMove __vbaStrToAnsi 8289->8290 8291 476968 8289->8291 8294 4602f4 8290->8294 8296 47697c __vbaStrCat __vbaStrMove __vbaStrToAnsi 8291->8296 8297 476a5a __vbaFreeStr 8291->8297 8292->8282 8292->8283 8292->8285 8295 4766df 6 API calls 8292->8295 8293->8282 8298 4768b1 __vbaSetSystemError __vbaFreeStrList 8294->8298 8295->8292 8299 4602f4 8296->8299 8297->8126 8298->8291 8300 4768e7 #685 __vbaObjSet 8298->8300 8302 4769aa __vbaSetSystemError __vbaFreeStrList 8299->8302 8304 47690f 8300->8304 8302->8297 8303 4769dc #685 __vbaObjSet 8302->8303 8307 476a04 8303->8307 8305 476934 8304->8305 8306 47691a __vbaHresultCheckObj 8304->8306 8308 47693b __vbaFreeStrList __vbaFreeObj 8305->8308 8306->8308 8309 476a0f __vbaHresultCheckObj 8307->8309 8310 476a29 8307->8310 8308->8297 8311 476a30 __vbaFreeStrList __vbaFreeObj 8309->8311 8310->8311 8311->8297 8566 4606a0 _sqlite3_stdcall_finalize 8312->8566 8319 4787f0 8318->8319 8320 4787da __vbaNew2 8318->8320 8321 478823 __vbaHresultCheckObj 8319->8321 8322 47883a 8319->8322 8320->8319 8323 47883e __vbaCastObj __vbaObjSet __vbaFreeObj 8321->8323 8322->8323 8326 47885d 8323->8326 8324 47887e __vbaHresultCheckObj 8324->8326 8325 4788f7 __vbaCastObj __vbaObjSet __vbaCastObj __vbaObjSet 8327 47895b __vbaFreeObj __vbaFreeObj 8325->8327 8326->8324 8326->8325 8328 4788c2 __vbaHresultCheckObj 8326->8328 8329 4788dd __vbaStrMove 8326->8329 8327->8234 8328->8329 8329->8326 8370 491966 __vbaChkstk 8330->8370 8332 48eb9b #632 __vbaVarMove __vbaFreeVar __vbaVarTstEq 8333 48ec2c __vbaVarTstEq 8332->8333 8334 48ec0d 8332->8334 8336 48ec74 __vbaStrCopy 8333->8336 8338 48ec55 8333->8338 8384 48ecd3 __vbaChkstk __vbaOnError __vbaNew __vbaObjSet 8334->8384 8339 48ec8a __vbaFreeVar 8336->8339 8337 48ec20 __vbaObjSet 8337->8339 8340 48ec68 __vbaObjSet 8338->8340 8339->8236 8340->8339 8343 48b623 __vbaStrMove __vbaStrCmp __vbaFreeStr 8342->8343 8343->8237 8343->8243 8345 474d56 124 API calls 8344->8345 8346 475ed8 __vbaStrMove __vbaStrCopy __vbaStrMove 8345->8346 8347 4785bc 21 API calls 8346->8347 8348 475f11 __vbaStrMove __vbaStrMove 8347->8348 8349 475f43 8348->8349 8350 475f4e __vbaHresultCheckObj 8349->8350 8351 475f6b 8349->8351 8352 475f72 __vbaObjSet __vbaFreeStrList __vbaStrCopy 8350->8352 8351->8352 8353 474d56 124 API calls 8352->8353 8354 475fc7 __vbaStrMove __vbaStrCopy __vbaStrMove 8353->8354 8355 4785bc 21 API calls 8354->8355 8356 476006 __vbaStrMove 8355->8356 8357 47601f 8356->8357 8358 476047 8357->8358 8359 47602a __vbaHresultCheckObj 8357->8359 8360 47604e __vbaFreeStrList 8358->8360 8359->8360 8361 476083 8360->8361 8362 47608e __vbaHresultCheckObj 8361->8362 8363 4760a8 8361->8363 8362->8363 8364 4760d0 __vbaHresultCheckObj 8363->8364 8365 4760ea 8363->8365 8366 4760f1 7 API calls 8364->8366 8365->8366 8367 4761a7 __vbaFreeObj __vbaFreeObj 8366->8367 8367->8242 8369 460091 8368->8369 8371 491995 __vbaLenBstr 8370->8371 8372 4919be #632 __vbaVarMove __vbaFreeVar __vbaVarTstEq 8371->8372 8382 491bb7 __vbaFreeVar 8371->8382 8374 491a2a __vbaVarTstEq 8372->8374 8383 491a4f 8372->8383 8375 491a66 __vbaVarTstEq 8374->8375 8374->8383 8376 491a8b __vbaVarTstEq 8375->8376 8375->8383 8377 491ab0 __vbaVarTstEq 8376->8377 8376->8383 8379 491ad5 __vbaVarTstEq 8377->8379 8377->8383 8378 491c04 __vbaErrorOverflow 8380 491aff __vbaVarTstEq 8379->8380 8379->8383 8381 491b6a __vbaVarTstEq 8380->8381 8380->8383 8381->8383 8382->8332 8383->8371 8383->8378 8383->8382 8385 491966 15 API calls 8384->8385 8386 48ed53 #632 __vbaVarTstNe __vbaFreeVarList 8385->8386 8387 48ede0 14 API calls 8386->8387 8410 48eefc 8386->8410 8388 48efc6 __vbaFreeStr 8387->8388 8388->8337 8389 48f3f9 __vbaErrorOverflow 8391 48f3fe __vbaChkstk __vbaOnError __vbaNew __vbaObjSet 8389->8391 8392 491966 15 API calls 8391->8392 8394 48f47e #632 __vbaVarTstNe __vbaFreeVarList 8392->8394 8393 491966 15 API calls 8395 48ef28 #632 __vbaVarTstEq __vbaFreeVarList 8393->8395 8396 48f50b 13 API calls 8394->8396 8397 48efb1 8395->8397 8398 48efd5 #632 __vbaVarTstEq __vbaFreeVarList 8395->8398 8400 48fb3a 8396->8400 8397->8388 8397->8389 8399 48f08f __vbaLenBstr 8398->8399 8398->8410 8401 48f0ab 7 API calls 8399->8401 8399->8410 8400->8337 8401->8388 8402 491966 15 API calls 8402->8410 8404 48f16a __vbaStrMove __vbaOnError 8435 48fbad __vbaChkstk __vbaOnError 8404->8435 8406 48f1d2 __vbaHresultCheckObj 8407 48f1f6 __vbaFreeVar #685 __vbaObjSet 8406->8407 8407->8410 8408 48f243 __vbaHresultCheckObj 8409 48f26a __vbaFreeObj 8408->8409 8409->8410 8411 48f296 #685 __vbaObjSet 8409->8411 8410->8389 8410->8393 8410->8402 8410->8406 8410->8407 8410->8408 8410->8409 8416 491425 __vbaChkstk 8410->8416 8412 48f2c7 8411->8412 8413 48f2f8 8412->8413 8414 48f2d8 __vbaHresultCheckObj 8412->8414 8415 48f2ff 10 API calls 8413->8415 8414->8415 8415->8388 8417 491966 15 API calls 8416->8417 8418 491460 __vbaLenBstr 8417->8418 8419 491489 6 API calls 8418->8419 8432 491804 __vbaFreeStr __vbaFreeStr 8418->8432 8421 49165d __vbaStrCmp 8419->8421 8425 491505 8419->8425 8423 4917cd __vbaStrCmp 8421->8423 8421->8425 8422 491961 __vbaErrorOverflow 8424 491823 10 API calls 8423->8424 8423->8425 8424->8425 8427 4918be __vbaStrCat __vbaStrMove 8424->8427 8425->8418 8425->8422 8426 491966 15 API calls 8425->8426 8428 491966 15 API calls 8425->8428 8429 491809 __vbaStrCat __vbaStrMove 8425->8429 8425->8432 8430 49153a #632 __vbaVarTstNe __vbaFreeVarList 8426->8430 8427->8425 8431 4916aa #632 __vbaVarTstNe __vbaFreeVarList 8428->8431 8429->8425 8430->8425 8433 4915b7 13 API calls 8430->8433 8431->8425 8434 491727 13 API calls 8431->8434 8432->8404 8433->8432 8434->8432 8436 491966 15 API calls 8435->8436 8437 48fc12 #632 __vbaVarMove __vbaFreeVar __vbaVarTstEq 8436->8437 8438 48fc8c 8437->8438 8439 48fcad __vbaVarTstEq 8437->8439 8440 48ecd3 431 API calls 8438->8440 8441 48fcfa __vbaVarTstEq 8439->8441 8442 48fcd9 8439->8442 8440->8439 8443 48fd4b 8441->8443 8444 48fd26 __vbaVarTstEq 8441->8444 8445 48fceb __vbaVarSetObj 8442->8445 8466 48ff53 __vbaChkstk __vbaOnError 8443->8466 8444->8443 8446 48fd77 __vbaVarTstEq 8444->8446 8448 48fee3 __vbaFreeVar 8445->8448 8450 48fdc8 8446->8450 8451 48fda3 __vbaVarTstEq 8446->8451 8448->8410 8449 48fd5d __vbaVarMove 8449->8448 8536 490e87 __vbaChkstk __vbaOnError 8450->8536 8451->8450 8453 48fdf5 __vbaStrCopy 8451->8453 8455 474d56 124 API calls 8453->8455 8457 48fe12 __vbaStrMove __vbaStrCopy __vbaStrMove 8455->8457 8458 4785bc 21 API calls 8457->8458 8459 48fe51 __vbaVarTstEq __vbaFreeStrList __vbaFreeVar 8458->8459 8460 48fe9f 8459->8460 8461 48fec2 8459->8461 8544 4911bc __vbaChkstk 8460->8544 8551 490c90 __vbaChkstk __vbaOnError 8461->8551 8465 48fed8 __vbaVarMove 8465->8448 8467 491966 15 API calls 8466->8467 8468 48ffb8 #632 __vbaStrVarMove __vbaStrMove __vbaFreeVarList 8467->8468 8469 490c8b __vbaErrorOverflow 8468->8469 8510 49002a 8468->8510 8470 49002f __vbaLenBstr 8471 49005f 6 API calls 8470->8471 8472 490b31 8470->8472 8475 490985 __vbaStrCmp 8471->8475 8471->8510 8473 490b3e __vbaNew2 8472->8473 8474 490b57 8472->8474 8473->8474 8486 490bb4 8474->8486 8487 490b94 __vbaHresultCheckObj 8474->8487 8476 4909a2 8475->8476 8475->8510 8476->8469 8480 4909b7 8476->8480 8477 490105 6 API calls 8478 490197 __vbaStrCmp 8477->8478 8477->8510 8481 4901ab __vbaStrCmp 8478->8481 8478->8510 8479 490a95 __vbaNew2 8479->8510 8483 4909c9 __vbaNew2 8480->8483 8484 4909e2 8480->8484 8485 4901bf __vbaStrCmp 8481->8485 8481->8510 8482 4901e4 __vbaNew2 8482->8510 8483->8484 8493 490a3f 8484->8493 8494 490a1f __vbaHresultCheckObj 8484->8494 8488 490280 __vbaStrCmp 8485->8488 8485->8510 8489 490bbb __vbaStrMove __vbaCastObj __vbaObjSet 8486->8489 8487->8489 8492 49035d __vbaStrCmp 8488->8492 8488->8510 8490 490bf3 __vbaFreeStrList __vbaFreeObj __vbaFreeStr __vbaFreeStr __vbaFreeStr 8489->8490 8490->8449 8491 490aeb __vbaHresultCheckObj 8491->8510 8497 49043a __vbaStrCopy 8492->8497 8492->8510 8500 490a46 __vbaStrMove __vbaCastObj __vbaObjSet 8493->8500 8494->8500 8496 49023a __vbaHresultCheckObj 8496->8510 8501 474d56 124 API calls 8497->8501 8498 4902ac __vbaNew2 8499 4902ce __vbaStrCopy 8498->8499 8499->8510 8500->8490 8503 490457 __vbaStrMove __vbaStrCopy __vbaStrMove 8501->8503 8502 490389 __vbaNew2 8504 4903ab __vbaStrCopy 8502->8504 8505 4785bc 21 API calls 8503->8505 8504->8510 8507 49049c __vbaStrMove __vbaStrCmp __vbaFreeStrList 8505->8507 8506 49030f __vbaHresultCheckObj 8508 490336 __vbaFreeStr 8506->8508 8509 4905a5 __vbaStrCopy 8507->8509 8507->8510 8508->8469 8508->8510 8513 474d56 124 API calls 8509->8513 8510->8469 8510->8470 8510->8477 8510->8479 8510->8482 8510->8491 8510->8496 8510->8498 8510->8499 8510->8502 8510->8504 8510->8506 8510->8508 8511 4903ec __vbaHresultCheckObj 8510->8511 8512 490413 __vbaFreeStr 8510->8512 8514 4904f4 __vbaNew2 8510->8514 8516 490516 __vbaStrCopy 8510->8516 8520 490557 __vbaHresultCheckObj 8510->8520 8521 49057e __vbaFreeStr 8510->8521 8523 49065f __vbaNew2 8510->8523 8524 49073c __vbaNew2 8510->8524 8525 490681 __vbaStrCopy 8510->8525 8526 49075e __vbaStrCopy 8510->8526 8527 490821 #632 __vbaStrVarMove __vbaStrMove __vbaFreeVarList 8510->8527 8529 4908b2 7 API calls 8510->8529 8530 4906c2 __vbaHresultCheckObj 8510->8530 8531 49079f __vbaHresultCheckObj 8510->8531 8532 4906e9 __vbaFreeStr 8510->8532 8533 4907c6 __vbaFreeStr 8510->8533 8534 490925 __vbaHresultCheckObj 8510->8534 8535 49094c __vbaFreeStrList __vbaFreeVar 8510->8535 8511->8512 8512->8469 8512->8510 8515 4905c2 __vbaStrMove __vbaStrCopy __vbaStrMove 8513->8515 8514->8516 8517 4785bc 21 API calls 8515->8517 8516->8510 8518 490607 __vbaStrMove __vbaStrCmp __vbaFreeStrList 8517->8518 8518->8510 8519 490710 __vbaStrCmp 8518->8519 8519->8510 8522 4907ed __vbaStrCmp 8519->8522 8520->8521 8521->8469 8521->8510 8522->8510 8523->8525 8524->8526 8525->8510 8526->8510 8527->8510 8528 490890 __vbaNew2 8527->8528 8528->8529 8529->8510 8530->8532 8531->8533 8532->8469 8532->8510 8533->8469 8533->8510 8534->8535 8535->8469 8535->8510 8537 491966 15 API calls 8536->8537 8538 490eec #632 __vbaVarTstEq __vbaFreeVarList 8537->8538 8539 490fa0 #632 __vbaVarTstEq __vbaFreeVarList 8538->8539 8540 490f75 8538->8540 8539->8540 8543 491054 14 API calls 8539->8543 8541 4911b7 __vbaErrorOverflow 8540->8541 8542 48fdda __vbaVarMove 8540->8542 8542->8448 8543->8542 8545 491966 15 API calls 8544->8545 8546 4911f7 #632 __vbaVarTstEq __vbaFreeVarList 8545->8546 8547 4912a9 14 API calls 8546->8547 8548 491279 __vbaVarMove 8546->8548 8550 48feb5 __vbaVarMove 8547->8550 8549 491420 __vbaErrorOverflow 8548->8549 8548->8550 8550->8448 8552 491966 15 API calls 8551->8552 8553 490cf3 __vbaLenBstr 8552->8553 8554 490d23 #632 __vbaStrVarMove __vbaStrMove __vbaFreeVarList __vbaInStr 8553->8554 8555 490e27 __vbaFreeStr __vbaFreeStr 8553->8555 8557 490d9c __vbaStrCat __vbaStrMove 8554->8557 8558 490dd4 #564 8554->8558 8555->8465 8559 490e82 __vbaErrorOverflow 8557->8559 8562 490dcd 8557->8562 8560 490e0e 8558->8560 8561 490dfe __vbaHresultCheck 8558->8561 8563 490e15 __vbaVarMove 8560->8563 8561->8563 8562->8553 8563->8555 8565 4602b5 8564->8565 8567 4606a9 8566->8567
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 0048358B
                                                                              • __vbaAryConstruct2.MSVBVM60(?,00464E48,00000008,?,?,?,?,00403046), ref: 004835C0
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,00464E48,00000008,?,?,?,?,00403046), ref: 004835CE
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,00464E48,00000008,?,?,?,?,00403046), ref: 004835E5
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,00464E48,00000008,?,?,?,?,00403046), ref: 004835FE
                                                                              • __vbaStrCopy.MSVBVM60(?,000000FF,?,00464E48,00000008,?,?,?,?,00403046), ref: 0048360E
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483632
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00483650
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483676
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 0048368C
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004836B6
                                                                              • __vbaStrCopy.MSVBVM60(00000008,?,?,?,?,00403046), ref: 004836D0
                                                                              • __vbaStrMove.MSVBVM60(?,00000008,?,?,?,?,00403046), ref: 004836E9
                                                                              • __vbaStrCopy.MSVBVM60(?,00000008,?,?,?,?,00403046), ref: 004836F9
                                                                              • __vbaStrMove.MSVBVM60 ref: 0048371D
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 0048373E
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483764
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 0048377A
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004837A4
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,00000008,?,?,?,?,00403046), ref: 004837BE
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,00000008,?,?,?,?,00403046), ref: 004837D7
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,00000008,?,?,?,?,00403046), ref: 004837E7
                                                                              • __vbaStrMove.MSVBVM60 ref: 0048380B
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483852
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483868
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483892
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 004838AC
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 004838C5
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 004838D5
                                                                              • __vbaStrMove.MSVBVM60 ref: 004838F9
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 0048391A
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483940
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483956
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483980
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048399A
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004839B3
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004839C3
                                                                              • __vbaStrMove.MSVBVM60 ref: 004839E7
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00483A08
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483A2E
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483A44
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483A6E
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483A88
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483AA1
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483AB1
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483AD5
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483B1C
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483B32
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483B5C
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483B76
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483B8F
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483B9F
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483BC3
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00483BE4
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483C0A
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483C20
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483C4A
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483C64
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483C7D
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483C8D
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483CB1
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00483CD2
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483CF8
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483D0E
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483D38
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483D52
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483D6B
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483D7B
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483D9F
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483DE6
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483DFC
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483E26
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483E40
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483E59
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483E69
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483E8D
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00483EAE
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483ED4
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483EEA
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00483F14
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483F2E
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483F47
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00483F57
                                                                              • __vbaStrMove.MSVBVM60 ref: 00483F7B
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00483F9C
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00483FC2
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00483FD8
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00484002
                                                                              • __vbaStrCopy.MSVBVM60 ref: 0048401C
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00484035
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 00484045
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00484069
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 004840B0
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 004840C6
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004840F0
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?), ref: 0048410A
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?), ref: 00484123
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?), ref: 00484133
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?), ref: 00484157
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00484178
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 0048419E
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 004841B4
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004841DE
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004841F8
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484211
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484221
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484245
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00484266
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 0048428C
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 004842A2
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004842CC
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004842E6
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004842FF
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048430F
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484333
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 0048437A
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00484390
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004843BA
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004843D4
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004843ED
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004843FD
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484421
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00484442
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00484468
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 0048447E
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 004844A8
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004844C2
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004844DB
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004844EB
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048450F
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00484530
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00484556
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 0048456C
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00484596
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004845B0
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004845C9
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004845D9
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004845FD
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00484644
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 0048465A
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,?), ref: 00484684
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048469E
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004846B7
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004846C7
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004846EB
                                                                              • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048471F
                                                                              • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000,?,?,?,?,?,?,?,?,?), ref: 00484742
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0048475C
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484775
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484785
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004847A9
                                                                              • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004847DD
                                                                              • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00484800
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048481A
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 00484833
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 00484843
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 00484867
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484887
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004848AD
                                                                              • #716.MSVBVM60(00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004848BA
                                                                              • __vbaObjVar.MSVBVM60(00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 004848C6
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?), ref: 004848D0
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,00000000,00000000,00000000,?,00000000,00000008,00000008,00000000,00000000,?,?,?), ref: 00484901
                                                                              • __vbaFreeVar.MSVBVM60(00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048490F
                                                                              • __vbaStrCopy.MSVBVM60(00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00484926
                                                                              • __vbaStrMove.MSVBVM60(?,00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0048493F
                                                                              • __vbaStrCopy.MSVBVM60(?,00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0048494F
                                                                              • __vbaStrMove.MSVBVM60(?,00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 00484973
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00484993
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?,?,?,?,?,?), ref: 004849B9
                                                                              • #716.MSVBVM60(00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?,?,?,?), ref: 004849C6
                                                                              • __vbaObjVar.MSVBVM60(00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?), ref: 004849D2
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?), ref: 004849DF
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,00000000,00000000,00000000,?,00000000,00000008,00000008,00000000,00000000,?,?,?), ref: 00484A10
                                                                              • __vbaFreeVar.MSVBVM60(00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?), ref: 00484A1E
                                                                              • __vbaChkstk.MSVBVM60(00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?), ref: 00484A3E
                                                                              • __vbaLateMemSt.MSVBVM60(?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?), ref: 00484A57
                                                                              • __vbaChkstk.MSVBVM60(?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?,?,?), ref: 00484A77
                                                                              • __vbaLateMemSt.MSVBVM60(?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?), ref: 00484A90
                                                                              • __vbaChkstk.MSVBVM60(?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000,00000000,?), ref: 00484A9F
                                                                              • __vbaLateMemSt.MSVBVM60(?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000), ref: 00484AB8
                                                                              • __vbaChkstk.MSVBVM60(?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008,00000000), ref: 00484AC7
                                                                              • __vbaLateMemSt.MSVBVM60(?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008), ref: 00484AE3
                                                                              • __vbaStrCopy.MSVBVM60(?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008), ref: 00484AF7
                                                                              • __vbaRedim.MSVBVM60(00000000,0000000C,004960C8,00460FC4,00000001,00000000,00000000,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008), ref: 00484B17
                                                                              • __vbaStrCopy.MSVBVM60(Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008,00000008), ref: 00484B3F
                                                                              • __vbaStrMove.MSVBVM60(?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008), ref: 00484B58
                                                                              • __vbaStrCopy.MSVBVM60(?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008), ref: 00484B68
                                                                              • __vbaStrMove.MSVBVM60(?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?,?,00000008), ref: 00484B8C
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?), ref: 00484BAC
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?,?), ref: 00484BBC
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?), ref: 00484BD5
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?), ref: 00484BE5
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000,00000000,?), ref: 00484C09
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000), ref: 00484C29
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008,00000008,00000000), ref: 00484C74
                                                                              • __vbaStrCat.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008), ref: 00484C7D
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global,00000008), ref: 00484C8A
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000000,00000000,?,00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?,Global), ref: 00484C9C
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,?,00000000,00000000,?,00000000,?,?,?,Pattern,?,Pattern,?,IgnoreCase,?), ref: 00484CA2
                                                                              • #626.MSVBVM60(?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?,Pattern,?,Pattern), ref: 00484CCC
                                                                              • __vbaObjVar.MSVBVM60(?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?,Pattern,?), ref: 00484CD8
                                                                              • __vbaObjSetAddref.MSVBVM60(004960C4,00000000,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000,?,?,?), ref: 00484CE3
                                                                              • __vbaFreeStrList.MSVBVM60(0000000D,?,?,?,00000000,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000,004960C4,00000000), ref: 00484D45
                                                                              • __vbaFreeVarList.MSVBVM60(00000003,00000008,0000000A,?,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000,?), ref: 00484D64
                                                                              • #598.MSVBVM60(?,?,?,?,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000,?), ref: 00484D73
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000,?), ref: 00484D87
                                                                              • __vbaLenBstr.MSVBVM60(00000000,?,?,?,?,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000), ref: 00484DA9
                                                                              • __vbaVarVargNofree.MSVBVM60(00000000,?,?,?,?,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000,?,00000000), ref: 00484DD2
                                                                              • __vbaLenVar.MSVBVM60(00000008,00000000,00000000,?,?,?,?,?,?,00000008,0000000A,00000000,00000000,?,00000000,00000000), ref: 00484DDF
                                                                              • __vbaVarCmpEq.MSVBVM60(0000000A,00008002,00000000,00000008,00000000,00000000,?,?,?,?,?,?,00000008,0000000A,00000000,00000000), ref: 00484DF3
                                                                              • __vbaVarNot.MSVBVM60(?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000,?,?,?,?,?,?,00000008,0000000A), ref: 00484E00
                                                                              • __vbaVarAnd.MSVBVM60(?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000,?,?,?,?,?), ref: 00484E14
                                                                              • __vbaBoolVarNull.MSVBVM60(00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E1A
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E2C
                                                                              • __vbaStrCat.MSVBVM60(00460E8C,00000000,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E4D
                                                                              • __vbaStrMove.MSVBVM60(00460E8C,00000000,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E57
                                                                              • __vbaVarVargNofree.MSVBVM60(00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E86
                                                                              • __vbaVarCat.MSVBVM60(00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E93
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484E99
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484EA3
                                                                              • __vbaFreeVar.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484EAE
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484F0C
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484F20
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484F34
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008,00000000,00000000), ref: 00484F48
                                                                              • __vbaLateMemCall.MSVBVM60(enumvalues,00000004,00000000,00000008,00000000,00000008,00000000,?,0000000B,00000000,?,00000000,0000000A,00008002,00000000,00000008), ref: 00484F66
                                                                              • #560.MSVBVM60(?), ref: 00484F7C
                                                                              • __vbaUbound.MSVBVM60(00000001,00000000,?), ref: 00484F9D
                                                                              • __vbaRefVarAry.MSVBVM60(?,00000001,00000000,?), ref: 00484FAB
                                                                              • __vbaUbound.MSVBVM60(00000001,00000000,?,00000001,00000000,?), ref: 00484FB4
                                                                              • __vbaRedimPreserve.MSVBVM60(00000000,0000000C,004960C8,00460FC4,00000001,-00000002,00000001,00000000,?,00000001,00000000,?), ref: 00484FDB
                                                                              • __vbaRefVarAry.MSVBVM60(?,?,?,00000000,?,00000001,00000000,?), ref: 00484FF1
                                                                              • __vbaUbound.MSVBVM60(00000001,00000000,?,?,?,00000000,?,00000001,00000000,?), ref: 00484FFA
                                                                              • __vbaI2I4.MSVBVM60(00000001,00000000,?,?,?,00000000,?,00000001,00000000,?), ref: 00485001
                                                                              • __vbaVarCopy.MSVBVM60(00000001,00000000,?,?,?,00000000,?,00000001,00000000,?), ref: 00485067
                                                                              • __vbaChkstk.MSVBVM60(00000001,00000000,?,?,?,00000000,?,00000001,00000000,?), ref: 00485089
                                                                              • __vbaVarIndexLoad.MSVBVM60(00000008,?,00000001,00000001,00000000,?,?,?,00000000,?,00000001,00000000,?), ref: 004850A7
                                                                              • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,00000000,?,00000001,00000000,?), ref: 004850B7
                                                                              • __vbaVarTstEq.MSVBVM60(00008002,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,00000000,?), ref: 004850E5
                                                                              • __vbaStrCat.MSVBVM60(00460E8C,?,00008002,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001), ref: 00485117
                                                                              • __vbaChkstk.MSVBVM60(00460E8C,?,00008002,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001), ref: 00485142
                                                                              • __vbaVarIndexLoadRef.MSVBVM60(?,?,00000001,00460E8C,?,00008002,?), ref: 00485163
                                                                              • __vbaChkstk.MSVBVM60 ref: 00485194
                                                                              • __vbaVarCat.MSVBVM60(0000000A,?,00000008), ref: 004851BA
                                                                              • __vbaChkstk.MSVBVM60(0000000A,?,00000008), ref: 004851C4
                                                                              • __vbaChkstk.MSVBVM60(0000000A,?,00000008), ref: 004851D2
                                                                              • __vbaChkstk.MSVBVM60(0000000A,?,00000008), ref: 004851E6
                                                                              • __vbaLateMemCall.MSVBVM60(getstringvalue,00000004,0000000A,?,00000008), ref: 00485204
                                                                              • __vbaFreeVarList.MSVBVM60(00000003,00000008,0000000A,?), ref: 00485223
                                                                              • __vbaVarTstEq.MSVBVM60(00008002,?,00008002,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001), ref: 00485259
                                                                              • __vbaStrCat.MSVBVM60(00460E8C,?,00008002,?,00008002,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0048528B
                                                                              • __vbaChkstk.MSVBVM60(00460E8C,?,00008002,?,00008002,?,?,?,?,?,?,?,?,?,?,00000000), ref: 004852B6
                                                                              • __vbaVarIndexLoadRef.MSVBVM60(?,?,00000001,00460E8C,?,00008002,?,00008002,?), ref: 004852D7
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,00008002,?), ref: 00485308
                                                                              • __vbaVarCat.MSVBVM60(0000000A,?,00000008,?,?,?,?,?,00008002,?), ref: 0048532E
                                                                              • __vbaChkstk.MSVBVM60(0000000A,?,00000008,?,?,?,?,?,00008002,?), ref: 00485338
                                                                              • __vbaChkstk.MSVBVM60(0000000A,?,00000008,?,?,?,?,?,00008002,?), ref: 00485346
                                                                              • __vbaChkstk.MSVBVM60(0000000A,?,00000008,?,?,?,?,?,00008002,?), ref: 0048535A
                                                                              • __vbaLateMemCall.MSVBVM60(GetDWORDValue,00000004,0000000A,?,00000008,?,?,?,?,?,00008002,?), ref: 00485378
                                                                              • __vbaFreeVarList.MSVBVM60(00000003,00000008,0000000A,?), ref: 00485397
                                                                              • __vbaStrCat.MSVBVM60(00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 00486751
                                                                              • __vbaVarCat.MSVBVM60(0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 0048677B
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 00486781
                                                                              • __vbaStrMove.MSVBVM60(00000000,0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 0048678E
                                                                              • __vbaDerefAry1.MSVBVM60(00000000,0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 004867A1
                                                                              • __vbaStrCopy.MSVBVM60(00000000,0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 004867AA
                                                                              • __vbaFreeStr.MSVBVM60(00000000,0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002,?,00008002,?), ref: 004867B5
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000008,0000000A,00000000,0000000A,?,00000008,00460E8C,?,00008002,?,00008002,?,00008002,?,00008002), ref: 004867CA
                                                                              • __vbaChkstk.MSVBVM60(?,00008002,?,?,?,?,?,?,?,?,?,?,00000000,?,00000001,00000000), ref: 004867EF
                                                                              • __vbaVarIndexLoad.MSVBVM60(00000008,?,00000001,?,00008002,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00486810
                                                                              • __vbaStrVarMove.MSVBVM60(00000000), ref: 00486819
                                                                              • __vbaStrMove.MSVBVM60(00000000), ref: 00486826
                                                                              • __vbaDerefAry1.MSVBVM60(00000000), ref: 00486839
                                                                              • __vbaStrCopy.MSVBVM60(00000000), ref: 00486845
                                                                              • __vbaFreeStr.MSVBVM60(00000000), ref: 00486850
                                                                              • __vbaFreeVar.MSVBVM60(00000000), ref: 0048685B
                                                                              • __vbaVarCat.MSVBVM60(00000008,00000008,?,00000000), ref: 00486890
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,00000008,00000008,?,00000000), ref: 00486896
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000008,00000008,?,00000000), ref: 004868A3
                                                                              • __vbaDerefAry1.MSVBVM60(00000000,00000008,00000008,?,00000000), ref: 004868B6
                                                                              • __vbaStrCopy.MSVBVM60(00000000,00000008,00000008,?,00000000), ref: 004868C2
                                                                              • __vbaFreeStr.MSVBVM60(00000000,00000008,00000008,?,00000000), ref: 004868CD
                                                                              • __vbaFreeVar.MSVBVM60(00000000,00000008,00000008,?,00000000), ref: 004868D8
                                                                              • __vbaVarTstEq.MSVBVM60(00000001,?,00000000,00000008,00000008,?,00000000), ref: 00486916
                                                                              • __vbaStrCopy.MSVBVM60(00000001,?,00000000,00000008,00000008,?,00000000), ref: 00486939
                                                                              • __vbaStrMove.MSVBVM60(?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 00486952
                                                                              • __vbaStrCopy.MSVBVM60(?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 0048698E
                                                                              • __vbaStrMove.MSVBVM60(?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 004869B2
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000001,?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 004869D9
                                                                              • __vbaInStr.MSVBVM60(00000000,00000000,?,?,00000000,00000001,?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 004869E1
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000000,?,?,00000000,00000001,?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 004869F9
                                                                              • __vbaLateMemCallLd.MSVBVM60(00000008,?,test,00000001,00000000,00000000,?,?,00000000,00000001,?,00000001,?,00000000,00000008,00000008), ref: 00486A1B
                                                                              • __vbaChkstk.MSVBVM60(00000000,?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 00486A27
                                                                              • __vbaLateMemCallLd.MSVBVM60(0000000A,?,test,00000001,00000000,?,00000001,?,00000000,00000008,00000008,?,00000000), ref: 00486A4C
                                                                              • __vbaVarOr.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000,00000008,00000008), ref: 00486A5C
                                                                              • __vbaVarAnd.MSVBVM60(?,00000003,00000000,?,00000000), ref: 00486A70
                                                                              • __vbaBoolVarNull.MSVBVM60(00000000,?,00000003,00000000,?,00000000), ref: 00486A76
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,00000000,00000000,00000000,?,00000003,00000000,?,00000000), ref: 00486AA7
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000008,?,?,?,?,?,?,?,00460E8C,?,00000001), ref: 00488AE3
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000008,?,?,?,?,?,?,?,00460E8C,?,00000001), ref: 00488AF7
                                                                              • __vbaChkstk.MSVBVM60(00000000,00000008,00000008,?,?,?,?,?,?,?,00460E8C,?,00000001), ref: 00488B0B
                                                                              • __vbaLateMemCall.MSVBVM60(EnumKey,00000003,00000000,00000008,00000008,?,?,?,?,?,?,?,00460E8C,?,00000001), ref: 00488B29
                                                                              • #560.MSVBVM60(?), ref: 00488B3C
                                                                              • __vbaForEachVar.MSVBVM60(?,?,00000000,?,?,?,?), ref: 00488B7A
                                                                              • __vbaAryUnlock.MSVBVM60(?,00488DFC,?), ref: 00488CC7
                                                                              • __vbaFreeObj.MSVBVM60(?,00488DFC,?), ref: 00488CD2
                                                                              • __vbaFreeVar.MSVBVM60(?,00488DFC,?), ref: 00488CDD
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,00000000,?,00488DFC,?), ref: 00488CEB
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,00000000,00000000,00000000,?,00488DFC,?), ref: 00488CF9
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,0000000A,00000000,00000000,00000000,00000000,?,00488DFC,?), ref: 00488D07
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,00000008,00000000,0000000A,00000000,00000000,00000000,00000000,?,00488DFC,?), ref: 00488D15
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,00000008,00000000,0000000A,00000000,00000000,00000000,00000000,?,00488DFC,?), ref: 00488D23
                                                                              • __vbaErrorOverflow.MSVBVM60(00000000,00000008,00000008,?,?,?,?,?,?,?,00460E8C,?,00000001), ref: 00488E10
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Copy$Free$List$Chkstk$Error$BoundsGenerate$Late$Call$Destruct$BstrIndexLoad$AddrefAry1DerefUbound$#516#560#631#716BoolNofreeNullRedimVarg$#537#598#608#626#632Construct2EachOverflowPreserveUnlock
                                                                              • String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pplication: WinSCP$CJtMgJrlOHdwlsYKOXEZNGbAaQRjVyWQxL$EnumKey$GVjTygxBskkAZUSSoeeSDQCS$GetDWORDValue$GetExpandedStringValue$GetMultiStringValue$Global$HostName$IVhtaFdZpCcNltRKKoxec$IgnoreCase$LBvlZdTRyTVFOvfEoSjyupOlXDBIVauHtJrjOKcfkVYM$LImgJQNVFvaaWUwBsZmdfUwUxxdoKLEifIEapkPZQEl$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$MQdxOEvRLOVpImSFGZfIkiYkDzeMvPSOCQ$MewEmaKbyOlnDsfTpJQkkB$MzJCHyaVEIIJEeooCiBxFxu$Password: $Pattern$PlDfDXJoOmkIZPlSWLvDYllwQCbawaUW$TeOUDgBpDHSWZJXrTSlqMdpeNyfUUGoU$TmEWJgmhFTHpnNMgRnRhZvLKcsOfqiFi$Url: $UserName$Username: $WinSCP 2$XbeCcQKYeXVPyuPEchFvfwCtbBZoUzIN$XyrlvRkjggxrgTdgkIVlqrYYCEQZcGoeAo$YJgLbbFWPPsGXYoSEpSGe$YyBVLcRliMLSJjLkUahqyJdjoppswaTOZ$bYufUYVoympIVvEPVAvjneYYUCRUSLrA$bwEiSjYvgvkiQXiRsTVqTzQHpDVDVLKVk$datGcKDBmKfC$enumvalues$eyywmKZEdTRlU$fMSDLgoOQThkPuxOKdyVdVvUSCOvPsDxRf$gcBQzHROdOhVJlkQbktfTOGTyxszphaG$getbinaryvalue$getstringvalue$jjgwnXjDtAgjshFLiTnBJRj$mmfwxmEYoMsWEBmSsSyOaUG$nknRHztTHEiCKvWRAlXCkYzSOXJeQLYNxiJLFZPQnq$oJsJRyQWxNUm$rkspgTxPBtfNlMXMYMwZmaB$tFBcNgiFOnssLbKSfEhseq$tdfKYthRdSNiNbQvUfsPareDpYYZbbqybPYYFlGDCJ$test$tkXCVviBvNTFTHNDvWtztWR$uLQqzsrFBehGtWCQXfDrJgjJruNdlYKA$vIepupJkOeNQJxItrAEIJrPieEbXCcntX$xfJwYnvRcBytynogjIVZvGlVBeRjCGMkycXmCExILaw$xrAEPohATQBQTmjiWZwbKTzdmBXPdlyyxXQmeCVBOpxF$yZafqmifZuxZmkHfoiQGaD$zvadIappUPNLyKjmMKmkLqUYwujQfgdeK$~
                                                                              • API String ID: 466101822-3457255342
                                                                              • Opcode ID: 3a03caef8e0e5184f9ee5adc8ca350e3676099d21d5ba677c96784c732f3319f
                                                                              • Instruction ID: 3e6d2d43accb5a2407e1cc57a7d73ed8eab60d7de8a63313ed06df09f5b7aeab
                                                                              • Opcode Fuzzy Hash: 3a03caef8e0e5184f9ee5adc8ca350e3676099d21d5ba677c96784c732f3319f
                                                                              • Instruction Fuzzy Hash: B4B31C7190022C9ADB61EF90CC46BDEB7BCAF18305F0045EAA509B7181EB799FC98F55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 431 471ce0-471e91 __vbaChkstk __vbaOnError __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc #666 __vbaVarCat __vbaStrVarMove __vbaStrMove __vbaFreeStrList __vbaFreeVarList #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 437 4729e7-472ad8 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVar 431->437 438 471e97-471ea2 431->438 447 472ade-472b48 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove 437->447 448 47308d-47325f __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc #666 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaVarAdd #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 437->448 440 471ea4-471ebb __vbaNew2 438->440 441 471ebd-471ec0 438->441 443 471ec6-471efe 440->443 441->443 449 471f20 443->449 450 471f00-471f1e __vbaHresultCheckObj 443->450 466 472b63-472b66 447->466 467 472b4a-472b61 __vbaNew2 447->467 482 473265-47337d __vbaStrCat __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc #666 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove 448->482 483 47353c-47370e __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc #666 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaVarAdd #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 448->483 451 471f27-471fa9 __vbaVarSetObj __vbaVarLateMemCallLd __vbaVarZero __vbaForEachVar 449->451 450->451 454 472997-47299e 451->454 457 4729a4-4729e2 __vbaCastObj __vbaObjSet #529 454->457 458 471fae-4720bd __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaVarCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 454->458 457->437 473 4720c3-4721c7 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove 458->473 474 4726be-4726cc 458->474 470 472b6c-472bbd __vbaStrMove 466->470 467->470 479 472bdf 470->479 480 472bbf-472bdd __vbaHresultCheckObj 470->480 521 4721e2-4721e5 473->521 522 4721c9-4721e0 __vbaNew2 473->522 477 4726ce-4726e7 __vbaNew2 474->477 478 4726e9 474->478 485 4726f3-472725 477->485 478->485 486 472be6-472c8a __vbaVarSetObj __vbaFreeStrList __vbaVarLateMemCallLd __vbaVarZero __vbaForEachVar 479->486 480->486 529 47337f-473396 __vbaNew2 482->529 530 473398-47339b 482->530 531 473714-47382c __vbaStrCat __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc #666 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove 483->531 532 4739eb-473a03 __vbaCastObj __vbaObjSet 483->532 500 472747 485->500 501 472727-472745 __vbaHresultCheckObj 485->501 490 473080-473087 486->490 490->448 493 472c8f-472d9e __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaVarAdd #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVarList 490->493 525 472da4-472ea8 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove 493->525 526 47304e-47307a __vbaNextEachVar 493->526 506 47274e-472777 __vbaLenBstr __vbaFreeStr 500->506 501->506 511 472965-472991 __vbaNextEachVar 506->511 512 47277d-47278b 506->512 511->454 518 47278d-4727a6 __vbaNew2 512->518 519 4727a8 512->519 527 4727b2-4727e4 518->527 519->527 528 4721eb-472263 __vbaVarCat __vbaStrVarVal 521->528 522->528 572 472ec3-472ec6 525->572 573 472eaa-472ec1 __vbaNew2 525->573 526->490 543 472806 527->543 544 4727e6-472804 __vbaHresultCheckObj 527->544 546 472285 528->546 547 472265-472283 __vbaHresultCheckObj 528->547 534 4733a1-473425 __vbaVarAdd __vbaStrVarVal 529->534 530->534 578 473847-47384a 531->578 579 47382e-473845 __vbaNew2 531->579 538 473a08-473b07 __vbaAryUnlock * 2 __vbaFreeObjList __vbaFreeVarList __vbaFreeVar __vbaFreeStr * 2 __vbaFreeObj * 2 __vbaFreeStr __vbaFreeObj __vbaFreeVar 532->538 552 473447 534->552 553 473427-473445 __vbaHresultCheckObj 534->553 545 47280d-47287d __vbaStrCat __vbaStrMove __vbaStrCopy __vbaStrMove 543->545 544->545 561 47289f 545->561 562 47287f-47289d __vbaHresultCheckObj 545->562 551 47228c-472383 __vbaFreeStrList __vbaFreeVarList __vbaCastObj __vbaObjSet __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaFreeStrList call 476776 546->551 547->551 589 472385 551->589 590 47238a-4723ab call 476ab6 551->590 558 47344e-473501 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy * 2 552->558 553->558 576 473523 558->576 577 473503-473521 __vbaHresultCheckObj 558->577 567 4728a6-4728d3 __vbaFreeStrList 561->567 562->567 567->511 574 4728d9-4728e7 567->574 580 472ecc-472f44 __vbaVarAdd __vbaStrVarVal 572->580 573->580 581 472904 574->581 582 4728e9-472902 __vbaNew2 574->582 584 47352a-473539 __vbaFreeStrList 576->584 577->584 585 473850-4738d4 __vbaVarAdd __vbaStrVarVal 578->585 579->585 593 472f66 580->593 594 472f46-472f64 __vbaHresultCheckObj 580->594 586 47290e-47293c 581->586 582->586 584->483 597 4738f6 585->597 598 4738d6-4738f4 __vbaHresultCheckObj 585->598 600 47295e 586->600 601 47293e-47295c __vbaHresultCheckObj 586->601 589->538 602 4723b2-4723f3 __vbaStrCat __vbaStrMove call 476b5c __vbaFreeStr 590->602 603 4723ad 590->603 599 472f6d-473013 __vbaFreeStrList __vbaFreeVarList __vbaCastObj __vbaObjSet __vbaStrCopy * 2 593->599 594->599 604 4738fd-4739b0 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy * 2 597->604 598->604 609 473035 599->609 610 473015-473033 __vbaHresultCheckObj 599->610 600->511 601->511 611 4723f5 602->611 612 4723fa-47240c call 476bf2 602->612 603->538 613 4739d2 604->613 614 4739b2-4739d0 __vbaHresultCheckObj 604->614 615 47303c-47304b __vbaFreeStrList 609->615 610->615 611->538 619 472412-472420 612->619 620 4724f8-4725b9 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaFreeStrList __vbaStrCat __vbaStrMove call 476b5c __vbaFreeStr 612->620 617 4739d9-4739e8 __vbaFreeStrList 613->617 614->617 615->526 617->532 622 472422-47243b __vbaNew2 619->622 623 47243d 619->623 634 4725c0-4725d2 call 476bf2 620->634 635 4725bb 620->635 625 472447-4724b8 call 4607b8 __vbaSetSystemError call 476c42 __vbaStrMove __vbaStrCat __vbaStrMove 622->625 623->625 639 4724da 625->639 640 4724ba-4724d8 __vbaHresultCheckObj 625->640 634->474 641 4725d8-4725e6 634->641 635->538 642 4724e1-4724f3 __vbaFreeStrList 639->642 640->642 643 472603 641->643 644 4725e8-472601 __vbaNew2 641->644 642->612 645 47260d-47267e call 4607b8 __vbaSetSystemError call 476c42 __vbaStrMove __vbaStrCat __vbaStrMove 643->645 644->645 651 4726a0 645->651 652 472680-47269e __vbaHresultCheckObj 645->652 653 4726a7-4726b9 __vbaFreeStrList 651->653 652->653 653->634
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00471CFE
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 00471D39
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 00471D4D
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 00471D60
                                                                              • __vbaStrCopy.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 00471D6D
                                                                              • __vbaStrMove.MSVBVM60 ref: 00471D88
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • #666.MSVBVM60(?,00000008,?,?,?,?,?,?,?,?,?,?,?), ref: 00471DB8
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,?), ref: 00471DE6
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,?,00000008,?), ref: 00471DEC
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000008,?), ref: 00471DF6
                                                                              • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000,00000000,?,00000008,?), ref: 00471E0D
                                                                              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,?,?,?,?,00403046), ref: 00471E2C
                                                                              • #645.MSVBVM60(00004008,00000010), ref: 00471E57
                                                                              • __vbaStrMove.MSVBVM60(00004008,00000010), ref: 00471E61
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,00004008,00000010), ref: 00471E6C
                                                                              • __vbaFreeStr.MSVBVM60(00460A74,00000000,00004008,00000010), ref: 00471E83
                                                                              • __vbaNew2.MSVBVM60(00463A5C,00000000,00460A74,00000000,00004008,00000010), ref: 00471EAD
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463A6C,00000054), ref: 00471F13
                                                                              • __vbaVarSetObj.MSVBVM60(?,?), ref: 00471F44
                                                                              • __vbaVarLateMemCallLd.MSVBVM60(?,?,SubFolders,00000000,?,?), ref: 00471F62
                                                                              • __vbaVarZero.MSVBVM60 ref: 00471F72
                                                                              • __vbaForEachVar.MSVBVM60(?,?,?,?,?,?), ref: 00471F9E
                                                                              • __vbaStrCopy.MSVBVM60 ref: 00471FBD
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00471FD0
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 00471FDD
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00471FF8
                                                                              • __vbaStrMove.MSVBVM60(?,?,?), ref: 0047200F
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,?,00000000,?,?,?), ref: 0047204B
                                                                              • #645.MSVBVM60(00000000,?,00000008,?,00000000,?,?,?), ref: 00472051
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000008,?,00000000,?,?,?), ref: 0047205B
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,00000000,?,00000008,?,00000000,?,?,?), ref: 00472066
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000,00460A74,00000000,00000000,?,00000008,?,00000000,?,?), ref: 00472094
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?), ref: 004720AC
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 004720D2
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 004720E5
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 004720F2
                                                                              • __vbaStrMove.MSVBVM60 ref: 0047210D
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 0047212A
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?), ref: 00472130
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?), ref: 0047213A
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000000,?,?), ref: 00472155
                                                                              • __vbaStrCopy.MSVBVM60 ref: 0047216C
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0047217F
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 0047218C
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 004721A7
                                                                              • __vbaStrMove.MSVBVM60(?,?,?), ref: 004721BE
                                                                              • __vbaNew2.MSVBVM60(00463A5C,00000000,?,?,?), ref: 004721D2
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,?,?,000000FF,?,?,?,?,?,?,?,00000000,?,?), ref: 00472233
                                                                              • __vbaStrVarVal.MSVBVM60(?,00000000,?,00000008,?,?,000000FF,?,?,?,?,?,?,?,00000000,?), ref: 0047223D
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463A6C,0000006C), ref: 00472278
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000), ref: 004722A6
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000008,?), ref: 004722BE
                                                                              • __vbaCastObj.MSVBVM60(00000000,00463A4C), ref: 004722D4
                                                                              • __vbaObjSet.MSVBVM60(00000000,00000000,00000000,00463A4C), ref: 004722DE
                                                                              • __vbaStrCopy.MSVBVM60(00000000,00000000,00000000,00463A4C), ref: 004722F2
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,00000000,00000000,00463A4C), ref: 00472305
                                                                              • __vbaStrCopy.MSVBVM60(?,00000000,00000000,00000000,00463A4C), ref: 00472312
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,00000000,00000000,00463A4C), ref: 0047232D
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,00000000,00000000,00000000,00463A4C), ref: 00472344
                                                                              • __vbaFreeStrList.MSVBVM60(00000004,?,?,?,00000000,?,?,?,00000000,00000000,00000000,00463A4C), ref: 0047235B
                                                                                • Part of subcall function 00476776: __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00472375,?,00000000,00000000,00000000,00463A4C), ref: 00476792
                                                                                • Part of subcall function 00476776: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 004767BF
                                                                                • Part of subcall function 00476776: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 004767CD
                                                                                • Part of subcall function 00476776: __vbaStrCmp.MSVBVM60(00460A74,?,000000FF,?,?,?,00000000,00403046), ref: 004767E1
                                                                                • Part of subcall function 00476776: __vbaStrCopy.MSVBVM60(00460A74,?,000000FF,?,?,?,00000000,00403046), ref: 004767FA
                                                                                • Part of subcall function 00476776: #619.MSVBVM60(?,00004008,00000001), ref: 0047681D
                                                                                • Part of subcall function 00476776: __vbaVarTstNe.MSVBVM60(?,?,?,00004008,00000001), ref: 00476838
                                                                                • Part of subcall function 00476776: __vbaFreeVar.MSVBVM60(?,?,?,00004008,00000001), ref: 00476844
                                                                                • Part of subcall function 00476776: __vbaStrCat.MSVBVM60(00460E8C,?,?,?,?,00004008,00000001), ref: 00476860
                                                                                • Part of subcall function 00476776: __vbaStrMove.MSVBVM60(00460E8C,?,?,?,?,00004008,00000001), ref: 0047686A
                                                                                • Part of subcall function 00476776: __vbaStrCat.MSVBVM60(SQLite3.dll,?,?,?,?,00004008,00000001), ref: 00476892
                                                                                • Part of subcall function 00476776: __vbaStrMove.MSVBVM60(SQLite3.dll,?,?,?,?,00004008,00000001), ref: 0047689C
                                                                                • Part of subcall function 00476776: __vbaStrToAnsi.MSVBVM60(000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768A6
                                                                                • Part of subcall function 00476776: __vbaSetSystemError.MSVBVM60(00000000,000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768B4
                                                                                • Part of subcall function 00476776: __vbaFreeStrList.MSVBVM60(00000002,?,000000FF,00000000,000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768CB
                                                                                • Part of subcall function 00476776: #685.MSVBVM60(?,00000000,00403046), ref: 004768EE
                                                                                • Part of subcall function 00476776: __vbaObjSet.MSVBVM60(?,00000000,?,00000000,00403046), ref: 004768F8
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496054,?,?,?,?,?,?,?,?,?,?), ref: 004726D8
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C), ref: 0047273A
                                                                              • __vbaLenBstr.MSVBVM60(?), ref: 00472751
                                                                              • __vbaFreeStr.MSVBVM60(?), ref: 00472769
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496054,?), ref: 00472797
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C), ref: 004727F9
                                                                              • __vbaStrCat.MSVBVM60(\ContactsThunderbird.txt), ref: 00472818
                                                                              • __vbaStrMove.MSVBVM60(\ContactsThunderbird.txt), ref: 00472822
                                                                              • __vbaStrCopy.MSVBVM60(\ContactsThunderbird.txt), ref: 0047282F
                                                                              • __vbaStrMove.MSVBVM60(\ContactsThunderbird.txt), ref: 0047284A
                                                                              • __vbaCastObj.MSVBVM60(00000000,00463A4C,?,?,?,?,?,?), ref: 004729B2
                                                                              • __vbaObjSet.MSVBVM60(00000000,00000000,00000000,00463A4C,?,?,?,?,?,?), ref: 004729BC
                                                                              • #529.MSVBVM60(00004008,00000000,00000000,00000000,00463A4C,?,?,?,?,?,?), ref: 004729E2
                                                                              • __vbaStrCopy.MSVBVM60(00460A74,00000000,00004008,00000010), ref: 004729F6
                                                                              • __vbaStrMove.MSVBVM60(?,00460A74,00000000,00004008,00000010), ref: 00472A09
                                                                              • __vbaStrCopy.MSVBVM60(?,00460A74,00000000,00004008,00000010), ref: 00472A16
                                                                              • __vbaStrMove.MSVBVM60(?,00460A74,00000000,00004008,00000010), ref: 00472A31
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,00460A74,00000000,00004008,00000010), ref: 00472A48
                                                                              • #645.MSVBVM60(00000008,00000010,?,?,?,00460A74,00000000,00004008,00000010), ref: 00472A79
                                                                              • __vbaStrMove.MSVBVM60(00000008,00000010,?,?,?,00460A74,00000000,00004008,00000010), ref: 00472A83
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,00000008,00000010,?,?,?,00460A74,00000000,00004008,00000010), ref: 00472A8E
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000,00460A74,00000000,00000008,00000010,?,?,?,00460A74,00000000), ref: 00472ABC
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00403046), ref: 00472ACA
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00403046), ref: 00472AED
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00472B00
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 00472B0D
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00472B28
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00472B3F
                                                                              • __vbaNew2.MSVBVM60(00463A5C,00000000,?,?), ref: 00472B53
                                                                              • __vbaStrMove.MSVBVM60(?,?,?), ref: 00472B97
                                                                              • __vbaAryUnlock.MSVBVM60(?,00473B08,?,00000000,00000000,00463A4C), ref: 00473A86
                                                                              • __vbaAryUnlock.MSVBVM60(?,?,00473B08,?,00000000,00000000,00463A4C), ref: 00473A92
                                                                              • __vbaFreeObjList.MSVBVM60(00000002,?,?,?,?,00473B08,?,00000000,00000000,00463A4C), ref: 00473AA7
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,00000000,00463A4C), ref: 00473ABF
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473ACA
                                                                              • __vbaFreeStr.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473AD2
                                                                              • __vbaFreeStr.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473ADA
                                                                              • __vbaFreeObj.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473AE2
                                                                              • __vbaFreeObj.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473AEA
                                                                              • __vbaFreeStr.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473AF2
                                                                              • __vbaFreeObj.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473AFA
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,00000000,00463A4C), ref: 00473B02
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$Copy$List$New2$BstrCheckChkstkErrorHresult$#645$#516#631CastUnlock$#529#537#608#619#632#666#685AnsiCallEachLateSystemZero
                                                                              • String ID: 062F0E3538071A272E260B182B37177E2F14$07400D372C2F1D253E3229013D363E301F00$0E242A18330C3F753C3C3B20252F03037E333B62241B0A081C11$192E01342D313F0B091B$223F04230024341120173939$2A001C2A280B25422A0B$2F082D0237352B17142930273D0A083F2C0A1E0C0B390D2208001606492828$373C3712293C0F$3D163C110927300C1304153B1B172F27113D01122D3106222D04270D2433173F12763D07$3F1207152304361E1B1C10380831181A12270D27$B$Contacts Netease$KaXYelFCiOItRwZNTeXsNIPrCqgHcPRt$L:F$RnpGbLedAdVmxeEvEXBiOme$SELECT c3author FROM $SELECT value FROM $SubFolders$T`I$T`I$T`I$T`I$T`I$T`I$Thunderbird Contacts$WRwtfBcSmOyhL$XDzQkaNtIsSZu$ZpJdZYXKblhqMHOoJHuGkH$\ContactsThunderbird.txt$\Thunderbird\Profiles$\app.db$\contacts.db$bZHbZZfvJKUxyLRdPKvWBKg$esFHvRTXrHdQNQGiLXolPoXyCTafvgLJSIVYBjZiZRc$hRCFwQmSXQYHSDHfpSWYLWjfahtmEQG$svLGVHHnUnxeXPTXpmmTIbIHBhtEMKvIjC$yvsyKZhMlNifkNzpqFMGybSmVboUrUuC
                                                                              • API String ID: 67344114-2675999013
                                                                              • Opcode ID: c8a81c1077ecf5056ed0740cfffb3515b8cff3253d6a63d47f7677506441815f
                                                                              • Instruction ID: da725778d5dad398231b01a32982158769be3c513a7627b2e3c61568bdbe7204
                                                                              • Opcode Fuzzy Hash: c8a81c1077ecf5056ed0740cfffb3515b8cff3253d6a63d47f7677506441815f
                                                                              • Instruction Fuzzy Hash: 2313F871D402199BDB20DFA1CD45BDEBBBCBF08305F1081ABA119B7182EB789B498F55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 654 47049c-470666 __vbaChkstk __vbaAryConstruct2 __vbaOnError __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 666 470671-470676 __vbaGenerateBoundsError 654->666 667 470668-47066f 654->667 668 47067c-4707d3 #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 666->668 667->668 677 4707d5-4707dc 668->677 678 4707de-4707e3 __vbaGenerateBoundsError 668->678 679 4707e9-470940 #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 677->679 678->679 688 470942-470949 679->688 689 47094b-470950 __vbaGenerateBoundsError 679->689 690 470956-470aad #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 688->690 689->690 699 470aaf-470ab6 690->699 700 470ab8-470abd __vbaGenerateBoundsError 690->700 701 470ac3-470c1a #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 699->701 700->701 710 470c25-470c2a __vbaGenerateBoundsError 701->710 711 470c1c-470c23 701->711 712 470c30-470d87 #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 710->712 711->712 721 470d92-470d97 __vbaGenerateBoundsError 712->721 722 470d89-470d90 712->722 723 470d9d-470ef4 #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 721->723 722->723 732 470ef6-470efd 723->732 733 470eff-470f04 __vbaGenerateBoundsError 723->733 734 470f0a-471061 #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 732->734 733->734 743 471063-47106a 734->743 744 47106c-471071 __vbaGenerateBoundsError 734->744 745 471077-4711ce #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrCopy __vbaStrMove 743->745 744->745 754 4711d0-4711d7 745->754 755 4711d9-4711de __vbaGenerateBoundsError 745->755 756 4711e4-47136b #667 __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc #666 __vbaStrCopy __vbaStrMove call 4785bc 754->756 755->756 767 471376-47137b __vbaGenerateBoundsError 756->767 768 47136d-471374 756->768 769 471381-471452 __vbaVarAdd __vbaStrVarMove __vbaStrMove __vbaStrCopy __vbaFreeStrList __vbaFreeVarList 767->769 768->769 771 471762-4717bf #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 769->771 772 471458-471470 769->772 773 4717e4-471903 call 4609d4 __vbaSetSystemError __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 __vbaStrCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVar 771->773 774 4717c1-4717df __vbaStrCopy call 474402 __vbaFreeStr 771->774 775 471472-471479 772->775 776 47147b-471480 __vbaGenerateBoundsError 772->776 795 471ada-471b69 __vbaAryDestruct __vbaFreeStr 773->795 796 471909-471a64 call 47495c __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 __vbaStrCat __vbaStrMove * 2 __vbaStrCopy 773->796 774->773 777 471486-4714e5 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 775->777 776->777 781 471756 777->781 782 4714eb-471547 #645 __vbaStrMove __vbaStrCmp __vbaFreeStr 777->782 781->771 785 471549-471553 #531 782->785 786 471558-471570 782->786 785->786 788 471572-471579 786->788 789 47157b-471580 __vbaGenerateBoundsError 786->789 791 471586-471597 788->791 789->791 793 4715a2-4715a7 __vbaGenerateBoundsError 791->793 794 471599-4715a0 791->794 797 4715ad-4715be 793->797 794->797 826 471a86 796->826 827 471a66-471a84 __vbaHresultCheckObj 796->827 800 4715c0-4715c7 797->800 801 4715c9-4715ce __vbaGenerateBoundsError 797->801 803 4715d4-47161f __vbaLenBstr #709 800->803 801->803 805 471625-4716cc #619 __vbaStrCat __vbaVarAdd #645 __vbaStrMove __vbaStrCmp __vbaFreeStr __vbaFreeVarList 803->805 806 471b93-471cc0 __vbaErrorOverflow __vbaChkstk __vbaOnError __vbaStrCopy * 2 __vbaRecUniToAnsi call 460adc __vbaSetSystemError __vbaRecAnsiToUni __vbaRecDestructAnsi * 2 __vbaRecDestruct 803->806 808 4716d3-4716eb 805->808 809 4716ce 805->809 810 4716f6-4716fb __vbaGenerateBoundsError 808->810 811 4716ed-4716f4 808->811 809->781 814 471701-47172d 810->814 811->814 821 47174f 814->821 822 47172f-47174d __vbaHresultCheckObj 814->822 821->781 822->781 828 471a8d-471ad7 __vbaFreeStrList 826->828 827->828 828->795
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 004704BA
                                                                              • __vbaAryConstruct2.MSVBVM60(?,004639F4,00000008,?,?,?,?,00403046), ref: 004704F7
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,004639F4,00000008,?,?,?,?,00403046), ref: 00470505
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,004639F4,00000008,?,?,?,?,00403046), ref: 00470519
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,004639F4,00000008,?,?,?,?,00403046), ref: 0047052C
                                                                              • __vbaStrCopy.MSVBVM60(?,000000FF,?,004639F4,00000008,?,?,?,?,00403046), ref: 00470539
                                                                              • __vbaStrMove.MSVBVM60 ref: 00470554
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00470571
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?), ref: 00470577
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?), ref: 00470581
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,00000000,?,?), ref: 0047059C
                                                                              • __vbaStrCopy.MSVBVM60(00000008,?,?,?,?,00403046), ref: 004705B3
                                                                              • __vbaStrMove.MSVBVM60(?,00000008,?,?,?,?,00403046), ref: 004705C6
                                                                              • __vbaStrCopy.MSVBVM60(?,00000008,?,?,?,?,00403046), ref: 004705D3
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000008,?,?,?,?,00403046), ref: 004705E6
                                                                              • __vbaStrCopy.MSVBVM60(?,?,00000008,?,?,?,?,00403046), ref: 004705F3
                                                                              • __vbaStrMove.MSVBVM60 ref: 0047060E
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?), ref: 00470638
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?), ref: 00470653
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00470671
                                                                              • #667.MSVBVM60(00000008), ref: 00470683
                                                                              • __vbaStrMove.MSVBVM60(00000008), ref: 0047068D
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008), ref: 004706A5
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008), ref: 004706AB
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008), ref: 004706B5
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008), ref: 004706C8
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004706FB
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 00470709
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 0047071D
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 00470730
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 0047073D
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 00470750
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000008), ref: 0047075D
                                                                              • __vbaStrMove.MSVBVM60 ref: 00470778
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?), ref: 004707A2
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?), ref: 004707BD
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 004707DE
                                                                              • #667.MSVBVM60(00000008), ref: 004707F0
                                                                              • __vbaStrMove.MSVBVM60(00000008), ref: 004707FA
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008), ref: 00470812
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470818
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470822
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470835
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00470868
                                                                              • __vbaFreeVar.MSVBVM60 ref: 00470876
                                                                              • __vbaStrCopy.MSVBVM60 ref: 0047088A
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0047089D
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 004708AA
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 004708BD
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 004708CA
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 004708E5
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?), ref: 0047090F
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?), ref: 0047092A
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 0047094B
                                                                              • #667.MSVBVM60(00000008), ref: 0047095D
                                                                              • __vbaStrMove.MSVBVM60(00000008), ref: 00470967
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008), ref: 0047097F
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470985
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008), ref: 0047098F
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008), ref: 004709A2
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004709D5
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004709E3
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004709F7
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A0A
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A17
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A2A
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A37
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A52
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A7C
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00470A97
                                                                              • __vbaGenerateBoundsError.MSVBVM60 ref: 00470AB8
                                                                              • #667.MSVBVM60(00000008), ref: 00470ACA
                                                                              • __vbaStrMove.MSVBVM60(00000008), ref: 00470AD4
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008), ref: 00470AEC
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470AF2
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470AFC
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008), ref: 00470B0F
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00470B42
                                                                              • __vbaFreeVar.MSVBVM60 ref: 00470B50
                                                                              • __vbaStrCopy.MSVBVM60 ref: 00470B64
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 00470B77
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 00470B84
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00470B97
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 00470BA4
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00470BBF
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?), ref: 00470BE9
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?), ref: 00470C04
                                                                              • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?), ref: 00470C25
                                                                              • #667.MSVBVM60(00000008,?,?,?,?), ref: 00470C37
                                                                              • __vbaStrMove.MSVBVM60(00000008,?,?,?,?), ref: 00470C41
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008,?,?,?,?), ref: 00470C59
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470C5F
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470C69
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470C7C
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00470CAF
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470CBD
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470CD1
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470CE4
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470CF1
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470D04
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470D11
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470D2C
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470D56
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470D71
                                                                              • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470D92
                                                                              • #667.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 00470DA4
                                                                              • __vbaStrMove.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 00470DAE
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008), ref: 00470DC6
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00470DCC
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00470DD6
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00470DE9
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00470E1C
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00470E2A
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00470E3E
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470E51
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470E5E
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470E71
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470E7E
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470E99
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470EC3
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470EDE
                                                                              • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470EFF
                                                                              • #667.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 00470F11
                                                                              • __vbaStrMove.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 00470F1B
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008), ref: 00470F33
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00470F39
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00470F43
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00470F56
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00470F89
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00470F97
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00470FAB
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470FBE
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470FCB
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470FDE
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00470FEB
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00471006
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00471030
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 0047104B
                                                                              • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 0047106C
                                                                              • #667.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 0047107E
                                                                              • __vbaStrMove.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 00471088
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008), ref: 004710A0
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 004710A6
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 004710B0
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 004710C3
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 004710F6
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00471104
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00471118
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 0047112B
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00471138
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 0047114B
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00471158
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00471173
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 0047119D
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 004711B8
                                                                              • __vbaGenerateBoundsError.MSVBVM60(?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 004711D9
                                                                              • #667.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 004711EB
                                                                              • __vbaStrMove.MSVBVM60(00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?), ref: 004711F5
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008), ref: 0047120D
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00471213
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 0047121D
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000), ref: 00471230
                                                                              • __vbaFreeStrList.MSVBVM60(0000000B,?,?,?,?,?,?,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 00471263
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00471271
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,?,?,00000000,00000008,?,?,?,?,?,?,?,00000000), ref: 00471285
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 00471298
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 004712A5
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 004712B8
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 004712C5
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?,00000000,00000008,?,?,?,?), ref: 004712E0
                                                                              • #666.MSVBVM60(?,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?), ref: 00471310
                                                                              • __vbaStrCopy.MSVBVM60(?,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?), ref: 0047131D
                                                                              • __vbaStrMove.MSVBVM60(?,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008,?,?), ref: 00471338
                                                                              • __vbaGenerateBoundsError.MSVBVM60(?,?,?,00000008,?,?,?,?,?,?,?,00000000,?,?,00000000,00000008), ref: 00471376
                                                                              • __vbaVarAdd.MSVBVM60(?,00000008,?,?,?,?,00000008,?,?,?,?,?,?,?,00000000,?), ref: 00471396
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,?,00000008,?,?,?,?,00000008,?,?,?,?,?,?,?,00000000), ref: 0047139C
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000008,?,?,?,?,00000008,?,?,?,?,?,?,?,00000000), ref: 004713A6
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,00000008,?,?,?,?,00000008,?,?,?,?,?,?,?,00000000), ref: 004713B9
                                                                              • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,00000000,00000000,00000000,?,00000008,?,?,?), ref: 004713E4
                                                                              • __vbaFreeVarList.MSVBVM60(00000004,00000008,?,00000008,?,00000008,?,?,?,?,00000008,?,?,?,?), ref: 0047140A
                                                                              • #645.MSVBVM60(00004008,00000010,?,?,?,?,?,00000008,?,?,?,?,00000008,?,?,?), ref: 004714AB
                                                                              • __vbaStrMove.MSVBVM60(00004008,00000010,?,?,?,?,?,00000008,?,?,?,?,00000008,?,?,?), ref: 004714B5
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,00004008,00000010,?,?,?,?,?,00000008,?,?,?,?,00000008,?), ref: 004714C0
                                                                              • __vbaFreeStr.MSVBVM60(00460A74,00000000,00004008,00000010,?,?,?,?,?,00000008,?,?,?,?,00000008,?), ref: 004714D7
                                                                              • #645.MSVBVM60(00004008,00000010,00460A74,00000000,00004008,00000010,?,?,?,?,?,00000008,?,?,?,?), ref: 0047150E
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Copy$Free$List$Error$BoundsGenerate$#667$BstrChkstk$#516#631#645$#537#608#632#666Construct2
                                                                              • String ID: 0D14132027233516293E3C2307$1208232A08032A2F08321D2B0D1D343F323F153A23372301$132F012F0E212812072B012C222006200A$223F04230024341120173939$243C2126293B$280832363831251626152925186F14232527252D0F262621022A2B3328$280D1226373011120A3A292C367310121D392228101F1E2925242B2C08$280E240C21120E1C151E3E3F2507$3215201F25190F$35250E1B491E0F1132072738590D0014210C0F0C090D3C0C2225343B140F1F322A0C71590E0F083C282306090A6A052317130B1604$373C3712293C0F$390413262F172B1924$3D2237091B2D010612221F11193B5A322606$3D2E2C0E1D2D352B28352433173E5F022A2723160413$3F0130191F372B00243709063D370515372B$BaaEpkYnQsNstmHtHOvjdo$DiFavgrfsWuSAwgalYPFbmh$DtOGWJUDJjzJ$KakTayXFwMMKWbMquKKOspOfOVCnoNj$QtMVuQfaKtrRZ$RnpGbLedAdVmxeEvEXBiOme$UNfjPSLbwERYWt$WOjmJmUZgjwvMNLcTytQBY$XnTRrJkvhMPKyCrsOXwyxeGl$aefjRJtDpJqe$bcDDqzENuIk$hNKLCflGFTqrBcrYVnHtVORWrHchohJYS$hxfBGZSDbEWevFDAEqhHIMhmstjweGAFxdCxirTtUUp$mtlfIZYrNFUJMZSCfrKCOuCrLSAGHjExayNasLvhPjaJ$svLGVHHnUnxeXPTXpmmTIbIHBhtEMKvIjC
                                                                              • API String ID: 1679687787-2036557123
                                                                              • Opcode ID: 69145e39113002634ff4029f6df9a725b26ed9086f65e796929f77807972b1f1
                                                                              • Instruction ID: 456791d0db37a2dca668dd3aecb774ad6b62aa79bf5efc45e9d201323b4aed95
                                                                              • Opcode Fuzzy Hash: 69145e39113002634ff4029f6df9a725b26ed9086f65e796929f77807972b1f1
                                                                              • Instruction Fuzzy Hash: 22E2A771D0021C9ACB11EFE1C855ADEBBBCBB14305F1085AFA11ABB195EB389B49CF54
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 829 48d3a5-48d41e __vbaChkstk __vbaOnError call 476776 832 48d420 829->832 833 48d425-48d44e call 476ab6 829->833 834 48e9aa-48ea8c __vbaAryDestruct __vbaFreeVar __vbaFreeStr __vbaAryDestruct __vbaFreeVar __vbaAryDestruct __vbaFreeVar * 2 __vbaAryDestruct 832->834 838 48d450 833->838 839 48d455-48d484 call 476b5c 833->839 838->834 842 48d48b-48d498 call 476bf2 839->842 843 48d486 839->843 845 48d49d-48d4a0 842->845 843->834 846 48e971-48e9a4 call 476c1a call 476b34 845->846 847 48d4a6-48d7c0 call 4607b8 __vbaSetSystemError call 476c42 __vbaVarMove call 4607b8 __vbaSetSystemError call 476c42 __vbaVarMove call 460760 __vbaSetSystemError __vbaVarMove call 460708 __vbaSetSystemError __vbaVarAdd __vbaI4Var __vbaFreeVar __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove __vbaStrCopy __vbaStrMove call 476607 __vbaStrMove call 4785bc __vbaStrMove __vbaInStr call 476607 __vbaStrMove call 4785bc __vbaStrMove __vbaInStr __vbaFreeStrList 845->847 846->834 876 48e166-48e199 call 46178c __vbaSetSystemError 847->876 877 48d7c6-48d7e9 847->877 882 48e96c 876->882 884 48e19f-48e246 call 476607 __vbaStrMove __vbaStrCmp __vbaVarCmpNe __vbaVarAnd __vbaBoolVarNull __vbaFreeVar 876->884 878 48d7ef-48d82c call 48b4e1 __vbaAryMove 877->878 879 48e153-48e161 877->879 887 48eaa2-48eaf2 __vbaErrorOverflow __vbaChkstk __vbaStrCopy 878->887 888 48d832-48d835 878->888 879->882 882->842 884->882 892 48e24c-48e25a 884->892 888->887 890 48d83b-48d84d 888->890 890->887 894 48d853-48d864 890->894 895 48e25c-48e275 __vbaNew2 892->895 896 48e277 892->896 894->887 897 48d86a-48d87c 894->897 898 48e281-48e31f __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove 895->898 896->898 897->887 899 48d882-48d8b9 call 477092 897->899 903 48e341 898->903 904 48e321-48e33f __vbaHresultCheckObj 898->904 899->879 905 48d8bf-48d8f5 __vbaUbound __vbaInStr 899->905 906 48e348-48e3a2 __vbaFreeStr __vbaFreeVarList __vbaStrCopy call 474d56 __vbaStrMove 903->906 904->906 907 48d93e-48d955 __vbaUbound 905->907 908 48d8f7-48d93c __vbaUbound call 4774f6 __vbaStrMove 905->908 916 48e3bf 906->916 917 48e3a4-48e3bd __vbaNew2 906->917 907->887 911 48d95b-48d987 call 4774f6 __vbaStrMove 907->911 918 48d98c-48da19 __vbaStrCmp __vbaVarCmpNe __vbaVarAnd __vbaBoolVarNull __vbaFreeVar 908->918 911->918 919 48e3c9-48e4a7 __vbaStrCopy __vbaStrMove call 4785bc __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove 916->919 917->919 918->879 920 48da1f-48da2d 918->920 928 48e4c9 919->928 929 48e4a9-48e4c7 __vbaHresultCheckObj 919->929 922 48da4a 920->922 923 48da2f-48da48 __vbaNew2 920->923 925 48da54-48daf2 __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove 922->925 923->925 930 48db14 925->930 931 48daf4-48db12 __vbaHresultCheckObj 925->931 932 48e4d0-48e553 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 474d56 __vbaStrMove 928->932 929->932 933 48db1b-48db75 __vbaFreeStr __vbaFreeVarList __vbaStrCopy call 474d56 __vbaStrMove 930->933 931->933 938 48e570 932->938 939 48e555-48e56e __vbaNew2 932->939 940 48db92 933->940 941 48db77-48db90 __vbaNew2 933->941 943 48e57a-48e631 __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 938->943 939->943 942 48db9c-48dc7a __vbaStrCopy __vbaStrMove call 4785bc __vbaVarCat * 2 __vbaStrVarMove __vbaStrMove 940->942 941->942 952 48dc9c 942->952 953 48dc7c-48dc9a __vbaHresultCheckObj 942->953 950 48e653 943->950 951 48e633-48e651 __vbaHresultCheckObj 943->951 954 48e65a-48e6cc __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove 950->954 951->954 955 48dca3-48dd26 __vbaFreeStrList __vbaFreeVarList __vbaStrCopy call 474d56 __vbaStrMove 952->955 953->955 960 48e6e9 954->960 961 48e6ce-48e6e7 __vbaNew2 954->961 962 48dd28-48dd41 __vbaNew2 955->962 963 48dd43 955->963 964 48e6f3-48e7ac __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 960->964 961->964 965 48dd4d-48de04 __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 962->965 963->965 974 48e7ce 964->974 975 48e7ae-48e7cc __vbaHresultCheckObj 964->975 972 48de26 965->972 973 48de06-48de24 __vbaHresultCheckObj 965->973 976 48de2d-48de9f __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove 972->976 973->976 977 48e7d5-48e847 __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove 974->977 975->977 984 48debc 976->984 985 48dea1-48deba __vbaNew2 976->985 982 48e849-48e862 __vbaNew2 977->982 983 48e864 977->983 986 48e86e-48e90f __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove 982->986 983->986 987 48dec6-48df7f __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove 984->987 985->987 994 48e931 986->994 995 48e911-48e92f __vbaHresultCheckObj 986->995 996 48dfa1 987->996 997 48df81-48df9f __vbaHresultCheckObj 987->997 998 48e938-48e969 __vbaFreeStrList 994->998 995->998 999 48dfa8-48e01a __vbaFreeStrList __vbaStrCopy call 474d56 __vbaStrMove 996->999 997->999 998->882 1002 48e01c-48e035 __vbaNew2 999->1002 1003 48e037 999->1003 1004 48e041-48e0e2 __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove 1002->1004 1003->1004 1008 48e104 1004->1008 1009 48e0e4-48e102 __vbaHresultCheckObj 1004->1009 1010 48e10b-48e14e __vbaFreeStrList __vbaStrCopy 1008->1010 1009->1010 1010->879
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 0048D3C3
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0048D3F3
                                                                                • Part of subcall function 00476776: __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00472375,?,00000000,00000000,00000000,00463A4C), ref: 00476792
                                                                                • Part of subcall function 00476776: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 004767BF
                                                                                • Part of subcall function 00476776: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 004767CD
                                                                                • Part of subcall function 00476776: __vbaStrCmp.MSVBVM60(00460A74,?,000000FF,?,?,?,00000000,00403046), ref: 004767E1
                                                                                • Part of subcall function 00476776: __vbaStrCopy.MSVBVM60(00460A74,?,000000FF,?,?,?,00000000,00403046), ref: 004767FA
                                                                                • Part of subcall function 00476776: #619.MSVBVM60(?,00004008,00000001), ref: 0047681D
                                                                                • Part of subcall function 00476776: __vbaVarTstNe.MSVBVM60(?,?,?,00004008,00000001), ref: 00476838
                                                                                • Part of subcall function 00476776: __vbaFreeVar.MSVBVM60(?,?,?,00004008,00000001), ref: 00476844
                                                                                • Part of subcall function 00476776: __vbaStrCat.MSVBVM60(00460E8C,?,?,?,?,00004008,00000001), ref: 00476860
                                                                                • Part of subcall function 00476776: __vbaStrMove.MSVBVM60(00460E8C,?,?,?,?,00004008,00000001), ref: 0047686A
                                                                                • Part of subcall function 00476776: __vbaStrCat.MSVBVM60(SQLite3.dll,?,?,?,?,00004008,00000001), ref: 00476892
                                                                                • Part of subcall function 00476776: __vbaStrMove.MSVBVM60(SQLite3.dll,?,?,?,?,00004008,00000001), ref: 0047689C
                                                                                • Part of subcall function 00476776: __vbaStrToAnsi.MSVBVM60(000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768A6
                                                                                • Part of subcall function 00476776: __vbaSetSystemError.MSVBVM60(00000000,000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768B4
                                                                                • Part of subcall function 00476776: __vbaFreeStrList.MSVBVM60(00000002,?,000000FF,00000000,000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768CB
                                                                                • Part of subcall function 00476776: #685.MSVBVM60(?,00000000,00403046), ref: 004768EE
                                                                                • Part of subcall function 00476776: __vbaObjSet.MSVBVM60(?,00000000,?,00000000,00403046), ref: 004768F8
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA38
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA40
                                                                              • __vbaFreeStr.MSVBVM60(00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA48
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA53
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA5B
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA66
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA6E
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,00000000,?,00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA79
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,00000000,?,00000000,?,0048EA8D,?,?,SELECT origin_url, username_value, length(password_value), password_value FROM logins,?,00000000,?), ref: 0048EA87
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$Destruct$Error$ChkstkCopyMove$#619#685AnsiListSystem
                                                                              • String ID: 08231419012B0C332D28376A6370$111E2B3329222534486D70$2C635C$344874$35091434100C3601644979$4B5C59745C4D4D686D73714476572F213E3E1F2910393C0548576C5B5A595876474B5C59745C4D$:$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$L`I$Opera$SELECT origin_url, username_value, length(password_value), password_value FROM logins$Url : $WehgGgcDeDsYaDwUfVHNuJHfCXWdxbCc$XZRmnUItrCtFVBJevlcOkCukMReHkqd$mISduhHmGDGYJYPsaLFiiJDTEikXFKjAKr$nByDTeVhLVBvZdrlXrvCxFvCREuXMQhEA$wDmNAGCHQhWPBKCxmxFBMrkhJnuSVOu$zvadIappUPNLyKjmMKmkLqUYwujQfgdeK
                                                                              • API String ID: 1453307922-1772132306
                                                                              • Opcode ID: ef6ad6a3a767ff6a06e0889744c075e7d9baed9974bd859389a59595bceb89c4
                                                                              • Instruction ID: 82a180d1a0ea15ca686813532b7b14ac4e9bf343fa139da9c26e3bb6e7c8d072
                                                                              • Opcode Fuzzy Hash: ef6ad6a3a767ff6a06e0889744c075e7d9baed9974bd859389a59595bceb89c4
                                                                              • Instruction Fuzzy Hash: D5D2EA71901228EFDB21EF51CC45BDEBBB9AF08305F1085EAA109B6191EB785F88CF55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1011 46b3fc-46b474 __vbaChkstk __vbaOnError 1013 46c681-46c693 1011->1013 1014 46b47a-46b488 1011->1014 1017 46c899-46c927 __vbaErrorOverflow __vbaChkstk __vbaOnError 1013->1017 1018 46c699-46c69c 1013->1018 1015 46b4a5 1014->1015 1016 46b48a-46b4a3 __vbaNew2 1014->1016 1019 46b4af-46b4e1 1015->1019 1016->1019 1020 46c6a0-46c6ae 1018->1020 1027 46b503 1019->1027 1028 46b4e3-46b501 __vbaHresultCheckObj 1019->1028 1021 46c6b0-46c6c9 __vbaNew2 1020->1021 1022 46c6cb 1020->1022 1025 46c6d5-46c707 1021->1025 1022->1025 1033 46c729 1025->1033 1034 46c709-46c727 __vbaHresultCheckObj 1025->1034 1029 46b50a-46b533 __vbaLenBstr __vbaFreeStr 1027->1029 1028->1029 1031 46b79c-46b7aa 1029->1031 1032 46b539-46b547 1029->1032 1036 46b7c7 1031->1036 1037 46b7ac-46b7c5 __vbaNew2 1031->1037 1038 46b564 1032->1038 1039 46b549-46b562 __vbaNew2 1032->1039 1035 46c730-46c77c __vbaChkstk 1033->1035 1034->1035 1044 46c79e 1035->1044 1045 46c77e-46c79c __vbaHresultCheckObj 1035->1045 1041 46b7d1-46b803 1036->1041 1037->1041 1040 46b56e-46b5a0 1038->1040 1039->1040 1047 46b5c2 1040->1047 1048 46b5a2-46b5c0 __vbaHresultCheckObj 1040->1048 1050 46b825 1041->1050 1051 46b805-46b823 __vbaHresultCheckObj 1041->1051 1049 46c7a5-46c7df __vbaStrMove 1044->1049 1045->1049 1052 46b5c9-46b6a3 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove * 3 1047->1052 1048->1052 1061 46c801 1049->1061 1062 46c7e1-46c7ff __vbaHresultCheckObj 1049->1062 1053 46b82c-46b855 __vbaLenBstr __vbaFreeStr 1050->1053 1051->1053 1080 46b6c5 1052->1080 1081 46b6a5-46b6c3 __vbaHresultCheckObj 1052->1081 1054 46babe-46bacc 1053->1054 1055 46b85b-46b869 1053->1055 1063 46bace-46bae7 __vbaNew2 1054->1063 1064 46bae9 1054->1064 1058 46b886 1055->1058 1059 46b86b-46b884 __vbaNew2 1055->1059 1065 46b890-46b8c2 1058->1065 1059->1065 1067 46c808-46c879 __vbaFreeStr __vbaFreeObj 1061->1067 1062->1067 1068 46baf3-46bb25 1063->1068 1064->1068 1075 46b8e4 1065->1075 1076 46b8c4-46b8e2 __vbaHresultCheckObj 1065->1076 1073 46bb47 1068->1073 1074 46bb27-46bb45 __vbaHresultCheckObj 1068->1074 1078 46bb4e-46bb77 __vbaLenBstr __vbaFreeStr 1073->1078 1074->1078 1079 46b8eb-46b9c5 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove * 3 1075->1079 1076->1079 1082 46bde0-46bdee 1078->1082 1083 46bb7d-46bb8b 1078->1083 1111 46b9e7 1079->1111 1112 46b9c7-46b9e5 __vbaHresultCheckObj 1079->1112 1085 46b6cc-46b70a __vbaFreeStrList 1080->1085 1081->1085 1089 46bdf0-46be09 __vbaNew2 1082->1089 1090 46be0b 1082->1090 1086 46bb8d-46bba6 __vbaNew2 1083->1086 1087 46bba8 1083->1087 1085->1031 1091 46b710-46b71e 1085->1091 1095 46bbb2-46bbe4 1086->1095 1087->1095 1092 46be15-46be47 1089->1092 1090->1092 1093 46b720-46b739 __vbaNew2 1091->1093 1094 46b73b 1091->1094 1101 46be69 1092->1101 1102 46be49-46be67 __vbaHresultCheckObj 1092->1102 1097 46b745-46b773 1093->1097 1094->1097 1104 46bc06 1095->1104 1105 46bbe6-46bc04 __vbaHresultCheckObj 1095->1105 1108 46b795 1097->1108 1109 46b775-46b793 __vbaHresultCheckObj 1097->1109 1107 46be70-46be99 __vbaLenBstr __vbaFreeStr 1101->1107 1102->1107 1110 46bc0d-46bce7 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove * 3 1104->1110 1105->1110 1114 46c102-46c1ff __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 __vbaStrCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVar 1107->1114 1115 46be9f-46bead 1107->1115 1108->1031 1109->1031 1138 46bd09 1110->1138 1139 46bce9-46bd07 __vbaHresultCheckObj 1110->1139 1113 46b9ee-46ba2c __vbaFreeStrList 1111->1113 1112->1113 1113->1054 1118 46ba32-46ba40 1113->1118 1133 46c205-46c34e __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 __vbaStrCat __vbaStrMove * 2 __vbaStrCopy 1114->1133 1134 46c3b9-46c4b6 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 __vbaStrCat #645 __vbaStrMove __vbaStrCmp __vbaFreeStrList __vbaFreeVar 1114->1134 1119 46beaf-46bec8 __vbaNew2 1115->1119 1120 46beca 1115->1120 1123 46ba42-46ba5b __vbaNew2 1118->1123 1124 46ba5d 1118->1124 1125 46bed4-46bf06 1119->1125 1120->1125 1128 46ba67-46ba95 1123->1128 1124->1128 1136 46bf28 1125->1136 1137 46bf08-46bf26 __vbaHresultCheckObj 1125->1137 1142 46bab7 1128->1142 1143 46ba97-46bab5 __vbaHresultCheckObj 1128->1143 1180 46c370 1133->1180 1181 46c350-46c36e __vbaHresultCheckObj 1133->1181 1160 46c670-46c67f 1134->1160 1161 46c4bc-46c605 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 __vbaStrCat __vbaStrMove * 2 __vbaStrCopy 1134->1161 1144 46bf2f-46c009 __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove __vbaStrCat __vbaStrMove * 3 1136->1144 1137->1144 1145 46bd10-46bd4e __vbaFreeStrList 1138->1145 1139->1145 1142->1054 1143->1054 1169 46c02b 1144->1169 1170 46c00b-46c029 __vbaHresultCheckObj 1144->1170 1145->1082 1150 46bd54-46bd62 1145->1150 1154 46bd64-46bd7d __vbaNew2 1150->1154 1155 46bd7f 1150->1155 1159 46bd89-46bdb7 1154->1159 1155->1159 1171 46bdd9 1159->1171 1172 46bdb9-46bdd7 __vbaHresultCheckObj 1159->1172 1160->1020 1193 46c627 1161->1193 1194 46c607-46c625 __vbaHresultCheckObj 1161->1194 1175 46c032-46c070 __vbaFreeStrList 1169->1175 1170->1175 1171->1082 1172->1082 1175->1114 1177 46c076-46c084 1175->1177 1182 46c086-46c09f __vbaNew2 1177->1182 1183 46c0a1 1177->1183 1185 46c377-46c3b6 __vbaFreeStrList 1180->1185 1181->1185 1186 46c0ab-46c0d9 1182->1186 1183->1186 1185->1134 1191 46c0fb 1186->1191 1192 46c0db-46c0f9 __vbaHresultCheckObj 1186->1192 1191->1114 1192->1114 1195 46c62e-46c66d __vbaFreeStrList 1193->1195 1194->1195 1195->1160
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 0046B41A
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0046B45F
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496058), ref: 0046B494
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C), ref: 0046B4F6
                                                                              • __vbaLenBstr.MSVBVM60(?), ref: 0046B50D
                                                                              • __vbaFreeStr.MSVBVM60(?), ref: 0046B525
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496058,?), ref: 0046B553
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C), ref: 0046B5B5
                                                                              • __vbaStrCopy.MSVBVM60 ref: 0046B5D1
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0046B5E4
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 0046B5F1
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0046B60C
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?), ref: 0046B623
                                                                              • __vbaStrCat.MSVBVM60(\Cookies.txt,?,000000FF,?), ref: 0046B633
                                                                              • __vbaStrMove.MSVBVM60(\Cookies.txt,?,000000FF,?), ref: 0046B63D
                                                                              • __vbaStrMove.MSVBVM60(\Cookies.txt,?,000000FF,?), ref: 0046B658
                                                                              • __vbaStrMove.MSVBVM60(\Cookies.txt,?,000000FF,?), ref: 0046B673
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006FC), ref: 0046B6B8
                                                                              • __vbaFreeStrList.MSVBVM60(00000008,?,?,000000FF,000001F4,?,?,00000000,00000000), ref: 0046B6F9
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496058), ref: 0046B72A
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,00000024), ref: 0046B788
                                                                              • __vbaNew2.MSVBVM60(0045F06C,0049604C,?), ref: 0046B7B6
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C,?,?,?,?,?,?,?), ref: 0046B818
                                                                              • __vbaLenBstr.MSVBVM60(?,?,?,?,?,?,?,?), ref: 0046B82F
                                                                              • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?), ref: 0046B847
                                                                              • __vbaNew2.MSVBVM60(0045F06C,0049604C,?,?,?,?,?,?,?,?), ref: 0046B875
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C,?,?,?,?,?,?,?), ref: 0046B8D7
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0046B8F3
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046B906
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046B913
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046B92E
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046B945
                                                                              • __vbaStrCat.MSVBVM60(\Credentials.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046B955
                                                                              • __vbaStrMove.MSVBVM60(\Credentials.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046B95F
                                                                              • __vbaStrMove.MSVBVM60(\Credentials.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046B97A
                                                                              • __vbaStrMove.MSVBVM60(\Credentials.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046B995
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006FC,?,?,?,?,?,?,?,?,?,?), ref: 0046B9DA
                                                                              • __vbaFreeStrList.MSVBVM60(00000008,?,?,000000FF,000001F4,?,?,00000000,00000000), ref: 0046BA1B
                                                                              • __vbaNew2.MSVBVM60(0045F06C,0049604C), ref: 0046BA4C
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,00000024), ref: 0046BAAA
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496050,?,?,?,?,?,?,?,?), ref: 0046BAD8
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C,?,?,?,?,?,?,?), ref: 0046BB3A
                                                                              • __vbaLenBstr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BB51
                                                                              • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BB69
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496050,?,?,?,?,?,?,?,?), ref: 0046BB97
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C,?,?,?,?,?,?,?), ref: 0046BBF9
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0046BC15
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC28
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC35
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC50
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC67
                                                                              • __vbaStrCat.MSVBVM60(\Messages.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC77
                                                                              • __vbaStrMove.MSVBVM60(\Messages.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC81
                                                                              • __vbaStrMove.MSVBVM60(\Messages.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BC9C
                                                                              • __vbaStrMove.MSVBVM60(\Messages.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BCB7
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006FC,?,?,?,?,?,?,?,?,?,?), ref: 0046BCFC
                                                                              • __vbaFreeStrList.MSVBVM60(00000008,?,?,000000FF,000001F4,?,?,00000000,00000000), ref: 0046BD3D
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496050), ref: 0046BD6E
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,00000024), ref: 0046BDCC
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496054,?,?,?,?,?,?,?,?), ref: 0046BDFA
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C,?,?,?,?,?,?,?), ref: 0046BE5C
                                                                              • __vbaLenBstr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BE73
                                                                              • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BE8B
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496054,?,?,?,?,?,?,?,?), ref: 0046BEB9
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,0000001C,?,?,?,?,?,?,?), ref: 0046BF1B
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?), ref: 0046BF37
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046BF4A
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046BF57
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046BF72
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BF89
                                                                              • __vbaStrCat.MSVBVM60(\Contacts.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BF99
                                                                              • __vbaStrMove.MSVBVM60(\Contacts.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BFA3
                                                                              • __vbaStrMove.MSVBVM60(\Contacts.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BFBE
                                                                              • __vbaStrMove.MSVBVM60(\Contacts.txt,?,000000FF,?,?,?,?,?,?,?,?,?,?,?), ref: 0046BFD9
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006FC,?,?,?,?,?,?,?,?,?,?), ref: 0046C01E
                                                                              • __vbaFreeStrList.MSVBVM60(00000008,?,?,000000FF,000001F4,?,?,00000000,00000000), ref: 0046C05F
                                                                              • __vbaNew2.MSVBVM60(0045F06C,00496054), ref: 0046C090
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461828,00000024), ref: 0046C0EE
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C111
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C124
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C131
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C14C
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046C163
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?), ref: 0046C184
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C18A
                                                                              • #645.MSVBVM60(00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C19F
                                                                              • __vbaStrMove.MSVBVM60(00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C1A9
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,00000008,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?), ref: 0046C1B4
                                                                              • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,000000FF,000001F4,00000000,00000000,00460A74,00000000,00000008,00000000,00000000,?,?,?), ref: 0046C1E6
                                                                              • __vbaFreeVar.MSVBVM60 ref: 0046C1F1
                                                                              • __vbaStrCopy.MSVBVM60 ref: 0046C214
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0046C227
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 0046C234
                                                                              • __vbaStrMove.MSVBVM60 ref: 0046C24F
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 0046C266
                                                                              • __vbaStrCopy.MSVBVM60(?,?), ref: 0046C273
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(000000FF,?,?), ref: 0046C286
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,?), ref: 0046C293
                                                                              • __vbaStrMove.MSVBVM60(000000FF,?,?), ref: 0046C2AE
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(000001F4,00000000,000000FF,?,?), ref: 0046C2C5
                                                                              • __vbaStrMove.MSVBVM60(000001F4,00000000,000000FF,?,?), ref: 0046C2E6
                                                                              • __vbaStrCat.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?), ref: 0046C2EC
                                                                              • __vbaStrMove.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?), ref: 0046C2F6
                                                                              • __vbaStrMove.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?), ref: 0046C311
                                                                              • __vbaStrCopy.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?), ref: 0046C31E
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006FC), ref: 0046C363
                                                                              • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,000000FF,000001F4,00000000,?,?,?,?,00000000,?,?,?), ref: 0046C3B1
                                                                              • __vbaStrCopy.MSVBVM60 ref: 0046C3C8
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0046C3DB
                                                                              • __vbaStrCopy.MSVBVM60(?), ref: 0046C3E8
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0046C403
                                                                              • __vbaStrMove.MSVBVM60(?,?,?), ref: 0046C41A
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 0046C43B
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?), ref: 0046C441
                                                                              • #645.MSVBVM60(00000008,00000000), ref: 0046C456
                                                                              • __vbaStrMove.MSVBVM60(00000008,00000000), ref: 0046C460
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,00000008,00000000), ref: 0046C46B
                                                                              • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,000000FF,000001F4,00000000,00000000,00460A74,00000000,00000008,00000000), ref: 0046C49D
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,?,00000000,?,?), ref: 0046C4A8
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00000000,?,?), ref: 0046C4CB
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,?,00000000,?,?), ref: 0046C4DE
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,?,00000000,?,?), ref: 0046C4EB
                                                                              • __vbaStrMove.MSVBVM60(?), ref: 0046C506
                                                                              • __vbaStrMove.MSVBVM60(?,?,?), ref: 0046C51D
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?), ref: 0046C52A
                                                                              • __vbaStrMove.MSVBVM60(000000FF,?,?,?), ref: 0046C53D
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,?,?), ref: 0046C54A
                                                                              • __vbaStrMove.MSVBVM60(000000FF,?,?,?), ref: 0046C565
                                                                              • __vbaStrMove.MSVBVM60(000001F4,00000000,000000FF,?,?,?), ref: 0046C57C
                                                                              • __vbaStrMove.MSVBVM60(000001F4,00000000,000000FF,?,?,?), ref: 0046C59D
                                                                              • __vbaStrCat.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?,?), ref: 0046C5A3
                                                                              • __vbaStrMove.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?,?), ref: 0046C5AD
                                                                              • __vbaStrMove.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?,?), ref: 0046C5C8
                                                                              • __vbaStrCopy.MSVBVM60(00000000,000001F4,00000000,000000FF,?,?,?), ref: 0046C5D5
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006FC), ref: 0046C61A
                                                                              • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,000000FF,000001F4,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0046C668
                                                                              • __vbaNew2.MSVBVM60(00460D48,004966B0), ref: 0046C6BA
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00460D38,0000001C), ref: 0046C71C
                                                                              • __vbaChkstk.MSVBVM60(?), ref: 0046C74E
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00461D14,0000005C), ref: 0046C791
                                                                              • __vbaStrMove.MSVBVM60 ref: 0046C7BB
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FC08,000006F8), ref: 0046C7F4
                                                                              • __vbaFreeStr.MSVBVM60 ref: 0046C80B
                                                                              • __vbaFreeObj.MSVBVM60 ref: 0046C813
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$Copy$CheckHresult$New2$List$Bstr$Chkstk$#516#631#645Error$#537#608#632
                                                                              • String ID: "$0A1C2306243504383034023D$0D14132027233516293E3C2307$2437311D211D6A0D2025$2603181F112604$2E0E0110330F3034$303837180D0B1339$312B2E302A141105181E23$3D2237091B2D010612221F11193B5A322606$BaaEpkYnQsNstmHtHOvjdo$ExqXqDnDwIUfKAPyJtRCkZQBUwgKgJUvj$IckrcRhUGMVwFdsciqPpUaDQkKLVBthC$LLuOcWrvYRVgOSSzoNXcupZiIelVoMSyun$L`I$L`I$P`I$P`I$QsWYllhgJDxzQFjZCbukHPnxLpFaAPOJj$T`I$T`I$UNfjPSLbwERYWt$X`I$X`I$YrYKTOzelyrPwYGZhoNFGnRHPabZkMnhq$\Contacts.txt$\Cookies.txt$\Credentials.txt$\Messages.txt$delwtxCwNymroByORBPgg
                                                                              • API String ID: 4252339794-2317804958
                                                                              • Opcode ID: 5a22440711062ed55d8e31c3522b95ee6b68d6c5c66e9bef3c252205060c5d4f
                                                                              • Instruction ID: b51b33a2e95f80463b4a54a726bf0b62d57f1a56bafaf6380cd3677c7a136ed0
                                                                              • Opcode Fuzzy Hash: 5a22440711062ed55d8e31c3522b95ee6b68d6c5c66e9bef3c252205060c5d4f
                                                                              • Instruction Fuzzy Hash: F3D2FA71940118EFCB11EF91C985BDEBBB8FF08305F1081AAE509B7191EB789A89CF55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1196 474d56-474dd1 __vbaChkstk __vbaOnError __vbaLenBstr 1197 474de5-474dee 1196->1197 1198 474df4-474ea4 #632 __vbaVarCat __vbaI4ErrVar #537 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr __vbaFreeVarList 1197->1198 1199 474ea9-474ee1 1197->1199 1202 474ef6-4750ca __vbaErrorOverflow __vbaChkstk __vbaOnError #716 __vbaVarZero __vbaChkstk __vbaVarLateMemCallLdRf __vbaVarLateMemCallLd __vbaChkstk * 3 __vbaVarLateMemCallLdRf __vbaObjVar __vbaLateMemCall __vbaFreeVarList #685 __vbaObjSet 1198->1202 1203 474de2 1198->1203 1205 4750ec 1202->1205 1206 4750cc-4750ea __vbaHresultCheckObj 1202->1206 1203->1197 1207 4750f3-475135 __vbaFreeObj __vbaLenBstr #709 1205->1207 1206->1207 1208 475137-475150 #618 __vbaStrMove call 4751b5 1207->1208 1209 4751b0-4752e0 __vbaErrorOverflow __vbaChkstk __vbaOnError * 2 __vbaVarDup #667 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr __vbaFreeVar __vbaStrCat __vbaStrMove __vbaStrCat #645 __vbaStrMove __vbaFreeStr __vbaFreeVar __vbaLenBstrB 1207->1209 1212 475155-47519a __vbaFreeStr __vbaFreeVar 1208->1212 1213 4752e6-4753ac __vbaStrCopy call 474d56 __vbaStrMove __vbaStrCopy __vbaStrMove call 4785bc __vbaStrMove * 2 #716 __vbaVarZero __vbaFreeStrList 1209->1213 1214 4755a5-4755e8 #685 __vbaObjSet 1209->1214 1224 4753af-475591 #712 __vbaStrMove __vbaStrCat __vbaVarDup #667 __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaChkstk * 2 __vbaObjVar __vbaLateMemCall __vbaFreeStrList __vbaFreeVarList #645 __vbaStrMove __vbaFreeVar __vbaLenBstrB 1213->1224 1219 47560a 1214->1219 1220 4755ea-475608 __vbaHresultCheckObj 1214->1220 1223 475611-47569d __vbaFreeObj __vbaFreeVar __vbaFreeStr * 2 1219->1223 1220->1223 1224->1224 1226 475597-47559e 1224->1226 1226->1214
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                              • __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                              • #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                              • __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                              • __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                              • #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                              • __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                              • __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaErrorOverflow.MSVBVM60 ref: 00474EF6
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,?,?,?,?,?,?,00000001), ref: 00474F19
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 00474F49
                                                                              • #716.MSVBVM60(?,Shell.Application,00000000,000000FF,?,?,?,00000000,00403046), ref: 00474F60
                                                                              • __vbaVarZero.MSVBVM60(?,Shell.Application,00000000,000000FF,?,?,?,00000000,00403046), ref: 00474F6E
                                                                              • __vbaChkstk.MSVBVM60(Items,00000000), ref: 00474FC8
                                                                              • __vbaVarLateMemCallLdRf.MSVBVM60(?,?,Namespace,00000001,Items,00000000), ref: 00474FE7
                                                                              • __vbaVarLateMemCallLd.MSVBVM60(?,00000000,Shell.Application,00000000,000000FF,?,?,?,00000000,00403046), ref: 00474FF4
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,000000FF,?,?,?,00000000,00403046), ref: 00475001
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,000000FF,?,?,?,00000000,00403046), ref: 0047500F
                                                                              • __vbaChkstk.MSVBVM60(CopyHere,00000002,?,?,?,?,?,?,000000FF,?,?,?,00000000,00403046), ref: 0047502A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Chkstk$Error$CallFreeLateMove$#537#632#716BstrListOverflowZero
                                                                              • String ID: ...&$ /C $02003A033326206B1B02280424$@RD /S /Q "$@TITLE Removing $ComSpec$CopyHere$FUSYqZVTEHjMhHlMelxqGdTyoQIpzEBG$HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*RD_$Items$Namespace$RegWrite$Shell.Application$TEMP$Temporary Directory * for
                                                                              • API String ID: 617323235-3298692276
                                                                              • Opcode ID: 3bd60ee1e2814b268d7981a986dafba0d0d4267d184f31cb28bbdbe9abb7f8c1
                                                                              • Instruction ID: cc580eaa4ccbeea5077697ac5b6d6f3611ef8cd4b5ea1ab677a53cb41e460ee3
                                                                              • Opcode Fuzzy Hash: 3bd60ee1e2814b268d7981a986dafba0d0d4267d184f31cb28bbdbe9abb7f8c1
                                                                              • Instruction Fuzzy Hash: 43324B71D00208AADF10EFA1CD46BDEBBBCAF08705F1081AAF505BB191EB795B498F55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1227 473b27-473ba2 __vbaChkstk __vbaOnError __vbaObjSetAddref 1229 473bc7 1227->1229 1230 473ba4-473bc5 __vbaHresultCheckObj 1227->1230 1231 473bce-473bf9 __vbaI2I4 1229->1231 1230->1231 1233 473c1e 1231->1233 1234 473bfb-473c1c __vbaHresultCheckObj 1231->1234 1235 473c25-473c4a 1233->1235 1234->1235 1237 473c6f 1235->1237 1238 473c4c-473c6d __vbaHresultCheckObj 1235->1238 1239 473c76-473c9b 1237->1239 1238->1239 1241 473cc0 1239->1241 1242 473c9d-473cbe __vbaHresultCheckObj 1239->1242 1243 473cc7-473cf3 __vbaI2I4 1241->1243 1242->1243 1245 473cf5-473d16 __vbaHresultCheckObj 1243->1245 1246 473d18 1243->1246 1247 473d1f-473d49 1245->1247 1246->1247 1249 473d6e 1247->1249 1250 473d4b-473d6c __vbaHresultCheckObj 1247->1250 1251 473d75-473d85 1249->1251 1250->1251 1252 4741fd 1251->1252 1253 473d8b-473dc1 __vbaFpI4 1251->1253 1255 474202-47427a __vbaErrorOverflow __vbaChkstk __vbaOnError __vbaStrCopy 1252->1255 1256 473dc7-473df1 1253->1256 1257 474174-4741eb __vbaObjSetAddref __vbaFileOpen __vbaPutOwner3 __vbaFileClose __vbaExitProc __vbaFreeObj __vbaAryDestruct 1253->1257 1260 474294 1255->1260 1261 47427c-474292 __vbaNew2 1255->1261 1264 473e16 1256->1264 1265 473df3-473e14 __vbaHresultCheckObj 1256->1265 1263 47429b-4742bb 1260->1263 1261->1263 1270 4742d4 1263->1270 1271 4742bd-4742d2 __vbaHresultCheckObj 1263->1271 1266 473e1d-473e2d 1264->1266 1265->1266 1266->1252 1267 473e33-473e69 __vbaFpI4 1266->1267 1272 47416f 1267->1272 1273 473e6f-473eac 1267->1273 1274 4742d8-474301 call 460a38 __vbaSetSystemError 1270->1274 1271->1274 1272->1257 1278 473eb2-473edc 1273->1278 1279 47416a 1273->1279 1280 474307-474339 #525 __vbaStrMove __vbaStrToAnsi call 460a90 1274->1280 1281 4743be-4743e8 __vbaFreeStr 1274->1281 1286 473f01 1278->1286 1287 473ede-473eff __vbaHresultCheckObj 1278->1287 1279->1272 1285 47433e-47436f __vbaSetSystemError __vbaStrToUnicode __vbaFreeStr 1280->1285 1285->1281 1288 474371-47438c __vbaInStr 1285->1288 1289 473f08-473f39 1286->1289 1287->1289 1290 47438e-4743b9 #616 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr 1288->1290 1291 4743fd __vbaErrorOverflow 1288->1291 1289->1252 1292 473f3f-473f4b __vbaFpI4 1289->1292 1290->1281 1293 473ff1-473ffe __vbaUbound 1292->1293 1294 473f51-473fa1 1292->1294 1295 474165 1293->1295 1296 474004-474068 1293->1296 1299 473fc6 1294->1299 1300 473fa3-473fc4 __vbaHresultCheckObj 1294->1300 1295->1279 1302 47408d 1296->1302 1303 47406a-47408b __vbaHresultCheckObj 1296->1303 1301 473fcd-473fec __vbaRedim 1299->1301 1300->1301 1301->1295 1304 474094-4740bf __vbaPowerR8 1302->1304 1303->1304 1305 4740c1-4740c7 1304->1305 1306 4740c9-4740d5 _adj_fdivr_m64 1304->1306 1307 4740da-4740de 1305->1307 1306->1307 1307->1252 1308 4740e4-474136 __vbaR8IntI4 #573 __vbaVarCat __vbaStrVarVal #581 __vbaFpUI1 1307->1308 1308->1255 1309 47413c-474162 __vbaDerefAry1 __vbaFreeStr __vbaFreeVarList 1308->1309 1309->1295
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00473B45
                                                                              • __vbaOnError.MSVBVM60(00000001,?,?,?,?,00403046), ref: 00473B67
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000001,?,?,?,?,00403046), ref: 00473B78
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464480,0000009C), ref: 00473BBA
                                                                              • __vbaI2I4.MSVBVM60(00000000,?,00464480,0000009C), ref: 00473BD0
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464480,0000016C), ref: 00473C11
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464480,00000154), ref: 00473C62
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464480,00000164), ref: 00473CB3
                                                                              • __vbaI2I4.MSVBVM60(00000000,?,00464480,00000164), ref: 00473CCA
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464480,0000011C), ref: 00473D0B
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464480,00000110), ref: 00473D61
                                                                              • __vbaFpI4.MSVBVM60(00000000,?,00464480,00000110), ref: 00473D8B
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$CheckHresult$AddrefChkstkError
                                                                              • String ID:
                                                                              • API String ID: 2229015355-0
                                                                              • Opcode ID: c2210f0d9c95748c15e1fd271dc4be1d52d21af44cf1a49b3159867ec5db40ae
                                                                              • Instruction ID: b7d473f562deb77165e4ea8e55d2e539e5870b403ee383a8654c1acfbaa8a4ea
                                                                              • Opcode Fuzzy Hash: c2210f0d9c95748c15e1fd271dc4be1d52d21af44cf1a49b3159867ec5db40ae
                                                                              • Instruction Fuzzy Hash: D6222770D10228EFDF20AFA1CC46BEDBBB8BF05305F1080EAE149B6191DB785A949F15
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00472375,?,00000000,00000000,00000000,00463A4C), ref: 00476792
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 004767BF
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 004767CD
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,?,000000FF,?,?,?,00000000,00403046), ref: 004767E1
                                                                              • __vbaStrCopy.MSVBVM60(00460A74,?,000000FF,?,?,?,00000000,00403046), ref: 004767FA
                                                                              • #619.MSVBVM60(?,00004008,00000001), ref: 0047681D
                                                                              • __vbaVarTstNe.MSVBVM60(?,?,?,00004008,00000001), ref: 00476838
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00004008,00000001), ref: 00476844
                                                                              • __vbaStrCat.MSVBVM60(00460E8C,?,?,?,?,00004008,00000001), ref: 00476860
                                                                              • __vbaStrMove.MSVBVM60(00460E8C,?,?,?,?,00004008,00000001), ref: 0047686A
                                                                              • __vbaStrCat.MSVBVM60(SQLite3.dll,?,?,?,?,00004008,00000001), ref: 00476892
                                                                              • __vbaStrMove.MSVBVM60(SQLite3.dll,?,?,?,?,00004008,00000001), ref: 0047689C
                                                                              • __vbaStrToAnsi.MSVBVM60(000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768A6
                                                                              • __vbaSetSystemError.MSVBVM60(00000000,000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768B4
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,000000FF,00000000,000000FF,00000000,SQLite3.dll,?,?,?,?,00004008,00000001), ref: 004768CB
                                                                              • #685.MSVBVM60(?,00000000,00403046), ref: 004768EE
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00000000,00403046), ref: 004768F8
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463680,0000004C), ref: 00476927
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00476945
                                                                              • __vbaFreeObj.MSVBVM60(?,?,?,?,00000000,00403046), ref: 00476950
                                                                              • __vbaStrCat.MSVBVM60(SQLite3_StdCall.dll,?,?,?,?,00004008,00000001), ref: 0047698B
                                                                              • __vbaStrMove.MSVBVM60(SQLite3_StdCall.dll,?,?,?,?,00004008,00000001), ref: 00476995
                                                                              • __vbaStrToAnsi.MSVBVM60(000000FF,00000000,SQLite3_StdCall.dll,?,?,?,?,00004008,00000001), ref: 0047699F
                                                                              • __vbaSetSystemError.MSVBVM60(00000000,000000FF,00000000,SQLite3_StdCall.dll,?,?,?,?,00004008,00000001), ref: 004769AD
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,000000FF,00000000,000000FF,00000000,SQLite3_StdCall.dll,?,?,?,?,00004008,00000001), ref: 004769C4
                                                                              • #685.MSVBVM60(?,00000000,00403046), ref: 004769E3
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00000000,00403046), ref: 004769ED
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463680,0000004C), ref: 00476A1C
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00476A3A
                                                                              • __vbaFreeObj.MSVBVM60(?,?,?,?,00000000,00403046), ref: 00476A45
                                                                              • __vbaFreeStr.MSVBVM60(00476AA2,?,?,?,00004008,00000001), ref: 00476A9C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$List$ErrorMove$#685AnsiCheckCopyHresultSystem$#619Chkstk
                                                                              • String ID: SQLite3.dll$SQLite3_StdCall.dll
                                                                              • API String ID: 2441307080-3208965862
                                                                              • Opcode ID: d3feac4fe046da84c6d1d08438f91daafbc820d4a879218718bc2572bbf12789
                                                                              • Instruction ID: 9671b5997b303587e578be7d69a1bff073c8d2b44df031cd71ad9d656ff5c069
                                                                              • Opcode Fuzzy Hash: d3feac4fe046da84c6d1d08438f91daafbc820d4a879218718bc2572bbf12789
                                                                              • Instruction Fuzzy Hash: 4681EBB1C00208EADB10EFE1C945BDEBBB9AF18709F20816EE115B7191DB795B08DF59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1335 476607-476665 __vbaChkstk __vbaOnError 1336 476667 1335->1336 1337 47666c-47667a 1335->1337 1338 47673a-47675c 1336->1338 1339 476681-476690 1337->1339 1340 47667c 1337->1340 1342 476696-4766a4 1339->1342 1343 476771-4767e8 __vbaErrorOverflow __vbaChkstk __vbaStrCopy __vbaOnError __vbaStrCmp 1339->1343 1340->1338 1344 4766b5-4766bb 1342->1344 1348 4767ff-47684f #619 __vbaVarTstNe __vbaFreeVar 1343->1348 1349 4767ea-4767fa __vbaStrCopy 1343->1349 1346 476723-476735 call 460980 __vbaSetSystemError 1344->1346 1347 4766bd-4766cf 1344->1347 1346->1338 1347->1343 1352 4766d5-476721 call 460088 __vbaSetSystemError #537 __vbaStrMove __vbaStrCat __vbaStrMove __vbaFreeStr 1347->1352 1350 476851-47686a __vbaStrCat __vbaStrMove 1348->1350 1351 47686f-47687d 1348->1351 1349->1348 1350->1351 1354 476883-4768ac __vbaStrCat __vbaStrMove __vbaStrToAnsi call 4602f4 1351->1354 1355 476968-476976 1351->1355 1352->1343 1366 4766b2 1352->1366 1363 4768b1-4768e1 __vbaSetSystemError __vbaFreeStrList 1354->1363 1360 47697c-4769a5 __vbaStrCat __vbaStrMove __vbaStrToAnsi call 4602f4 1355->1360 1361 476a5a-476a61 1355->1361 1369 4769aa-4769da __vbaSetSystemError __vbaFreeStrList 1360->1369 1362 476a65-476aa1 __vbaFreeStr 1361->1362 1363->1355 1367 4768e7-476918 #685 __vbaObjSet 1363->1367 1366->1344 1372 476934 1367->1372 1373 47691a-476932 __vbaHresultCheckObj 1367->1373 1369->1361 1370 4769dc-476a0d #685 __vbaObjSet 1369->1370 1376 476a0f-476a27 __vbaHresultCheckObj 1370->1376 1377 476a29 1370->1377 1375 47693b-476963 __vbaFreeStrList __vbaFreeObj 1372->1375 1373->1375 1375->1362 1378 476a30-476a58 __vbaFreeStrList __vbaFreeObj 1376->1378 1377->1378 1378->1362
                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00476623
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 00476653
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ChkstkError
                                                                              • String ID: SQLite3.dll
                                                                              • API String ID: 3554142864-267368082
                                                                              • Opcode ID: 484a005cfa5b5e69dbbf3964b54806a4be954acde17ad3dadc91d1a426a71ff9
                                                                              • Instruction ID: 211f33c6d7ffc44f0a39f0c169bfc08ece26a613cac927e5ae37a47fa42bc2b5
                                                                              • Opcode Fuzzy Hash: 484a005cfa5b5e69dbbf3964b54806a4be954acde17ad3dadc91d1a426a71ff9
                                                                              • Instruction Fuzzy Hash: 1F910BB1D00208EBDB10EFE5C945BDEBBB9AF04709F20816EE015BB291D7799B44CB59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 004761EA
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0047621A
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0047622E
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 00476241
                                                                              • __vbaStrCopy.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 0047624E
                                                                              • __vbaStrMove.MSVBVM60 ref: 00476269
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(?,?), ref: 00476280
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?), ref: 0047629D
                                                                              • #716.MSVBVM60(?,00000000,00000000,?,?), ref: 004762A7
                                                                              • __vbaObjVar.MSVBVM60(?,?,00000000,00000000,?,?), ref: 004762B0
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,?,?,00000000,00000000,?,?), ref: 004762BA
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,?,?,?,?,00000000,00000000,?,00000000,?,?,00000000,00000000,?,?), ref: 004762D9
                                                                              • __vbaFreeVar.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 004762E4
                                                                              • __vbaVarVargNofree.MSVBVM60 ref: 0047630D
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,00000000), ref: 0047631E
                                                                              • __vbaVarVargNofree.MSVBVM60(00000000,?,00000008,00000000), ref: 0047632D
                                                                              • __vbaVarCat.MSVBVM60(?,00000000,00000000,?,00000008,00000000), ref: 00476337
                                                                              • __vbaChkstk.MSVBVM60(?,00000000,00000000,?,00000008,00000000), ref: 00476341
                                                                              • __vbaLateMemCallLd.MSVBVM60(?,?,RegRead,00000001,?,00000000,00000000,?,00000008,00000000), ref: 0047635A
                                                                              • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,000000FF,?,?,?,?,00403046), ref: 00476367
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 00476376
                                                                              • __vbaFreeObj.MSVBVM60(004763D9,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 004763D3
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$FreeMove$ChkstkList$Bstr$#516#631CopyErrorNofreeVarg$#537#608#632#716AddrefCallLate
                                                                              • String ID: 02003A033326206B1B02280424$FUSYqZVTEHjMhHlMelxqGdTyoQIpzEBG$RegRead
                                                                              • API String ID: 3804794385-224662146
                                                                              • Opcode ID: bcd3bf1e391ac3452a41869e287710633c783c503f1a2eeb37047072cf4ec354
                                                                              • Instruction ID: 1ac84a9a35a0456878b610084f01a5b5605edb7866201df187c88e6c7d8b84c1
                                                                              • Opcode Fuzzy Hash: bcd3bf1e391ac3452a41869e287710633c783c503f1a2eeb37047072cf4ec354
                                                                              • Instruction Fuzzy Hash: 5351EB71D00108ABDB10EFD1C846BDEBB7CAF04709F10816BB515BB185EB799B498BA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046), ref: 00477674
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 004776A4
                                                                                • Part of subcall function 0047782C: __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,00000000,00403046), ref: 00477848
                                                                                • Part of subcall function 0047782C: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 0047786E
                                                                                • Part of subcall function 0047782C: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 00477879
                                                                                • Part of subcall function 0047782C: __vbaOnError.MSVBVM60(00000001,?,?,?,00000000,00403046), ref: 00477880
                                                                                • Part of subcall function 0047782C: __vbaObjSet.MSVBVM60(?,00000000,?,00000001,?,?,?,00000000,00403046), ref: 00477892
                                                                                • Part of subcall function 0047782C: __vbaForEachCollAd.MSVBVM60(?,?,?,?,00000000,?,00000001,?,?,?,00000000,00403046), ref: 004778A2
                                                                                • Part of subcall function 0047782C: #520.MSVBVM60(?,00004008,?), ref: 0047793F
                                                                                • Part of subcall function 0047782C: __vbaStrVarMove.MSVBVM60(?,?,00004008,?), ref: 00477948
                                                                                • Part of subcall function 0047782C: __vbaStrMove.MSVBVM60(?,?,00004008,?), ref: 00477952
                                                                                • Part of subcall function 0047782C: __vbaFreeVar.MSVBVM60(?,?,00004008,?), ref: 0047795A
                                                                                • Part of subcall function 0047782C: __vbaExitProc.MSVBVM60(?,?,00004008,?), ref: 0047795F
                                                                                • Part of subcall function 0047782C: __vbaFreeObj.MSVBVM60(004779CA,?,?,00004008,?), ref: 0047799C
                                                                                • Part of subcall function 0047782C: __vbaFreeObj.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779A4
                                                                                • Part of subcall function 0047782C: __vbaFreeObj.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779AC
                                                                                • Part of subcall function 0047782C: __vbaFreeStr.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779B4
                                                                                • Part of subcall function 0047782C: __vbaFreeStr.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779BC
                                                                                • Part of subcall function 0047782C: __vbaFreeStr.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779C4
                                                                              • __vbaVarMove.MSVBVM60 ref: 004776CF
                                                                                • Part of subcall function 0047782C: __vbaRedim.MSVBVM60(00000880,00000010,?,00000000,00000000,000000FF,00000000), ref: 004778BF
                                                                                • Part of subcall function 0047782C: __vbaObjSetAddref.MSVBVM60(?,?,?,00000002,?,00000409,?,00000001,?,?,?,00000000,00403046), ref: 004778DC
                                                                                • Part of subcall function 0047782C: #715.MSVBVM60(?,00000000,?,?,?,00000002,?,00000409,?,00000001,?,?,?,00000000,00403046), ref: 004778E6
                                                                                • Part of subcall function 0047782C: __vbaErase.MSVBVM60(00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001,?,?,?,00000000), ref: 004778F1
                                                                                • Part of subcall function 0047782C: __vbaStrVarMove.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 004778FA
                                                                                • Part of subcall function 0047782C: __vbaStrMove.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 00477904
                                                                                • Part of subcall function 0047782C: __vbaFreeObj.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 0047790C
                                                                                • Part of subcall function 0047782C: __vbaFreeVar.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 00477914
                                                                                • Part of subcall function 0047782C: __vbaExitEachColl.MSVBVM60(?,?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 0047791D
                                                                              • __vbaVarMove.MSVBVM60(Win32_BIOS,SerialNumber), ref: 004776FA
                                                                              • __vbaLenVar.MSVBVM60(00000008,?,?,?,?,?,?,?,?,?,?,?,Win32_BIOS,SerialNumber), ref: 0047771F
                                                                              • __vbaVarSub.MSVBVM60(?,00000002,00000000,00000008,?,?,?,?,?,?,?,?,?,?,?,Win32_BIOS), ref: 00477730
                                                                              • __vbaI4Var.MSVBVM60(00000000,?,00000002,00000000,00000008,?), ref: 00477736
                                                                              • #617.MSVBVM60(?,?,00000000,00000000,?,00000002,00000000,00000008,?), ref: 00477744
                                                                              • __vbaVarMove.MSVBVM60(?,?,00000000,00000000,?,00000002,00000000,00000008,?), ref: 0047774F
                                                                              • __vbaLenVar.MSVBVM60(00000008,000000FF,?,?,00000000,00000000,?,00000002,00000000,00000008,?), ref: 00477774
                                                                              • __vbaVarSub.MSVBVM60(?,00000002,00000000,00000008,000000FF,?,?,00000000,00000000,?,00000002,00000000,00000008,?), ref: 00477785
                                                                              • __vbaI4Var.MSVBVM60(00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000,00000000,?,00000002,00000000,00000008,?), ref: 0047778B
                                                                              • #619.MSVBVM60(?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000,00000000,?,00000002,00000000), ref: 00477799
                                                                              • __vbaVarMove.MSVBVM60(?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000,00000000,?,00000002,00000000), ref: 004777A4
                                                                              • __vbaVarCat.MSVBVM60(00000008,000000FF,?,?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000,00000000), ref: 004777BC
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,00000008,000000FF,?,?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000), ref: 004777C2
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000008,000000FF,?,?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000), ref: 004777CC
                                                                              • __vbaFreeVar.MSVBVM60(00000000,00000008,000000FF,?,?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?,00000000), ref: 004777D4
                                                                              • __vbaFreeVar.MSVBVM60(0047781A,00000000,00000008,000000FF,?,?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?), ref: 0047780C
                                                                              • __vbaFreeVar.MSVBVM60(0047781A,00000000,00000008,000000FF,?,?,000000FF,00000000,00000000,?,00000002,00000000,00000008,000000FF,?,?), ref: 00477814
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$Move$ChkstkCollCopyEachErrorExit$#520#617#619#715AddrefEraseProcRedim
                                                                              • String ID: ProcessorID$SerialNumber$Win32_BIOS$Win32_Processor
                                                                              • API String ID: 3091673300-628225305
                                                                              • Opcode ID: 629ccf14c06c1ba9c634a83e03f227f07665ca3811ad339682d5061789409326
                                                                              • Instruction ID: 13e64da5219ed8e8c38c921c2d0206958cd8e2ef6816208f8a574581ec17af54
                                                                              • Opcode Fuzzy Hash: 629ccf14c06c1ba9c634a83e03f227f07665ca3811ad339682d5061789409326
                                                                              • Instruction Fuzzy Hash: 8E419DB1C01209AACB11EFE1C946FDEBBBCAF04709F60856EA105B7185DB7C5B09CB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,00000000,00403046), ref: 00477848
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 0047786E
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 00477879
                                                                              • __vbaOnError.MSVBVM60(00000001,?,?,?,00000000,00403046), ref: 00477880
                                                                                • Part of subcall function 004779DE: __vbaChkstk.MSVBVM60(00000000,00403046,00000001,?,?,?,00000000,00403046), ref: 004779FC
                                                                                • Part of subcall function 004779DE: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046,00000001), ref: 00477A29
                                                                                • Part of subcall function 004779DE: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A37
                                                                                • Part of subcall function 004779DE: __vbaObjIs.MSVBVM60(00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A4B
                                                                                • Part of subcall function 004779DE: __vbaNew.MSVBVM60(004645DC,00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A63
                                                                                • Part of subcall function 004779DE: __vbaObjSet.MSVBVM60(0049607C,00000000,004645DC,00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A6E
                                                                                • Part of subcall function 004779DE: __vbaOnError.MSVBVM60(00000001,00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A7C
                                                                                • Part of subcall function 004779DE: __vbaHresultCheckObj.MSVBVM60(00000000,004645CC,0000001C), ref: 00477AD1
                                                                                • Part of subcall function 004779DE: __vbaObjVar.MSVBVM60(?), ref: 00477AE9
                                                                                • Part of subcall function 004779DE: __vbaObjSetAddref.MSVBVM60(?,00000000,?), ref: 00477AF3
                                                                                • Part of subcall function 004779DE: __vbaFreeVar.MSVBVM60(?,00000000,?), ref: 00477AFB
                                                                                • Part of subcall function 004779DE: __vbaExitProc.MSVBVM60(?,00000000,?), ref: 00477BF4
                                                                                • Part of subcall function 004779DE: __vbaFreeObj.MSVBVM60(00477C36,?,00000000,?), ref: 00477C28
                                                                                • Part of subcall function 004779DE: __vbaFreeStr.MSVBVM60(00477C36,?,00000000,?), ref: 00477C30
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00000001,?,?,?,00000000,00403046), ref: 00477892
                                                                              • __vbaForEachCollAd.MSVBVM60(?,?,?,?,00000000,?,00000001,?,?,?,00000000,00403046), ref: 004778A2
                                                                              • __vbaRedim.MSVBVM60(00000880,00000010,?,00000000,00000000,000000FF,00000000), ref: 004778BF
                                                                              • __vbaObjSetAddref.MSVBVM60(?,?,?,00000002,?,00000409,?,00000001,?,?,?,00000000,00403046), ref: 004778DC
                                                                              • #715.MSVBVM60(?,00000000,?,?,?,00000002,?,00000409,?,00000001,?,?,?,00000000,00403046), ref: 004778E6
                                                                              • __vbaErase.MSVBVM60(00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001,?,?,?,00000000), ref: 004778F1
                                                                              • __vbaStrVarMove.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 004778FA
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 00477904
                                                                              • __vbaFreeObj.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 0047790C
                                                                              • __vbaFreeVar.MSVBVM60(?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 00477914
                                                                              • __vbaExitEachColl.MSVBVM60(?,?,00000000,00000000,?,00000000,?,?,?,00000002,?,00000409,?,00000001), ref: 0047791D
                                                                              • #520.MSVBVM60(?,00004008,?), ref: 0047793F
                                                                              • __vbaStrVarMove.MSVBVM60(?,?,00004008,?), ref: 00477948
                                                                              • __vbaStrMove.MSVBVM60(?,?,00004008,?), ref: 00477952
                                                                              • __vbaFreeVar.MSVBVM60(?,?,00004008,?), ref: 0047795A
                                                                              • __vbaExitProc.MSVBVM60(?,?,00004008,?), ref: 0047795F
                                                                              • __vbaFreeObj.MSVBVM60(004779CA,?,?,00004008,?), ref: 0047799C
                                                                              • __vbaFreeObj.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779A4
                                                                              • __vbaFreeObj.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779AC
                                                                              • __vbaFreeStr.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779B4
                                                                              • __vbaFreeStr.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779BC
                                                                              • __vbaFreeStr.MSVBVM60(004779CA,?,?,00004008,?), ref: 004779C4
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$Move$CopyErrorExit$AddrefChkstkCollEachProc$#520#715CheckEraseHresultRedim
                                                                              • String ID:
                                                                              • API String ID: 3465422931-0
                                                                              • Opcode ID: b00d2d4b817b3e293386cf34caa5581344f7fdf26aded4cab8752628f0b9db86
                                                                              • Instruction ID: 70b99410dfaee4b616ced1d9ada476e923e7b77277989ea3fca3b96d392278cc
                                                                              • Opcode Fuzzy Hash: b00d2d4b817b3e293386cf34caa5581344f7fdf26aded4cab8752628f0b9db86
                                                                              • Instruction Fuzzy Hash: 3C41E8B184010CAADB00EFE2DD46EDDBB7CAF14709F50846EF515B60D2DA785B098B68
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000024,00403046,00000001,?,?,?,?,00403046), ref: 00474223
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000024,00403046,00000001), ref: 00474253
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,?,?,00000024,00403046,00000001), ref: 00474267
                                                                              • __vbaNew2.MSVBVM60(0045F530,00496010,000000FF,?,?,?,00000024,00403046,00000001), ref: 00474286
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,0045FBD8,00000058), ref: 004742CA
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,000000FF), ref: 004742EC
                                                                              • #525.MSVBVM60(00000104,?,?,000000FF), ref: 00474313
                                                                              • __vbaStrMove.MSVBVM60(00000104,?,?,000000FF), ref: 0047431D
                                                                              • __vbaStrToAnsi.MSVBVM60(?,?,00000104,?,?,000000FF), ref: 00474330
                                                                              • __vbaSetSystemError.MSVBVM60(000000FF,00000000,?,?,00000104,?,?,000000FF), ref: 00474341
                                                                              • __vbaStrToUnicode.MSVBVM60(?,?,000000FF,00000000,?,?,00000104,?,?,000000FF), ref: 0047434D
                                                                              • __vbaFreeStr.MSVBVM60(?,?,000000FF,00000000,?,?,00000104,?,?,000000FF), ref: 00474364
                                                                              • __vbaInStr.MSVBVM60(00000000,004644BC,?,00000001,?,?,000000FF,00000000,?,?,00000104,?,?,000000FF), ref: 00474384
                                                                              • #616.MSVBVM60(?,-00000001,00000000,004644BC,?,00000001,?,?,000000FF,00000000,?,?,00000104,?,?,000000FF), ref: 00474392
                                                                              • __vbaStrMove.MSVBVM60(?,-00000001,00000000,004644BC,?,00000001,?,?,000000FF,00000000,?,?,00000104,?,?,000000FF), ref: 0047439C
                                                                              • __vbaStrCat.MSVBVM60(00460A74,00000000,?,-00000001,00000000,004644BC,?,00000001,?,?,000000FF,00000000,?,?,00000104,?), ref: 004743A7
                                                                              • __vbaStrMove.MSVBVM60(00460A74,00000000,?,-00000001,00000000,004644BC,?,00000001,?,?,000000FF,00000000,?,?,00000104,?), ref: 004743B1
                                                                              • __vbaFreeStr.MSVBVM60(00460A74,00000000,?,-00000001,00000000,004644BC,?,00000001,?,?,000000FF,00000000,?,?,00000104,?), ref: 004743B9
                                                                              • __vbaFreeStr.MSVBVM60(004743E9,?,?,000000FF), ref: 004743E3
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ErrorFreeMove$System$#525#616AnsiCheckChkstkCopyHresultNew2Unicode
                                                                              • String ID:
                                                                              • API String ID: 3774617751-0
                                                                              • Opcode ID: 3a8712215192b9278ef0a0cbf339bc57b62f1c7d9c841231239fc1a155c2da84
                                                                              • Instruction ID: fe546ad337f2678857140c6127dab0d9f51bd037731dff51b881dc2639909591
                                                                              • Opcode Fuzzy Hash: 3a8712215192b9278ef0a0cbf339bc57b62f1c7d9c841231239fc1a155c2da84
                                                                              • Instruction Fuzzy Hash: 19513771900208EACB10EFE1C946BEEBBB8BF08749F10856AF405BA191DB795B15CB59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,00403046), ref: 00477D6E
                                                                              • __vbaOnError.MSVBVM60(00000001,?,00004008,?,00000000,00403046), ref: 00477D90
                                                                              • __vbaObjIs.MSVBVM60(00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477D9D
                                                                              • __vbaStrCopy.MSVBVM60(00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477DB5
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(00004008,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477DC8
                                                                              • __vbaStrCopy.MSVBVM60(00004008,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477DD5
                                                                              • __vbaStrMove.MSVBVM60(00004008), ref: 00477DF0
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(?,00000001,00004008), ref: 00477E07
                                                                              • #626.MSVBVM60(?,00000008,0000000A), ref: 00477E43
                                                                              • __vbaObjVar.MSVBVM60(?,?,00000008,0000000A), ref: 00477E4C
                                                                              • __vbaObjSetAddref.MSVBVM60(00496078,00000000,?,?,00000008,0000000A), ref: 00477E57
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,00004008,?,00000001,00000000,00000000,00496078,00000000,?,?,00000008,0000000A), ref: 00477E72
                                                                              • __vbaFreeVarList.MSVBVM60(00000003,?,?,?,00000001,?,00004008,?,00000000,00403046), ref: 00477E88
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477E9A
                                                                              • __vbaExitProc.MSVBVM60(?,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477EAC
                                                                              Strings
                                                                              • 3C1F3F1F2F1C263940, xrefs: 00477DAD
                                                                              • ukvQRHqRJzLYLpIlWZXDBJOLqJKtrSPE, xrefs: 00477DCD
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$FreeMove$List$BstrChkstk$#516#631AddrefCopyError$#537#608#626#632ExitProc
                                                                              • String ID: 3C1F3F1F2F1C263940$ukvQRHqRJzLYLpIlWZXDBJOLqJKtrSPE
                                                                              • API String ID: 2366459550-1397194434
                                                                              • Opcode ID: dba509ab03263201dc8a1fa24019f4c77c39def96c8c2acc181c2c2e7d96d421
                                                                              • Instruction ID: 75e67575ec62e1a9a802d5e4f66d357f196cc550dd2b9e34c3888990a444ced6
                                                                              • Opcode Fuzzy Hash: dba509ab03263201dc8a1fa24019f4c77c39def96c8c2acc181c2c2e7d96d421
                                                                              • Instruction Fuzzy Hash: 8441F172D40208AADB00EFD1CD41FDEBBBCAF08705F50856BF105B6181DB78AB098B69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00477C66
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00403046), ref: 00477C8C
                                                                              • __vbaOnError.MSVBVM60(00000001,?,?,?,?,00403046), ref: 00477C93
                                                                              • __vbaChkstk.MSVBVM60 ref: 00477CA8
                                                                                • Part of subcall function 00477D52: __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,00403046), ref: 00477D6E
                                                                                • Part of subcall function 00477D52: __vbaOnError.MSVBVM60(00000001,?,00004008,?,00000000,00403046), ref: 00477D90
                                                                                • Part of subcall function 00477D52: __vbaObjIs.MSVBVM60(00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477D9D
                                                                                • Part of subcall function 00477D52: __vbaStrCopy.MSVBVM60(00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477DB5
                                                                                • Part of subcall function 00477D52: __vbaStrMove.MSVBVM60(00004008,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477DC8
                                                                                • Part of subcall function 00477D52: __vbaStrCopy.MSVBVM60(00004008,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477DD5
                                                                                • Part of subcall function 00477D52: __vbaStrMove.MSVBVM60(00004008), ref: 00477DF0
                                                                                • Part of subcall function 00477D52: __vbaStrMove.MSVBVM60(?,00000001,00004008), ref: 00477E07
                                                                                • Part of subcall function 00477D52: #626.MSVBVM60(?,00000008,0000000A), ref: 00477E43
                                                                                • Part of subcall function 00477D52: __vbaObjVar.MSVBVM60(?,?,00000008,0000000A), ref: 00477E4C
                                                                                • Part of subcall function 00477D52: __vbaObjSetAddref.MSVBVM60(00496078,00000000,?,?,00000008,0000000A), ref: 00477E57
                                                                                • Part of subcall function 00477D52: __vbaFreeStrList.MSVBVM60(00000005,00004008,?,00000001,00000000,00000000,00496078,00000000,?,?,00000008,0000000A), ref: 00477E72
                                                                                • Part of subcall function 00477D52: __vbaFreeVarList.MSVBVM60(00000003,?,?,?,00000001,?,00004008,?,00000000,00403046), ref: 00477E88
                                                                                • Part of subcall function 00477D52: __vbaObjSetAddref.MSVBVM60(?,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477E9A
                                                                                • Part of subcall function 00477D52: __vbaExitProc.MSVBVM60(?,00000000,00000001,?,00004008,?,00000000,00403046), ref: 00477EAC
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,Instancesof,00000001), ref: 00477CC7
                                                                              • __vbaLateMemCallLd.MSVBVM60(?,00000000,?,00000000,Instancesof,00000001), ref: 00477CD1
                                                                              • __vbaObjVar.MSVBVM60(00000000,?,?,00000001,?,?,?,?,00403046), ref: 00477CDA
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,?,?,00000001,?,?,?,?,00403046), ref: 00477CE4
                                                                              • __vbaFreeObj.MSVBVM60(?,00000000,00000000,?,?,00000001,?,?,?,?,00403046), ref: 00477CEC
                                                                              • __vbaFreeVar.MSVBVM60(?,00000000,00000000,?,?,00000001,?,?,?,?,00403046), ref: 00477CF4
                                                                              • __vbaExitProc.MSVBVM60(?,00000000,00000000,?,?,00000001,?,?,?,?,00403046), ref: 00477D06
                                                                              • __vbaFreeStr.MSVBVM60(00477D3E,?,00000000,00000000,?,?,00000001,?,?,?,?,00403046), ref: 00477D38
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$AddrefChkstkCopyMove$ErrorExitListProc$#626CallLate
                                                                              • String ID: Instancesof
                                                                              • API String ID: 2485318882-902726884
                                                                              • Opcode ID: 09a9c9a63b7e1eb0e5c09f79064e8c52676e77a9c14350e8af690c252631effd
                                                                              • Instruction ID: a824ff9d68411a579737900273701bc64992bae9b124c577fc05f2312b75c4e2
                                                                              • Opcode Fuzzy Hash: 09a9c9a63b7e1eb0e5c09f79064e8c52676e77a9c14350e8af690c252631effd
                                                                              • Instruction Fuzzy Hash: 1D11FEB1940208AADB10EFA2C846FDEBBBCAF08709F50446EF501B6181DB7D5B4586A9
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Control-flow Graph

                                                                              • Executed
                                                                              • Not Executed
                                                                              control_flow_graph 1430 403528-403565 #100 1431 4035d6-4035e8 1430->1431 1432 403567-403596 1430->1432 1435 403657-4038df 1431->1435 1436 4035ea-4035f3 1431->1436 1433 403598-4035a2 1432->1433 1434 40360a-403655 1432->1434 1434->1435 1440 4038e0-40394f 1435->1440 1436->1434 1444 403951-403953 1440->1444 1445 403955-403967 1444->1445 1446 40398e-4039c5 1444->1446 1445->1446 1448 4039c7-403a18 1446->1448 1449 403a1a-403a40 1446->1449 1448->1449
                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: #100
                                                                              • String ID:
                                                                              • API String ID: 1341478452-0
                                                                              • Opcode ID: bdc1f430488024e5b4389963b29fed648de36a520a41458e4f225a93e612da78
                                                                              • Instruction ID: cdcfac356e6007bb4b526679c20a603825dcc3bbf0b886c9df6b83d2bf1e1212
                                                                              • Opcode Fuzzy Hash: bdc1f430488024e5b4389963b29fed648de36a520a41458e4f225a93e612da78
                                                                              • Instruction Fuzzy Hash: F871A6A254E3C15FD3038B748826196BFB5AE53211B1E45EBC4C1CF5F3D22A891AC7A7
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 100%
                                                                              			E10002BA6(intOrPtr _a4) {
                                                                              				void* _t6;
                                                                              
                                                                              				_t6 = HeapCreate(0 | _a4 == 0x00000000, 0x1000, 0); // executed
                                                                              				 *0x1000f414 = _t6;
                                                                              				if(_t6 != 0) {
                                                                              					 *0x1000fa08 = 1;
                                                                              					return 1;
                                                                              				} else {
                                                                              					return _t6;
                                                                              				}
                                                                              			}




                                                                              0x10002bbb
                                                                              0x10002bc1
                                                                              0x10002bc8
                                                                              0x10002bcf
                                                                              0x10002bd5
                                                                              0x10002bcb
                                                                              0x10002bcb
                                                                              0x10002bcb

                                                                              APIs
                                                                              • HeapCreate.KERNEL32(00000000,00001000,00000000,?,10001684,00000001,?,?,?,100017FD,?,?,?,1000C480,0000000C,100018B8), ref: 10002BBB
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CreateHeap
                                                                              • String ID:
                                                                              • API String ID: 10892065-0
                                                                              • Opcode ID: a83de431d14c63419ec4ab9d5296318696a712a6c16992bd94787ef972d81ffa
                                                                              • Instruction ID: c311978274c9caa8ecf07d6af32f45e080d60db0cf258d20384fc8bbefcc882c
                                                                              • Opcode Fuzzy Hash: a83de431d14c63419ec4ab9d5296318696a712a6c16992bd94787ef972d81ffa
                                                                              • Instruction Fuzzy Hash: 0BD05E726503559AF7009F706C48B233BDCD3853D5F10843AF80CC6564E674C590D650
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 21%
                                                                              			E10001120(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                                                                              				intOrPtr _t7;
                                                                              
                                                                              				_push(_a20);
                                                                              				_t7 = _a8;
                                                                              				_push(_a16);
                                                                              				_push(_a12);
                                                                              				_push(_t7);
                                                                              				_push(_a4); // executed
                                                                              				L100015D0(); // executed
                                                                              				return _t7;
                                                                              			}




                                                                              0x1000112c
                                                                              0x1000112d
                                                                              0x10001131
                                                                              0x10001136
                                                                              0x10001137
                                                                              0x10001138
                                                                              0x10001139
                                                                              0x10001141

                                                                              APIs
                                                                              • sqlite3_prepare16_v2.SQLITE3(?,?,?,?,?), ref: 10001139
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_prepare16_v2
                                                                              • String ID:
                                                                              • API String ID: 1340407962-0
                                                                              • Opcode ID: bc6019a111d4d8dbd0d998f3690513f1efbc87c65dbe872a7a1684eb4c3d2927
                                                                              • Instruction ID: 03e2bc6c8cc539468c94beb32275a187eb75a87b0963e0922c3e31f1789e0279
                                                                              • Opcode Fuzzy Hash: bc6019a111d4d8dbd0d998f3690513f1efbc87c65dbe872a7a1684eb4c3d2927
                                                                              • Instruction Fuzzy Hash: 19D0C2FA618601AF9218DA58D891C2BB3E9ABD8650F40C90CB59A83255D631E8148B76
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 50%
                                                                              			E10001080(intOrPtr _a4, intOrPtr _a8) {
                                                                              				intOrPtr _t3;
                                                                              
                                                                              				_t3 = _a8;
                                                                              				_push(_t3);
                                                                              				_push(_a4); // executed
                                                                              				L100015EE(); // executed
                                                                              				return _t3;
                                                                              			}




                                                                              0x10001080
                                                                              0x10001088
                                                                              0x10001089
                                                                              0x1000108a
                                                                              0x10001092

                                                                              APIs
                                                                              • sqlite3_open16.SQLITE3(?,?), ref: 1000108A
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_open16
                                                                              • String ID:
                                                                              • API String ID: 1455014357-0
                                                                              • Opcode ID: 967971a62b0b18f753a2276a8d01f82cb84d3405a27e8331317a0b1ad8a22679
                                                                              • Instruction ID: 5492270c36ba7e8e28a53e9d2e6af5a2cff7dc598ef46c341fe54a02ddc6a946
                                                                              • Opcode Fuzzy Hash: 967971a62b0b18f753a2276a8d01f82cb84d3405a27e8331317a0b1ad8a22679
                                                                              • Instruction Fuzzy Hash: 2FB012BEA14700BBD108E750DC42C2BB3D8FBE4641F00880DB8CA82200D531ED18C732
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 68%
                                                                              			E10001160(intOrPtr _a4) {
                                                                              				intOrPtr _t2;
                                                                              
                                                                              				_t2 = _a4;
                                                                              				_push(_t2); // executed
                                                                              				L10001630(); // executed
                                                                              				return _t2;
                                                                              			}




                                                                              0x10001160
                                                                              0x10001164
                                                                              0x10001165
                                                                              0x1000116d

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_step
                                                                              • String ID:
                                                                              • API String ID: 2272410440-0
                                                                              • Opcode ID: 588aad157e077848847e8120eb6669cd3cf03da9f4f494e15560c0e8f7bbab45
                                                                              • Instruction ID: 59b61a271f82e6a06090f50c2e84fa58f0576623fc70eb40ec9c665938a4774c
                                                                              • Opcode Fuzzy Hash: 588aad157e077848847e8120eb6669cd3cf03da9f4f494e15560c0e8f7bbab45
                                                                              • Instruction Fuzzy Hash: 3EA024FFC0010013D000C5507C05C0771445770540F044430710441001D031F51CC517
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 100%
                                                                              			E10001A35() {
                                                                              				void* _t1;
                                                                              
                                                                              				_t1 = E100019C3(0); // executed
                                                                              				return _t1;
                                                                              			}




                                                                              0x10001a37
                                                                              0x10001a3d

                                                                              APIs
                                                                              • __encode_pointer.LIBCMT ref: 10001A37
                                                                                • Part of subcall function 100019C3: TlsGetValue.KERNEL32(00000000,?,10001A3C,00000000,10006AA8,1000F5B0,00000000,00000314,?,10004D72,1000F5B0,Microsoft Visual C++ Runtime Library,00012010), ref: 100019D5
                                                                                • Part of subcall function 100019C3: TlsGetValue.KERNEL32(00000007,?,10001A3C,00000000,10006AA8,1000F5B0,00000000,00000314,?,10004D72,1000F5B0,Microsoft Visual C++ Runtime Library,00012010), ref: 100019EC
                                                                                • Part of subcall function 100019C3: RtlEncodePointer.NTDLL(00000000,?,10001A3C,00000000,10006AA8,1000F5B0,00000000,00000314,?,10004D72,1000F5B0,Microsoft Visual C++ Runtime Library,00012010), ref: 10001A2A
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Value$EncodePointer__encode_pointer
                                                                              • String ID:
                                                                              • API String ID: 2585649348-0
                                                                              • Opcode ID: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                                                                              • Instruction ID: dda31fdfbb4e33bbe888639834df82cdb4b0857e3ff607c8449edd67ef30d750
                                                                              • Opcode Fuzzy Hash: 626ded885c0b6a47c33717e93208713095e5c780cda27b978e7e12efcbcc7c99
                                                                              • Instruction Fuzzy Hash:
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e7e2718d001ac92568d9352dc388b1ac759e1c189bf91f1e30e5a572d44ddd65
                                                                              • Instruction ID: fe8d0e968ddd184c975a07449d870746b2f2046fabcf2dfa8587ff99811d1dc1
                                                                              • Opcode Fuzzy Hash: e7e2718d001ac92568d9352dc388b1ac759e1c189bf91f1e30e5a572d44ddd65
                                                                              • Instruction Fuzzy Hash: F3B01230384101AB570046A46C1252721D0E7403C2F210C33E845D6394F618DF40412F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 1cac8e1ba340333d4e9bc559fc9f219f1838eaef0beb46e68870c61bd525b357
                                                                              • Instruction ID: d056a6c8b9eafeb2b1eac192a12daafb01cae5ca68b55cc8250566760325460f
                                                                              • Opcode Fuzzy Hash: 1cac8e1ba340333d4e9bc559fc9f219f1838eaef0beb46e68870c61bd525b357
                                                                              • Instruction Fuzzy Hash: DDB012243943019A530046D46C11D2321D0D7207C0F244C33E045D1180E629DF00412F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e862b879db2c8f28aebd5e5aa4b5d3f0e38bd069a11dbd3516afdf34f9d77db7
                                                                              • Instruction ID: 22a9b7260a410e889aacdb6e10c6c9d341136a5e7505fc4fefe1020efb4e1d1e
                                                                              • Opcode Fuzzy Hash: e862b879db2c8f28aebd5e5aa4b5d3f0e38bd069a11dbd3516afdf34f9d77db7
                                                                              • Instruction Fuzzy Hash: 3AB012903C41059AB2004A549C0393331C1A300780B200C33E050E12C5EB18DD04426F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: e6558873094eb3297cc5767b335d7ce424c52d6103b380dfa7881b982475657e
                                                                              • Instruction ID: ddb9ce7ed6e865cc24d8c96a0968da39dd74da271a31df0ad0c597cd165d039e
                                                                              • Opcode Fuzzy Hash: e6558873094eb3297cc5767b335d7ce424c52d6103b380dfa7881b982475657e
                                                                              • Instruction Fuzzy Hash: E7B012203C4102AE565087945C1952331C0AF10BC07318C73E004E11C4EA18DD01C12F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: a3d209513755cd1724564f5d18ec87445a8492ba904a25c9d4453776a15a14fe
                                                                              • Instruction ID: abaf6b613ea33c406ecebaf2760da3501fb6fe5d9efdf0ba150f781109cba599
                                                                              • Opcode Fuzzy Hash: a3d209513755cd1724564f5d18ec87445a8492ba904a25c9d4453776a15a14fe
                                                                              • Instruction Fuzzy Hash: 42B012103C4011BB92008A549C1292721C4E3503C1F210C33E042D11C4FE18DD10C52F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 3b1bc077d2cc0ed7ac0db021bdc83448d4da7c70cdea721c4f042aa0f3219ae9
                                                                              • Instruction ID: 2d366282229839a13494a838e5dde3fbc19ebea70084792dbf390cc3ef474a1e
                                                                              • Opcode Fuzzy Hash: 3b1bc077d2cc0ed7ac0db021bdc83448d4da7c70cdea721c4f042aa0f3219ae9
                                                                              • Instruction Fuzzy Hash: A5B012203E53029A634046E44C0162621D093603C0B608C33F400E11A0E658DF00832F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 14d89c1211fa866aead144389d03e9859ea25bfa84ef23567eb82587515626e4
                                                                              • Instruction ID: 4ae84200461ab93798341302bc4595e09986878229a15090e24ce27e7001bcf2
                                                                              • Opcode Fuzzy Hash: 14d89c1211fa866aead144389d03e9859ea25bfa84ef23567eb82587515626e4
                                                                              • Instruction Fuzzy Hash: 0FB01220388101AF935047685C0152A21D097443C27214C33FC50E5394E658DE40862F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID:
                                                                              • String ID:
                                                                              • API String ID:
                                                                              • Opcode ID: 923c43f746f4f5a03222047161cfb552c3aadf4ee60f2d1c252951eeb68f0299
                                                                              • Instruction ID: e7398f9175ecf90460c3b701834797c04911fcc2380558a4fc0b0a0e6fb307c9
                                                                              • Opcode Fuzzy Hash: 923c43f746f4f5a03222047161cfb552c3aadf4ee60f2d1c252951eeb68f0299
                                                                              • Instruction Fuzzy Hash: 3AB01210384101FF9700C7545E1192322C0D304340B210C33E002E11C4F71CED008D2F
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 85%
                                                                              			E10001660(intOrPtr __eax, intOrPtr __ebx, intOrPtr __ecx, intOrPtr __edx, intOrPtr __edi, intOrPtr __esi, char _a4) {
                                                                              				intOrPtr _v0;
                                                                              				void* _v804;
                                                                              				intOrPtr _v808;
                                                                              				intOrPtr _v812;
                                                                              				intOrPtr _t6;
                                                                              				intOrPtr _t11;
                                                                              				intOrPtr _t12;
                                                                              				intOrPtr _t13;
                                                                              				long _t17;
                                                                              				intOrPtr _t21;
                                                                              				intOrPtr _t22;
                                                                              				intOrPtr _t25;
                                                                              				intOrPtr _t26;
                                                                              				intOrPtr _t27;
                                                                              				intOrPtr* _t31;
                                                                              				void* _t34;
                                                                              
                                                                              				_t27 = __esi;
                                                                              				_t26 = __edi;
                                                                              				_t25 = __edx;
                                                                              				_t22 = __ecx;
                                                                              				_t21 = __ebx;
                                                                              				_t6 = __eax;
                                                                              				_t34 = _t22 -  *0x1000e000; // 0x972e2467
                                                                              				if(_t34 == 0) {
                                                                              					asm("repe ret");
                                                                              				}
                                                                              				 *0x1000f0a0 = _t6;
                                                                              				 *0x1000f09c = _t22;
                                                                              				 *0x1000f098 = _t25;
                                                                              				 *0x1000f094 = _t21;
                                                                              				 *0x1000f090 = _t27;
                                                                              				 *0x1000f08c = _t26;
                                                                              				 *0x1000f0b8 = ss;
                                                                              				 *0x1000f0ac = cs;
                                                                              				 *0x1000f088 = ds;
                                                                              				 *0x1000f084 = es;
                                                                              				 *0x1000f080 = fs;
                                                                              				 *0x1000f07c = gs;
                                                                              				asm("pushfd");
                                                                              				_pop( *0x1000f0b0);
                                                                              				 *0x1000f0a4 =  *_t31;
                                                                              				 *0x1000f0a8 = _v0;
                                                                              				 *0x1000f0b4 =  &_a4;
                                                                              				 *0x1000eff0 = 0x10001;
                                                                              				_t11 =  *0x1000f0a8; // 0x0
                                                                              				 *0x1000efa4 = _t11;
                                                                              				 *0x1000ef98 = 0xc0000409;
                                                                              				 *0x1000ef9c = 1;
                                                                              				_t12 =  *0x1000e000; // 0x972e2467
                                                                              				_v812 = _t12;
                                                                              				_t13 =  *0x1000e004; // 0x68d1db98
                                                                              				_v808 = _t13;
                                                                              				 *0x1000efe8 = IsDebuggerPresent();
                                                                              				_push(1);
                                                                              				E10003052(_t14);
                                                                              				SetUnhandledExceptionFilter(0);
                                                                              				_t17 = UnhandledExceptionFilter(0x1000b200);
                                                                              				if( *0x1000efe8 == 0) {
                                                                              					_push(1);
                                                                              					E10003052(_t17);
                                                                              				}
                                                                              				return TerminateProcess(GetCurrentProcess(), 0xc0000409);
                                                                              			}



















                                                                              0x10001660
                                                                              0x10001660
                                                                              0x10001660
                                                                              0x10001660
                                                                              0x10001660
                                                                              0x10001660
                                                                              0x10001660
                                                                              0x10001666
                                                                              0x10001668
                                                                              0x10001668
                                                                              0x100018c8
                                                                              0x100018cd
                                                                              0x100018d3
                                                                              0x100018d9
                                                                              0x100018df
                                                                              0x100018e5
                                                                              0x100018eb
                                                                              0x100018f2
                                                                              0x100018f9
                                                                              0x10001900
                                                                              0x10001907
                                                                              0x1000190e
                                                                              0x10001915
                                                                              0x10001916
                                                                              0x1000191f
                                                                              0x10001927
                                                                              0x1000192f
                                                                              0x1000193a
                                                                              0x10001944
                                                                              0x10001949
                                                                              0x1000194e
                                                                              0x10001958
                                                                              0x10001962
                                                                              0x10001967
                                                                              0x1000196d
                                                                              0x10001972
                                                                              0x1000197e
                                                                              0x10001983
                                                                              0x10001985
                                                                              0x1000198d
                                                                              0x10001998
                                                                              0x100019a5
                                                                              0x100019a7
                                                                              0x100019a9
                                                                              0x100019ae
                                                                              0x100019c2

                                                                              APIs
                                                                              • IsDebuggerPresent.KERNEL32 ref: 10001978
                                                                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 1000198D
                                                                              • UnhandledExceptionFilter.KERNEL32(1000B200), ref: 10001998
                                                                              • GetCurrentProcess.KERNEL32(C0000409), ref: 100019B4
                                                                              • TerminateProcess.KERNEL32(00000000), ref: 100019BB
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                                              • String ID:
                                                                              • API String ID: 2579439406-0
                                                                              • Opcode ID: 57c85d3975faa26e080eeb33c1acc69ed57795971e3da98ab19ce758cd5054dc
                                                                              • Instruction ID: 8c86a22f6aadf4131661c266c8f76a9f0100d46d6693ab505d47b615c8d02031
                                                                              • Opcode Fuzzy Hash: 57c85d3975faa26e080eeb33c1acc69ed57795971e3da98ab19ce758cd5054dc
                                                                              • Instruction Fuzzy Hash: D421BDB8804365DFF300DF68C8C97693BA4FB083C0F50842EE51897B6AE7B05985AF56
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 21%
                                                                              			E10001400(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                                                                              				intOrPtr _t7;
                                                                              
                                                                              				_push(_a20);
                                                                              				_t7 = _a8;
                                                                              				_push(_a16);
                                                                              				_push(_a12);
                                                                              				_push(_t7);
                                                                              				_push(_a4);
                                                                              				L10001582();
                                                                              				return _t7;
                                                                              			}




                                                                              0x1000140c
                                                                              0x1000140d
                                                                              0x10001411
                                                                              0x10001416
                                                                              0x10001417
                                                                              0x10001418
                                                                              0x10001419
                                                                              0x10001421

                                                                              APIs
                                                                              • sqlite3_bind_text16.SQLITE3(?,?,?,?,?), ref: 10001419
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_text16
                                                                              • String ID:
                                                                              • API String ID: 1347250716-0
                                                                              • Opcode ID: 7e897700b4fe6c47befe7acfc3a452aac11e7b550fad410a29524a0add8cc33b
                                                                              • Instruction ID: cd863e642cbdf7bc44bc87772d05640c6d176c37871859658321ca798976edea
                                                                              • Opcode Fuzzy Hash: 7e897700b4fe6c47befe7acfc3a452aac11e7b550fad410a29524a0add8cc33b
                                                                              • Instruction Fuzzy Hash: 58D092FA218200AF9208CA48C880C2BB3E9ABD8610F00C90CB59A83201C630E804CB32
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 21%
                                                                              			E10001320(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                                                                              				intOrPtr _t7;
                                                                              
                                                                              				_push(_a20);
                                                                              				_t7 = _a8;
                                                                              				_push(_a16);
                                                                              				_push(_a12);
                                                                              				_push(_t7);
                                                                              				_push(_a4);
                                                                              				L100015C4();
                                                                              				return _t7;
                                                                              			}




                                                                              0x1000132c
                                                                              0x1000132d
                                                                              0x10001331
                                                                              0x10001336
                                                                              0x10001337
                                                                              0x10001338
                                                                              0x10001339
                                                                              0x10001341

                                                                              APIs
                                                                              • sqlite3_bind_blob.SQLITE3(?,?,?,?,?), ref: 10001339
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_blob
                                                                              • String ID:
                                                                              • API String ID: 1191276018-0
                                                                              • Opcode ID: a9e8e74e5942ff7771d08398363b022259e1852d81f769326986522fad53697c
                                                                              • Instruction ID: c6fdda8b339ff2f0fd2af1177bb66395cf929ed1c8d40c0f142781820ca41b1e
                                                                              • Opcode Fuzzy Hash: a9e8e74e5942ff7771d08398363b022259e1852d81f769326986522fad53697c
                                                                              • Instruction Fuzzy Hash: 4AD0C2FA618701AF9208DA58D891D6BB3E9ABD8610F40C94CB69A83255D631E8148B76
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 21%
                                                                              			E100013D0(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20) {
                                                                              				intOrPtr _t7;
                                                                              
                                                                              				_push(_a20);
                                                                              				_t7 = _a8;
                                                                              				_push(_a16);
                                                                              				_push(_a12);
                                                                              				_push(_t7);
                                                                              				_push(_a4);
                                                                              				L10001540();
                                                                              				return _t7;
                                                                              			}




                                                                              0x100013dc
                                                                              0x100013dd
                                                                              0x100013e1
                                                                              0x100013e6
                                                                              0x100013e7
                                                                              0x100013e8
                                                                              0x100013e9
                                                                              0x100013f1

                                                                              APIs
                                                                              • sqlite3_bind_text.SQLITE3(?,?,?,?,?), ref: 100013E9
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_text
                                                                              • String ID:
                                                                              • API String ID: 3438637049-0
                                                                              • Opcode ID: 9ee9874a384bc3d611fe71fde8eda215c8a97c7afedf85179e9840328ae9b364
                                                                              • Instruction ID: 8a4b9ffa99cea77e73fb6857d45b954a4b954f9f77f2930b0724cf1a9983e7c3
                                                                              • Opcode Fuzzy Hash: 9ee9874a384bc3d611fe71fde8eda215c8a97c7afedf85179e9840328ae9b364
                                                                              • Instruction Fuzzy Hash: 77D092FA218200AF9208DA48D880C6BB3E9ABC8610F00C90CB69A83241D630E8048B32
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 28%
                                                                              			E10001390(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16) {
                                                                              				intOrPtr _t6;
                                                                              
                                                                              				_push(_a16);
                                                                              				_t6 = _a4;
                                                                              				_push(_a12);
                                                                              				_push(_a8);
                                                                              				_push(_t6);
                                                                              				L10001576();
                                                                              				return _t6;
                                                                              			}




                                                                              0x1000139c
                                                                              0x1000139d
                                                                              0x100013a1
                                                                              0x100013a2
                                                                              0x100013a3
                                                                              0x100013a4
                                                                              0x100013ac

                                                                              APIs
                                                                              • sqlite3_bind_int64.SQLITE3(?,?,?,?), ref: 100013A4
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_int64
                                                                              • String ID:
                                                                              • API String ID: 3007292478-0
                                                                              • Opcode ID: 687d5b17fb89607af9c39f8ef1cb28e2fa304501f7012edeca392fe81b89925a
                                                                              • Instruction ID: 5595d4f7a752157882702f6161fa524517bc49c56c0e11c93f4e3788eb439eba
                                                                              • Opcode Fuzzy Hash: 687d5b17fb89607af9c39f8ef1cb28e2fa304501f7012edeca392fe81b89925a
                                                                              • Instruction Fuzzy Hash: 9DC002BAA08701BFE244DB58CC86D6BB7E9EBD8340F40CD0DB99983255D670E8548B62
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 58%
                                                                              			E10001350(intOrPtr _a4, intOrPtr _a8, long long _a12) {
                                                                              				intOrPtr _t4;
                                                                              				void* _t6;
                                                                              
                                                                              				_t4 = _a8;
                                                                              				 *((long long*)(_t6 - 8)) = _a12;
                                                                              				_push(_t4);
                                                                              				_push(_a4);
                                                                              				L100015F4();
                                                                              				return _t4;
                                                                              			}





                                                                              0x10001354
                                                                              0x1000135f
                                                                              0x10001362
                                                                              0x10001363
                                                                              0x10001364
                                                                              0x1000136c

                                                                              APIs
                                                                              • sqlite3_bind_double.SQLITE3(?,?), ref: 10001364
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_double
                                                                              • String ID:
                                                                              • API String ID: 245191790-0
                                                                              • Opcode ID: bacae947cbeba8242dd4ff7c233edef80db46e5508b7f888a0ae7a08cf0c85d5
                                                                              • Instruction ID: b1ab30696761ab276986da22ab5d482b41463e49367ec48121952daf4bfc60e1
                                                                              • Opcode Fuzzy Hash: bacae947cbeba8242dd4ff7c233edef80db46e5508b7f888a0ae7a08cf0c85d5
                                                                              • Instruction Fuzzy Hash: 79C08C79408A00ABE200FB28C84182FB7A4EBC8200F408C8CFCD942341DA31D828C223
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 37%
                                                                              			E10001430(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                                                              				intOrPtr _t4;
                                                                              
                                                                              				_t4 = _a12;
                                                                              				_push(_t4);
                                                                              				_push(_a8);
                                                                              				_push(_a4);
                                                                              				L100015E8();
                                                                              				return _t4;
                                                                              			}




                                                                              0x10001430
                                                                              0x1000143c
                                                                              0x1000143d
                                                                              0x1000143e
                                                                              0x1000143f
                                                                              0x10001447

                                                                              APIs
                                                                              • sqlite3_bind_value.SQLITE3(?,?,?), ref: 1000143F
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_value
                                                                              • String ID:
                                                                              • API String ID: 3705748311-0
                                                                              • Opcode ID: 6137e268474ec1a47e2f6ca5ee6963fb0140e9112102374522979e1da2601660
                                                                              • Instruction ID: 973b81090ed11539d05f230da440cd444695c3da531c35a4c21ab05e3227f28f
                                                                              • Opcode Fuzzy Hash: 6137e268474ec1a47e2f6ca5ee6963fb0140e9112102374522979e1da2601660
                                                                              • Instruction Fuzzy Hash: 0FC04CBD504200BFD204C750D881D3BB3A9EBD4650F00C90DBC8942204D530ED14D662
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 37%
                                                                              			E10001450(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                                                              				intOrPtr _t4;
                                                                              
                                                                              				_t4 = _a12;
                                                                              				_push(_t4);
                                                                              				_push(_a8);
                                                                              				_push(_a4);
                                                                              				L10001600();
                                                                              				return _t4;
                                                                              			}




                                                                              0x10001450
                                                                              0x1000145c
                                                                              0x1000145d
                                                                              0x1000145e
                                                                              0x1000145f
                                                                              0x10001467

                                                                              APIs
                                                                              • sqlite3_bind_zeroblob.SQLITE3(?,?,?), ref: 1000145F
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_zeroblob
                                                                              • String ID:
                                                                              • API String ID: 1352825944-0
                                                                              • Opcode ID: 475de932b24149f2d9fcb5060da6b3d2081e157637162d929430ceb927e768b1
                                                                              • Instruction ID: 0b93ab566710dee31c9c11aedf319c1fcba30614b8852ed20c05e39291385290
                                                                              • Opcode Fuzzy Hash: 475de932b24149f2d9fcb5060da6b3d2081e157637162d929430ceb927e768b1
                                                                              • Instruction Fuzzy Hash: 91C04CBD504200BFD205CB10D885D3BB3A9EBD8690F04C90DBC8842205D531ED14D662
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 37%
                                                                              			E10001370(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12) {
                                                                              				intOrPtr _t4;
                                                                              
                                                                              				_t4 = _a12;
                                                                              				_push(_t4);
                                                                              				_push(_a8);
                                                                              				_push(_a4);
                                                                              				L10001588();
                                                                              				return _t4;
                                                                              			}




                                                                              0x10001370
                                                                              0x1000137c
                                                                              0x1000137d
                                                                              0x1000137e
                                                                              0x1000137f
                                                                              0x10001387

                                                                              APIs
                                                                              • sqlite3_bind_int.SQLITE3(?,?,?), ref: 1000137F
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_int
                                                                              • String ID:
                                                                              • API String ID: 147765541-0
                                                                              • Opcode ID: ef708b43550b596cc3536e5d5a82f8610fc8d5f603ca42db58b4bef0b62394ba
                                                                              • Instruction ID: 2f44fdc881f860e7a075b37679fba6086ec71c42760dbb40a7ea14538685bd7f
                                                                              • Opcode Fuzzy Hash: ef708b43550b596cc3536e5d5a82f8610fc8d5f603ca42db58b4bef0b62394ba
                                                                              • Instruction Fuzzy Hash: 3CC04CBD504200BFD204C710D881D7BB3A9EBD4650F40C90DBC8942204D530ED14D662
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 50%
                                                                              			E10001480(intOrPtr _a4, intOrPtr _a8) {
                                                                              				intOrPtr _t3;
                                                                              
                                                                              				_t3 = _a8;
                                                                              				_push(_t3);
                                                                              				_push(_a4);
                                                                              				L100015BE();
                                                                              				return _t3;
                                                                              			}




                                                                              0x10001480
                                                                              0x10001488
                                                                              0x10001489
                                                                              0x1000148a
                                                                              0x10001492

                                                                              APIs
                                                                              • sqlite3_bind_parameter_name.SQLITE3(?,?), ref: 1000148A
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_parameter_name
                                                                              • String ID:
                                                                              • API String ID: 2618026285-0
                                                                              • Opcode ID: b44a1e76cfbcf6c623c54f1991c4c6c4d833007ddde6d3cb1185d2f0e9a68379
                                                                              • Instruction ID: bb78a7f582106ed40e11e22aafd13da9b7382a5efa320f45b7ed612cea89d904
                                                                              • Opcode Fuzzy Hash: b44a1e76cfbcf6c623c54f1991c4c6c4d833007ddde6d3cb1185d2f0e9a68379
                                                                              • Instruction Fuzzy Hash: B1B012BE608300BBD104E710DC82C6BB3A8FBE4641F04890CB8CA42241D631EC18C732
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 50%
                                                                              			E100014A0(intOrPtr _a4, intOrPtr _a8) {
                                                                              				intOrPtr _t3;
                                                                              
                                                                              				_t3 = _a8;
                                                                              				_push(_t3);
                                                                              				_push(_a4);
                                                                              				L1000156A();
                                                                              				return _t3;
                                                                              			}




                                                                              0x100014a0
                                                                              0x100014a8
                                                                              0x100014a9
                                                                              0x100014aa
                                                                              0x100014b2

                                                                              APIs
                                                                              • sqlite3_bind_parameter_index.SQLITE3(?,?), ref: 100014AA
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_parameter_index
                                                                              • String ID:
                                                                              • API String ID: 739096278-0
                                                                              • Opcode ID: 52412b9ebc95147765212693689e38e702e3360a441e5ef14017d464c6458a72
                                                                              • Instruction ID: 2d9ea617439771efd28b640687820a1a44fee619f1fd70854fc98e4652275bf9
                                                                              • Opcode Fuzzy Hash: 52412b9ebc95147765212693689e38e702e3360a441e5ef14017d464c6458a72
                                                                              • Instruction Fuzzy Hash: E9B092BA504200AB9108E610DC41C2BB399ABE4641F408908B88943200D531EC18C662
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 50%
                                                                              			E100013B0(intOrPtr _a4, intOrPtr _a8) {
                                                                              				intOrPtr _t3;
                                                                              
                                                                              				_t3 = _a8;
                                                                              				_push(_t3);
                                                                              				_push(_a4);
                                                                              				L1000160C();
                                                                              				return _t3;
                                                                              			}




                                                                              0x100013b0
                                                                              0x100013b8
                                                                              0x100013b9
                                                                              0x100013ba
                                                                              0x100013c2

                                                                              APIs
                                                                              • sqlite3_bind_null.SQLITE3(?,?), ref: 100013BA
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_null
                                                                              • String ID:
                                                                              • API String ID: 3535090801-0
                                                                              • Opcode ID: 23f687fde9565d1e0b8191d34d01a6ac0d41fd4d7506a20e0e268196798ee198
                                                                              • Instruction ID: 5236f08b6563fbcfda6643472c5689bd49927a405dca7e09d060635d44893716
                                                                              • Opcode Fuzzy Hash: 23f687fde9565d1e0b8191d34d01a6ac0d41fd4d7506a20e0e268196798ee198
                                                                              • Instruction Fuzzy Hash: 61B012FE5143007BD205E710DC41C2BB398FBE8681F04890CB8C842200D532EC1CC732
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 68%
                                                                              			E10001470(intOrPtr _a4) {
                                                                              				intOrPtr _t2;
                                                                              
                                                                              				_t2 = _a4;
                                                                              				_push(_t2);
                                                                              				L100015FA();
                                                                              				return _t2;
                                                                              			}




                                                                              0x10001470
                                                                              0x10001474
                                                                              0x10001475
                                                                              0x1000147d

                                                                              APIs
                                                                              • sqlite3_bind_parameter_count.SQLITE3(?), ref: 10001475
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_bind_parameter_count
                                                                              • String ID:
                                                                              • API String ID: 698848693-0
                                                                              • Opcode ID: 2f97d8ffbdd0644f7109d4ddda647a4c8149e7a7317a35427311cf032481ad04
                                                                              • Instruction ID: fc4c01829ca00f3af8167638a30a56e37a286979d0f06b313afdb9917f49b669
                                                                              • Opcode Fuzzy Hash: 2f97d8ffbdd0644f7109d4ddda647a4c8149e7a7317a35427311cf032481ad04
                                                                              • Instruction Fuzzy Hash: CBA011EA800200A2E008C2A0A80280BB288ABA0A00B008838B20A82000E030E828822B
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 68%
                                                                              			E10001180(intOrPtr _a4) {
                                                                              				intOrPtr _t2;
                                                                              
                                                                              				_t2 = _a4;
                                                                              				_push(_t2);
                                                                              				L100015A0();
                                                                              				return _t2;
                                                                              			}




                                                                              0x10001180
                                                                              0x10001184
                                                                              0x10001185
                                                                              0x1000118d

                                                                              APIs
                                                                              • sqlite3_clear_bindings.SQLITE3(?), ref: 10001185
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: sqlite3_clear_bindings
                                                                              • String ID:
                                                                              • API String ID: 3970246780-0
                                                                              • Opcode ID: 6804f58cac33ac1b37a0843406dd2550dbbf9f46d5d2c18083cc4e59eb7fa02d
                                                                              • Instruction ID: 1065f642462f2d60a0555b45999a2fe3c4aeee6263e08d097eed9d5e5d6058b0
                                                                              • Opcode Fuzzy Hash: 6804f58cac33ac1b37a0843406dd2550dbbf9f46d5d2c18083cc4e59eb7fa02d
                                                                              • Instruction Fuzzy Hash: DCA024FFC0010053F000C5507C01C0771445FF4540FC04430710541001F030F414C117
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 0048B4FF
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0048B52F
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0048B543
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 0048B556
                                                                              • __vbaStrCopy.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 0048B563
                                                                              • __vbaStrMove.MSVBVM60 ref: 0048B57E
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(?,?,?), ref: 0048B59A
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,?,?), ref: 0048B5A0
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?), ref: 0048B5AA
                                                                                • Part of subcall function 0047877C: __vbaChkstk.MSVBVM60(00000000,00403046,004020B8,?,00000000,?,000000FF,00403046), ref: 00478798
                                                                                • Part of subcall function 0047877C: __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,00403046,004020B8), ref: 004787C8
                                                                                • Part of subcall function 0047877C: __vbaNew2.MSVBVM60(00463A5C,00000000,000000FF), ref: 004787E3
                                                                                • Part of subcall function 0047877C: __vbaHresultCheckObj.MSVBVM60(00000000,?,00463A6C,0000007C), ref: 00478830
                                                                                • Part of subcall function 0047877C: __vbaCastObj.MSVBVM60(?,00464D1C), ref: 00478846
                                                                                • Part of subcall function 0047877C: __vbaObjSet.MSVBVM60(?,00000000,?,00464D1C), ref: 00478850
                                                                                • Part of subcall function 0047877C: __vbaFreeObj.MSVBVM60(?,00000000,?,00464D1C), ref: 00478858
                                                                                • Part of subcall function 0047877C: __vbaHresultCheckObj.MSVBVM60(00000000,?,00464D1C,00000024), ref: 0047888B
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,?,?,?), ref: 0048B5BD
                                                                                • Part of subcall function 0048EB05: __vbaChkstk.MSVBVM60(?,00403046,000000FF,?,?,?,?,00403046), ref: 0048EB21
                                                                                • Part of subcall function 0048EB05: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,000000FF), ref: 0048EB51
                                                                                • Part of subcall function 0048EB05: __vbaStrCopy.MSVBVM60(000000FF), ref: 0048EB75
                                                                                • Part of subcall function 0048EB05: __vbaOnError.MSVBVM60(000000FF,000000FF), ref: 0048EB83
                                                                                • Part of subcall function 0048EB05: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 0048EBCC
                                                                                • Part of subcall function 0048EB05: __vbaVarMove.MSVBVM60(?,00004008,00000001,00000002), ref: 0048EBD7
                                                                                • Part of subcall function 0048EB05: __vbaFreeVar.MSVBVM60(?,00004008,00000001,00000002), ref: 0048EBDF
                                                                                • Part of subcall function 0048EB05: __vbaVarTstEq.MSVBVM60(00008008,?,?,00004008,00000001,00000002), ref: 0048EC01
                                                                                • Part of subcall function 0048EB05: __vbaObjSet.MSVBVM60(?,00000000,?,00000001,00008008,?,?,00004008,00000001,00000002), ref: 0048EC25
                                                                                • Part of subcall function 0048EB05: __vbaFreeVar.MSVBVM60(0048ECBF,00008008,?,00008008,?,?,00004008,00000001,00000002), ref: 0048ECB9
                                                                              • __vbaObjSet.MSVBVM60(000000FF,00000000,?,?,00000000,?,?,?), ref: 0048B5D0
                                                                              • __vbaFreeStrList.MSVBVM60(00000007,?,?,?,?,?,?,00000000,000000FF,00000000,?,?,00000000,?,?,?), ref: 0048B5F3
                                                                              • __vbaObjIs.MSVBVM60(000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048B607
                                                                              • __vbaStrMove.MSVBVM60(000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048B628
                                                                              • __vbaStrCmp.MSVBVM60(00460A74,00000000,000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048B633
                                                                              • __vbaFreeStr.MSVBVM60(00460A74,00000000,000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048B649
                                                                              • __vbaChkstk.MSVBVM60 ref: 0048B68F
                                                                              • __vbaChkstk.MSVBVM60(Item,00000001), ref: 0048B6AA
                                                                              • __vbaLateMemCallLd.MSVBVM60(?,000000FF,Item,00000001,Item,00000001), ref: 0048B6C9
                                                                              • __vbaVarLateMemCallLd.MSVBVM60(?,00000000,?,?,?,?,00460A74,00000000,000000FF,00000000,?,?,000000FF), ref: 0048B6D6
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 0048B6DF
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,000000FF), ref: 0048B6E9
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000), ref: 0048B6F8
                                                                              • __vbaAryMove.MSVBVM60(?,?,?,000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048B721
                                                                              • __vbaUbound.MSVBVM60(00000001,?,00000000,?,?,?,000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048B734
                                                                              • __vbaRedim.MSVBVM60(00000080,00000001,00000000,00000011,00000001,-00000005,00000001,?,00000000,?,?,?,000000FF,00000000,?,?), ref: 0048B752
                                                                              • __vbaAryLock.MSVBVM60(?,?,?,00000000,?,?,?,000000FF,00000000,?,?,000000FF), ref: 0048B768
                                                                              • __vbaAryLock.MSVBVM60(000000FF,00000000,?,?,?,00000000,?,?,?,000000FF,00000000,?,?,000000FF), ref: 0048B774
                                                                              • __vbaUbound.MSVBVM60(00000001,?,000000FF,00000000,?,?,?,00000000,?,?,?,000000FF,00000000,?,?,000000FF), ref: 0048B77E
                                                                              • __vbaDerefAry1.MSVBVM60(?,00000005,-00000001,00000001,?,000000FF,00000000,?,?,?,00000000,?,?,?,000000FF,00000000), ref: 0048B792
                                                                              • __vbaDerefAry1.MSVBVM60(000000FF,00000000,00000000,?,00000005,-00000001,00000001,?,000000FF,00000000,?,?,?,00000000,?,?), ref: 0048B79D
                                                                              • __vbaSetSystemError.MSVBVM60(00000000,000000FF,00000000,00000000,?,00000005,-00000001,00000001,?,000000FF,00000000,?,?,?,00000000,?), ref: 0048B7A8
                                                                              • __vbaAryUnlock.MSVBVM60(000000FF,00000000,000000FF,00000000,00000000,?,00000005,-00000001,00000001,?,000000FF,00000000,?,?,?,00000000), ref: 0048B7B1
                                                                              • __vbaAryUnlock.MSVBVM60(?,000000FF,00000000,000000FF,00000000,00000000,?,00000005,-00000001,00000001,?,000000FF,00000000,?,?,?), ref: 0048B7BA
                                                                              • __vbaStrCopy.MSVBVM60(?,000000FF,00000000,000000FF,00000000,00000000,?,00000005,-00000001,00000001,?,000000FF,00000000,?,?,?), ref: 0048B7CB
                                                                              • __vbaAryMove.MSVBVM60(?,?,00000000,?,00000000,00000000,00000004,00000000,?,000000FF,00000000,000000FF,00000000,00000000,?,00000005), ref: 0048B7F6
                                                                              • __vbaFreeStr.MSVBVM60(?,?,00000000,?,00000000,00000000,00000004,00000000,?,000000FF,00000000,000000FF,00000000,00000000,?,00000005), ref: 0048B7FE
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,0048B8B5,?,?,00000000,?,00000000,00000000,00000004,00000000,?,000000FF,00000000,000000FF,00000000), ref: 0048B873
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,0048B8B5,?,?,00000000,?,00000000,00000000,00000004,00000000,?,000000FF,00000000), ref: 0048B881
                                                                              • __vbaFreeStr.MSVBVM60(00000000,?,00000000,?,0048B8B5,?,?,00000000,?,00000000,00000000,00000004,00000000,?,000000FF,00000000), ref: 0048B889
                                                                              • __vbaFreeObj.MSVBVM60(00000000,?,00000000,?,0048B8B5,?,?,00000000,?,00000000,00000000,00000004,00000000,?,000000FF,00000000), ref: 0048B891
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,00000000,?,0048B8B5,?,?,00000000,?,00000000,00000000,00000004,00000000,?), ref: 0048B89C
                                                                              • __vbaFreeStr.MSVBVM60(00000000,?,00000000,?,00000000,?,0048B8B5,?,?,00000000,?,00000000,00000000,00000004,00000000,?), ref: 0048B8A4
                                                                                • Part of subcall function 0048EAA7: __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,0048B623,000000FF,00000000,?,?,000000FF,?,?,?,?,00403046), ref: 0048EAC2
                                                                                • Part of subcall function 0048EAA7: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046,?,?,?,0048B623,000000FF), ref: 0048EADD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$FreeMove$Chkstk$Error$Copy$List$BstrDestruct$#516#631#632Ary1CallCheckDerefHresultLateLockUboundUnlock$#537#608CastNew2RedimSystem
                                                                              • String ID: 2F0E3A2F080D431B02122036$Item$encrypted_key$isBULiacHvsTSZrcfeHLSbF$os_crypt$tF
                                                                              • API String ID: 37062202-1887039539
                                                                              • Opcode ID: 830b4b8464d495772917231563acc76292b4b03cb92acc921e6656eede9a9b48
                                                                              • Instruction ID: 9f48295de31f894169b1db1ca3eb1bf8ac9f9344b7eee7d9037764607fa7b66b
                                                                              • Opcode Fuzzy Hash: 830b4b8464d495772917231563acc76292b4b03cb92acc921e6656eede9a9b48
                                                                              • Instruction Fuzzy Hash: AFE11A72D00208AADB11EFE1CD46FDEBB7DAF08709F10456AF105BB181EB795B498B58
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,00000024,00403046,00000001), ref: 00474420
                                                                              • __vbaOnError.MSVBVM60(00000001,?,?,?,00000000,00403046), ref: 00474442
                                                                              • __vbaStrCat.MSVBVM60(00460E8C,00000001,?,?,?,00000000,00403046), ref: 00474452
                                                                              • __vbaStrMove.MSVBVM60(00460E8C,00000001,?,?,?,00000000,00403046), ref: 0047445C
                                                                              • __vbaVarCopy.MSVBVM60 ref: 0047447F
                                                                              • __vbaStrVarVal.MSVBVM60(?,?,00460E8C,000000FF,00000000), ref: 00474495
                                                                              • #709.MSVBVM60(00000000,?,?,00460E8C,000000FF,00000000), ref: 0047449B
                                                                              • __vbaStrCopy.MSVBVM60(00000000,?,?,00460E8C,000000FF,00000000), ref: 004744AE
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,?,?,00460E8C,000000FF,00000000), ref: 004744C1
                                                                              • #632.MSVBVM60(?,?,?,0000000A,?,00000000,?,?,00460E8C,000000FF,00000000), ref: 0047450C
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,0000000A,?,00000000,?,?,00460E8C,000000FF,00000000), ref: 00474519
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,0000000A,?,00000000,?,?,00460E8C,000000FF,00000000), ref: 00474534
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaVarCat.MSVBVM60(?,?,00000008,?,?,?,?,?,0000000A,?,00000000,?,?,00460E8C,000000FF,00000000), ref: 0047456B
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,00000000,?,?,00000008,?,?,?,?,?,0000000A,?,00000000,?,?), ref: 0047457F
                                                                              • __vbaVarMove.MSVBVM60(?,00000008,00000000,?,?,00000008,?,?,?,?,?,0000000A,?,00000000,?,?), ref: 00474589
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,?,?,?,00000000,?,00000008,00000000,?,?,00000008,?,?,?,?), ref: 004745A4
                                                                              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?,00000001,?,?,?,00000000,00403046), ref: 004745CA
                                                                              • #648.MSVBVM60(0000000A), ref: 004745EA
                                                                              • __vbaFreeVar.MSVBVM60(0000000A), ref: 004745F9
                                                                              • __vbaStrVarCopy.MSVBVM60(?,0000000A), ref: 00474602
                                                                              • __vbaStrMove.MSVBVM60(?,0000000A), ref: 0047460C
                                                                              • __vbaFileOpen.MSVBVM60(00000002,000000FF,?,00000000,?,0000000A), ref: 00474619
                                                                              • __vbaFreeStr.MSVBVM60(00000002,000000FF,?,00000000,?,0000000A), ref: 00474621
                                                                              • #537.MSVBVM60(00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474628
                                                                              • __vbaStrMove.MSVBVM60(00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474632
                                                                              • #537.MSVBVM60(0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474639
                                                                              • __vbaStrMove.MSVBVM60(0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474643
                                                                              • #537.MSVBVM60(00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 0047464A
                                                                              • __vbaStrMove.MSVBVM60(00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474654
                                                                              • #537.MSVBVM60(00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 0047465B
                                                                              • __vbaStrMove.MSVBVM60(00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474665
                                                                              • #607.MSVBVM60(?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 00474688
                                                                              • __vbaStrMove.MSVBVM60(?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 004746CA
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 004746D9
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 004746DF
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 004746E9
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?,0000000A), ref: 004746F8
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?), ref: 004746FE
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000,?), ref: 00474708
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?,00000000), ref: 00474717
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,00000000,00000000,00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050,00000002,000000FF,?), ref: 0047471D
                                                                              • __vbaVarCat.MSVBVM60(?,?,00000008,00000000,00000000,00000000,00000000,00000000,00000000,?,00000012,00000002,00000006,00000005,0000004B,00000050), ref: 00474747
                                                                              • __vbaPrintFile.MSVBVM60(00464568,?,00000000,?,?,00000008,00000000,00000000,00000000,00000000,00000000,00000000,?,00000012,00000002,00000006), ref: 00474755
                                                                              • __vbaFreeStrList.MSVBVM60(0000000A,?,?,?,?,?,?,?,?,?,?), ref: 00474787
                                                                              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 004747AD
                                                                              • __vbaFileClose.MSVBVM60(?), ref: 004747B8
                                                                              • #716.MSVBVM60(?,shell.application,00000000,?), ref: 004747CB
                                                                              • __vbaObjVar.MSVBVM60(?,?,shell.application,00000000,?), ref: 004747D7
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,?,?,shell.application,00000000,?), ref: 004747E1
                                                                              • __vbaFreeVar.MSVBVM60(?,00000000,?,?,shell.application,00000000,?), ref: 004747EC
                                                                              • __vbaChkstk.MSVBVM60 ref: 00474807
                                                                              • __vbaLateMemCallLd.MSVBVM60(?,?,Namespace,00000001), ref: 00474829
                                                                              • __vbaObjVar.MSVBVM60(00000000,?,?,00000000,?,?,shell.application,00000000,?), ref: 00474832
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,00000000,?,?,00000000,?,?,shell.application,00000000,?), ref: 0047483C
                                                                              • __vbaFreeVar.MSVBVM60(?,00000000,00000000,?,?,00000000,?,?,shell.application,00000000,?), ref: 00474847
                                                                              • __vbaChkstk.MSVBVM60 ref: 00474876
                                                                              • __vbaChkstk.MSVBVM60 ref: 0047488A
                                                                              • __vbaLateMemCall.MSVBVM60(?,CopyHere,00000002), ref: 004748A5
                                                                              • __vbaExitProc.MSVBVM60(?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000,?,?), ref: 004748AD
                                                                              • __vbaFreeVar.MSVBVM60(00474942,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000,?), ref: 0047491C
                                                                              • __vbaFreeObj.MSVBVM60(00474942,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000,?), ref: 00474924
                                                                              • __vbaFreeVar.MSVBVM60(00474942,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000,?), ref: 0047492C
                                                                              • __vbaFreeStr.MSVBVM60(00474942,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000,?), ref: 00474934
                                                                              • __vbaFreeObj.MSVBVM60(00474942,?,?,?,?,?,?,?,?,?,00000000,00000000,?,?,00000000,?), ref: 0047493C
                                                                              • __vbaErrorOverflow.MSVBVM60(0000000A,?,00000000,?,?,00460E8C,000000FF,00000000), ref: 00474957
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$ChkstkList$#537$Copy$BstrErrorFile$#516#631#632AddrefCallLate$#607#608#648#709#716CloseExitOpenOverflowPrintProc
                                                                              • String ID: 7703281D$CopyHere$Namespace$jYyAmmwyYqKBNDBQQTsgHqvTRMFvcFGMruudGaKkt$shell.application
                                                                              • API String ID: 3225830068-2572785872
                                                                              • Opcode ID: d01577b8038391a2619366c32ae4696951786bf58ed7a5b2c86dd20eb8d685f8
                                                                              • Instruction ID: 574ffde71c38d9ad08a7e0b8651875eb60352aeb51ffde098ba108585f041763
                                                                              • Opcode Fuzzy Hash: d01577b8038391a2619366c32ae4696951786bf58ed7a5b2c86dd20eb8d685f8
                                                                              • Instruction Fuzzy Hash: 9FD1EE71D00218AACB51EFE1CC82BDEB7BCAF04705F5085AAA509B7181EF785B898F55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00403046), ref: 00491443
                                                                                • Part of subcall function 00491966: __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                                • Part of subcall function 00491966: __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                                • Part of subcall function 00491966: #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                                • Part of subcall function 00491966: __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                                • Part of subcall function 00491966: __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • __vbaLenBstr.MSVBVM60(00402F68,00402F68,?,?,?,00000000,00000000,00403046), ref: 00491470
                                                                              • #632.MSVBVM60(?,00004008,?,00000002), ref: 004914B5
                                                                              • __vbaStrVarMove.MSVBVM60(?,?,00004008,?,00000002), ref: 004914BE
                                                                              • __vbaStrMove.MSVBVM60(?,?,00004008,?,00000002), ref: 004914C8
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,00004008,?,00000002), ref: 004914D7
                                                                              • __vbaStrCopy.MSVBVM60(00000000,00000000,00403046), ref: 004914E8
                                                                              • __vbaStrCmp.MSVBVM60(00462844,?,00000000,00000000,00403046), ref: 004914F8
                                                                              • #632.MSVBVM60(?,00004008,?,00000002), ref: 00491566
                                                                              • __vbaVarTstNe.MSVBVM60(00008008,?,?,?,?,?,?,00004008,?,00000002), ref: 0049158A
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,?,?,?,?,00004008,?,00000002), ref: 004915A0
                                                                              • __vbaStrCat.MSVBVM60(Invalid Key at position ,?), ref: 004915C2
                                                                              • __vbaStrMove.MSVBVM60(Invalid Key at position ,?), ref: 004915CC
                                                                              • __vbaStrI4.MSVBVM60(?,00000000,Invalid Key at position ,?), ref: 004915D7
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,Invalid Key at position ,?), ref: 004915E1
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,00000000,Invalid Key at position ,?), ref: 004915E7
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000000,Invalid Key at position ,?), ref: 004915F1
                                                                              • __vbaStrCat.MSVBVM60( : ,00000000,00000000,?,00000000,Invalid Key at position ,?), ref: 004915FC
                                                                              • __vbaStrMove.MSVBVM60( : ,00000000,00000000,?,00000000,Invalid Key at position ,?), ref: 00491606
                                                                              • __vbaStrCat.MSVBVM60(?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?), ref: 0049160F
                                                                              • __vbaStrMove.MSVBVM60(?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?), ref: 00491619
                                                                              • __vbaStrCat.MSVBVM60(00463C48,00000000,?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?), ref: 00491624
                                                                              • __vbaStrMove.MSVBVM60(00463C48,00000000,?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?), ref: 00491630
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,00468F24,?,?,?,00402F68,00463C48,00000000,?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ), ref: 0049164B
                                                                              • __vbaStrCmp.MSVBVM60(00468F24,?,00462844,?,00000000,00000000,00403046), ref: 00491668
                                                                              • #632.MSVBVM60(?,00004008,?,00000002), ref: 004916D6
                                                                              • __vbaVarTstNe.MSVBVM60(00008008,?,?,?,?,?,?,00004008,?,00000002), ref: 004916FA
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,?,?,?,?,00004008,?,00000002), ref: 00491710
                                                                              • __vbaStrCat.MSVBVM60(Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491732
                                                                              • __vbaStrMove.MSVBVM60(Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 0049173C
                                                                              • __vbaStrI4.MSVBVM60(?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491747
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491751
                                                                              • __vbaStrCat.MSVBVM60(00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491757
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491761
                                                                              • __vbaStrCat.MSVBVM60( : ,00000000,00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 0049176C
                                                                              • __vbaStrMove.MSVBVM60( : ,00000000,00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491776
                                                                              • __vbaStrCat.MSVBVM60(?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 0049177F
                                                                              • __vbaStrMove.MSVBVM60(?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491789
                                                                              • __vbaStrCat.MSVBVM60(00463C48,00000000,?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 00491794
                                                                              • __vbaStrMove.MSVBVM60(00463C48,00000000,?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ,?,00462844,?,00000000,00000000,00403046), ref: 004917A0
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,?,00000000,?,00000000,00000000,00463C48,00000000,?,00000000, : ,00000000,00000000,?,00000000,Invalid Key at position ), ref: 004917BB
                                                                              • __vbaFreeStr.MSVBVM60(0049194D,00402F68,00402F68,?,?,?,00000000,00000000,00403046), ref: 0049193F
                                                                              • __vbaFreeStr.MSVBVM60(0049194D,00402F68,00402F68,?,?,?,00000000,00000000,00403046), ref: 00491947
                                                                              • __vbaErrorOverflow.MSVBVM60(?,?,?,00468F24,?,00462844,?,00000000,00000000,00403046), ref: 00491961
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$List$#632$BstrChkstk$CopyErrorOverflow
                                                                              • String ID: : $F0@$Invalid Key at position
                                                                              • API String ID: 3412742007-917809115
                                                                              • Opcode ID: a33d67217bb88c6a8a31b40ff5a933ae63f49829ca77d1f27250b28689958534
                                                                              • Instruction ID: 7d37cb3ecbcebf84c8c17ebafed1cbaac022b633c1b375e8586e6c0f6cbde9f9
                                                                              • Opcode Fuzzy Hash: a33d67217bb88c6a8a31b40ff5a933ae63f49829ca77d1f27250b28689958534
                                                                              • Instruction Fuzzy Hash: 46D10C71900109ABCF01EFE1C882AEE7BBDAF18705F50417FF505BA291EB399A45CB59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,000000FF), ref: 00475E6B
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475E9B
                                                                              • __vbaNew.MSVBVM60(0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475EAC
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475EB6
                                                                              • __vbaStrCopy.MSVBVM60(?,00000000,0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475ECA
                                                                                • Part of subcall function 00474D56: __vbaChkstk.MSVBVM60(?,00403046,00000001,?,?,?,00000000,00403046), ref: 00474D74
                                                                                • Part of subcall function 00474D56: __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,00000001), ref: 00474DA4
                                                                                • Part of subcall function 00474D56: __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,?,00403046,00000001), ref: 00474DB5
                                                                                • Part of subcall function 00474D56: #632.MSVBVM60(?,00004008,00000001,00000002), ref: 00474E39
                                                                                • Part of subcall function 00474D56: __vbaVarCat.MSVBVM60(?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E50
                                                                                • Part of subcall function 00474D56: __vbaI4ErrVar.MSVBVM60(00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E56
                                                                                • Part of subcall function 00474D56: #537.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E5C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E66
                                                                                • Part of subcall function 00474D56: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E6C
                                                                                • Part of subcall function 00474D56: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E76
                                                                                • Part of subcall function 00474D56: __vbaFreeStr.MSVBVM60(00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E7E
                                                                                • Part of subcall function 00474D56: __vbaFreeVarList.MSVBVM60(00000004,00000002,?,?,?,00000000,00000000,00000000,?,?,00000008,?,?,00004008,00000001,00000002), ref: 00474E95
                                                                              • __vbaStrMove.MSVBVM60(000000FF,?,00000000,0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475EDD
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,?,00000000,0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475EEA
                                                                              • __vbaStrMove.MSVBVM60 ref: 00475EFF
                                                                                • Part of subcall function 004785BC: __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                                • Part of subcall function 004785BC: __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                                • Part of subcall function 004785BC: #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                                • Part of subcall function 004785BC: #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                                • Part of subcall function 004785BC: __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                                • Part of subcall function 004785BC: __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                                • Part of subcall function 004785BC: #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                                • Part of subcall function 004785BC: __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                                • Part of subcall function 004785BC: __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                                • Part of subcall function 004785BC: __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                                • Part of subcall function 004785BC: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrMove.MSVBVM60(0046484C,00000000), ref: 00475F16
                                                                              • __vbaStrMove.MSVBVM60(LHF,0046484C), ref: 00475F2F
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464870,000000BC), ref: 00475F5E
                                                                              • __vbaObjSet.MSVBVM60(?,?), ref: 00475F83
                                                                              • __vbaFreeStrList.MSVBVM60(00000006,000000FF,0046484C,00000000,?,00000000,00000000,?,?), ref: 00475FA2
                                                                              • __vbaStrCopy.MSVBVM60(0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475FB9
                                                                              • __vbaStrMove.MSVBVM60(000000FF,0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475FCC
                                                                              • __vbaStrCopy.MSVBVM60(000000FF,0046484C,000000FF,?,00000000,?,00000000,00403046,000000FF), ref: 00475FD9
                                                                              • __vbaStrMove.MSVBVM60 ref: 00475FF4
                                                                              • __vbaStrMove.MSVBVM60(0046484C,000000FF), ref: 0047600B
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004641E0,00000084), ref: 0047603A
                                                                              • __vbaFreeStrList.MSVBVM60(00000005,000000FF,0046484C,000000FF,?,00000000), ref: 00476064
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004641E0,0000006C), ref: 0047609B
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,004641E0,00000078), ref: 004760DD
                                                                              • __vbaVar2Vec.MSVBVM60(?,?), ref: 004760F9
                                                                              • __vbaAryMove.MSVBVM60(00000000,?,?,?), ref: 00476106
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,?,?), ref: 0047610E
                                                                              • __vbaCastObj.MSVBVM60(00000000,00462B98,00000000,?,?,?), ref: 00476121
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,00000000,00462B98,00000000,?,?,?), ref: 0047612B
                                                                              • __vbaCastObj.MSVBVM60(00000000,0046483C,?,00000000,00000000,00462B98,00000000,?,?,?), ref: 0047613E
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,00000000,0046483C,?,00000000,00000000,00462B98,00000000,?,?,?), ref: 00476148
                                                                              • __vbaFreeObj.MSVBVM60(004761B8,?,00000000,00000000,0046483C,?,00000000,00000000,00462B98,00000000,?,?,?), ref: 004761AA
                                                                              • __vbaFreeObj.MSVBVM60(004761B8,?,00000000,00000000,0046483C,?,00000000,00000000,00462B98,00000000,?,?,?), ref: 004761B2
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$CheckCopyHresultList$BstrChkstk$#516#631CastError$#537#608#632Var2
                                                                              • String ID: 1633347805121922407C$2D6F53$JOYgWtpQYbjXuFnLrkwvPv$LHF$ZtZZVgsjGvHkuQ
                                                                              • API String ID: 4016846879-847925376
                                                                              • Opcode ID: badf0c210f9d7f97a1f1b225caa8dec28a91812c58e6600b8767e26f9f598283
                                                                              • Instruction ID: cb2a4d0e9cce9b94e39c0a4d6431fcd3be43adc4ba0803c5d925abf001710575
                                                                              • Opcode Fuzzy Hash: badf0c210f9d7f97a1f1b225caa8dec28a91812c58e6600b8767e26f9f598283
                                                                              • Instruction Fuzzy Hash: 4EA1D471D4021CEBDB00EFE1C946BDEBBB9BF18305F10816AE115B7191DB78AA498B64
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00477F30
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 00477F60
                                                                              • #716.MSVBVM60(?,System.Security.Cryptography.RijndaelManaged,00000000,000000FF,?,?,?,?,00403046), ref: 00477F77
                                                                              • __vbaVarSetVar.MSVBVM60(?,?,?,System.Security.Cryptography.RijndaelManaged,00000000,000000FF,?,?,?,?,00403046), ref: 00477F84
                                                                              • __vbaChkstk.MSVBVM60 ref: 00477FA4
                                                                              • __vbaVarLateMemSt.MSVBVM60(?,KeySize), ref: 00477FBB
                                                                              • __vbaChkstk.MSVBVM60(?,KeySize), ref: 00477FDB
                                                                              • __vbaVarLateMemSt.MSVBVM60(?,Padding,?,KeySize), ref: 00477FF2
                                                                              • __vbaChkstk.MSVBVM60(?,Padding,?,KeySize), ref: 00478012
                                                                              • __vbaVarLateMemSt.MSVBVM60(?,Mode,?,Padding,?,KeySize), ref: 00478029
                                                                              • __vbaChkstk.MSVBVM60(?,Mode,?,Padding,?,KeySize), ref: 00478047
                                                                              • __vbaVarLateMemSt.MSVBVM60(?,key,?,Mode,?,Padding,?,KeySize), ref: 0047805E
                                                                              • __vbaVarLateMemCallLd.MSVBVM60(?,?,CreateDecryptor,00000000,?,key,?,Mode,?,Padding,?,KeySize), ref: 00478079
                                                                              • __vbaVarSetVar.MSVBVM60(?,00000000,?,?,?,00403046), ref: 00478086
                                                                              • __vbaUbound.MSVBVM60(00000001,?), ref: 004780B1
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,00000001,?), ref: 004780D2
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,00000001,?), ref: 004780E3
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,00000001,?), ref: 004780F4
                                                                              • __vbaVarLateMemCallLd.MSVBVM60(?,?,TransformFinalBlock,00000003,?,?,?,?,?,?,00000001,?), ref: 00478114
                                                                              • __vbaVar2Vec.MSVBVM60(?,00000000), ref: 00478121
                                                                              • __vbaAryMove.MSVBVM60(?,?,?,00000000), ref: 0047812E
                                                                              • __vbaFreeVar.MSVBVM60(?,?,?,00000000), ref: 00478136
                                                                              • __vbaUbound.MSVBVM60(00000001,?,?,?,?,00000000), ref: 00478147
                                                                                • Part of subcall function 004774F6: __vbaChkstk.MSVBVM60(00000000,00403046), ref: 00477512
                                                                                • Part of subcall function 004774F6: __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 0047752C
                                                                                • Part of subcall function 004774F6: __vbaDerefAry1.MSVBVM60(00401EA8,?), ref: 0047756D
                                                                                • Part of subcall function 004774F6: __vbaStrUI1.MSVBVM60(?,00401EA8,?), ref: 00477575
                                                                                • Part of subcall function 004774F6: __vbaStrMove.MSVBVM60(?,00401EA8,?), ref: 0047757F
                                                                                • Part of subcall function 004774F6: __vbaStrCmp.MSVBVM60(004648B0,00000000,?,00401EA8,?), ref: 0047758A
                                                                                • Part of subcall function 004774F6: __vbaFreeStr.MSVBVM60(004648B0,00000000,?,00401EA8,?), ref: 0047759E
                                                                                • Part of subcall function 004774F6: __vbaDerefAry1.MSVBVM60(00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?,00401EA8,?), ref: 004775C0
                                                                                • Part of subcall function 004774F6: #608.MSVBVM60(?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?,00401EA8,?), ref: 004775CD
                                                                                • Part of subcall function 004774F6: __vbaVarAdd.MSVBVM60(?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?,00401EA8), ref: 004775DE
                                                                                • Part of subcall function 004774F6: __vbaStrVarMove.MSVBVM60(00000000,?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?), ref: 004775E4
                                                                                • Part of subcall function 004774F6: __vbaStrMove.MSVBVM60(00000000,?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?), ref: 004775EE
                                                                                • Part of subcall function 004774F6: __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?), ref: 004775FD
                                                                              • __vbaStrMove.MSVBVM60(?,00000000,?), ref: 00478175
                                                                              • __vbaVarSetObjAddref.MSVBVM60(?,00000000,?,00000000,?), ref: 00478187
                                                                              • __vbaFreeVar.MSVBVM60(004781D5,?,00000000,?,00000000,?), ref: 004781BC
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,004781D5,?,00000000,?,00000000,?), ref: 004781C7
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,004781D5,?,00000000,?,00000000,?), ref: 004781CF
                                                                              • __vbaErrorOverflow.MSVBVM60(00000001,?), ref: 004781E9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Chkstk$Late$FreeMove$Ary1CallDerefErrorUbound$#608#716AddrefCopyDestructListOverflowVar2
                                                                              • String ID: CreateDecryptor$KeySize$Mode$Padding$System.Security.Cryptography.RijndaelManaged$TransformFinalBlock$key
                                                                              • API String ID: 1610004643-2379688522
                                                                              • Opcode ID: f1f03671587c28b54b5d8a875a7d81ba443d0eefb0b5dc856c5aea382672eeca
                                                                              • Instruction ID: 9871b9f2d5b5ff3a579184d15a1d74b797fde1631f3e1afe1a94978300aa4808
                                                                              • Opcode Fuzzy Hash: f1f03671587c28b54b5d8a875a7d81ba443d0eefb0b5dc856c5aea382672eeca
                                                                              • Instruction Fuzzy Hash: 53712CB1D00308AADB11EFE1C846BCEBBBDAF09705F10445AF504BF282DBB9A7458B55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00000000,?,?,?,00403046), ref: 0047820C
                                                                              • __vbaStrCopy.MSVBVM60(?,00002011,?,00000000,00403046), ref: 00478239
                                                                              • __vbaStrCopy.MSVBVM60(?,00002011,?,00000000,00403046), ref: 00478244
                                                                              • __vbaAryConstruct2.MSVBVM60(?,00464CE8,00000011,?,00002011,?,00000000,00403046), ref: 00478254
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,00464CE8,00000011,?,00002011,?,00000000,00403046), ref: 00478262
                                                                              • __vbaStrToAnsi.MSVBVM60(?,?,000000FF,?,00464CE8,00000011,?,00002011,?,00000000,00403046), ref: 00478275
                                                                              • __vbaSetSystemError.MSVBVM60(00000000,?,?,000000FF,?,00464CE8,00000011,?,00002011,?,00000000,00403046), ref: 00478283
                                                                              • __vbaStrToUnicode.MSVBVM60(?,?,00000000,?,?,000000FF,?,00464CE8,00000011,?,00002011,?,00000000,00403046), ref: 0047828F
                                                                              • __vbaStrToAnsi.MSVBVM60(?,?,?,?,00000000,?,?,000000FF,?,00464CE8,00000011,?,00002011,?,00000000,00403046), ref: 0047829B
                                                                              • __vbaSetSystemError.MSVBVM60(?,00000000,?,?,?,?,00000000,?,?,000000FF,?,00464CE8,00000011,?,00002011), ref: 004782AC
                                                                              • __vbaStrToUnicode.MSVBVM60(?,00000000,?,00000000,?,?,?,?,00000000,?,?,000000FF,?,00464CE8,00000011), ref: 004782B8
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,00000000,?,00000000,?,00000000,?,?,?,?,00000000,?,?,000000FF,?), ref: 004782CD
                                                                              • #644.MSVBVM60(0000EC00), ref: 00478316
                                                                              • __vbaSetSystemError.MSVBVM60(?,XYYY,00000004,0000EC00), ref: 0047833A
                                                                              • __vbaSetSystemError.MSVBVM60(?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 00478370
                                                                              • __vbaUbound.MSVBVM60(00000001,00000000,?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 004783A4
                                                                              • __vbaSetSystemError.MSVBVM60(?,00000068,00000001,00000001,00000000,?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 004783E7
                                                                              • __vbaDerefAry1.MSVBVM60(00000000,?,?,00000068,00000001,00000001,00000000,?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 00478411
                                                                              • __vbaVarVargNofree.MSVBVM60(00000000,?,?,00000068,00000001,00000001,00000000,?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 0047841B
                                                                              • __vbaI4ErrVar.MSVBVM60(00000000,00000000,?,?,00000068,00000001,00000001,00000000,?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 00478421
                                                                              • __vbaSetSystemError.MSVBVM60(?,XYYYh,00000004,00000000,00000000,?,?,00000068,00000001,00000001,00000000,?,00005059,00000002,?,XYYY), ref: 00478437
                                                                              • __vbaSetSystemError.MSVBVM60(?,000000E8,00000001,00000001,00000000,?,00005059,00000002,?,XYYY,00000004,0000EC00), ref: 00478479
                                                                              • __vbaFreeStr.MSVBVM60(004785A3,?,00000000,00000000,00000000,00000000,0000EC00,?,000000C3,00000001,?,XYYY,00000004,?,000000E8,00000001), ref: 00478584
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,59595958,004785A3,?,00000000,00000000,00000000,00000000,0000EC00,?,000000C3,00000001,?,XYYY,00000004,?), ref: 00478595
                                                                              • __vbaFreeStr.MSVBVM60(00000000,59595958,004785A3,?,00000000,00000000,00000000,00000000,0000EC00,?,000000C3,00000001,?,XYYY,00000004,?), ref: 0047859D
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Error$System$Free$AnsiCopyUnicode$#644Ary1ChkstkConstruct2DerefDestructListNofreeUboundVarg
                                                                              • String ID: XYYY$YP$h
                                                                              • API String ID: 2846926467-2757690854
                                                                              • Opcode ID: 5bbe571978f865706c1a6d4482188cb6d01c599a7376ba44e7bd2f2a37ed98f4
                                                                              • Instruction ID: 11adce419322e003cdb44255061abea350e449fc04796d4d1ce0f81548f1839a
                                                                              • Opcode Fuzzy Hash: 5bbe571978f865706c1a6d4482188cb6d01c599a7376ba44e7bd2f2a37ed98f4
                                                                              • Instruction Fuzzy Hash: 65B1D870C40208EBDB10DFE5C945BDDBBB8BF04709F20856EE114BB292D7799A059F59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 004756D1
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00403046), ref: 004756FE
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 0047570C
                                                                              • __vbaUbound.MSVBVM60(00000001,?,000000FF,?,?,?,?,00403046), ref: 0047572F
                                                                              • __vbaLbound.MSVBVM60(00000001,?,00000001,?,000000FF,?,?,?,?,00403046), ref: 0047573D
                                                                              • __vbaAryLock.MSVBVM60(?,?,00000001,?,00000001,?,000000FF,?,?,?,?,00403046), ref: 0047576B
                                                                              • __vbaDerefAry1.MSVBVM60(?,00000000,?,?,00000001,?,00000001,?,000000FF,?,?,?,?,00403046), ref: 00475775
                                                                              • #644.MSVBVM60(00000000,?,00000000,?,?,00000001,?,00000001,?,000000FF,?,?,?,?,00403046), ref: 0047577B
                                                                              • __vbaAryUnlock.MSVBVM60(?,00000000,?,00000000,?,?,00000001,?,00000001,?,000000FF,?,?,?,?,00403046), ref: 0047578A
                                                                              • __vbaLenBstr.MSVBVM60(00000000), ref: 004757FF
                                                                              • #644.MSVBVM60(00000000,00000000), ref: 00475812
                                                                              • __vbaSetSystemError.MSVBVM60(000000FF,00000001,00000000,00000000,?,?,?,00000000), ref: 00475857
                                                                              • #685.MSVBVM60(000000FF,00000001,00000000,00000000,?,?,?,00000000), ref: 0047587D
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,000000FF,00000001,00000000,00000000,?,?,?,00000000), ref: 00475887
                                                                              • #685.MSVBVM60(?,00000000,000000FF,00000001,00000000,00000000,?,?,?,00000000), ref: 004758D6
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00000000,000000FF,00000001,00000000,00000000,?,?,?,00000000), ref: 004758E0
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463680,0000004C), ref: 00475927
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463680,00000044), ref: 00475992
                                                                              • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 004759B0
                                                                              • __vbaFreeVarList.MSVBVM60(00000004,?,?,?,?), ref: 004759D0
                                                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,?,00000000,000000FF,00000001,00000000,00000000,?,?,?,00000000), ref: 004759FD
                                                                              • __vbaAryLock.MSVBVM60(?,?,?,000000FF), ref: 00475A13
                                                                              • __vbaDerefAry1.MSVBVM60(?,00000000,?,?,?,?,?,000000FF), ref: 00475A23
                                                                              • __vbaSetSystemError.MSVBVM60(00000000,?,00000000,?,?,?,?,?,000000FF), ref: 00475A2E
                                                                              • __vbaAryUnlock.MSVBVM60(?,00000000,?,00000000,?,?,?,?,?,000000FF), ref: 00475A37
                                                                                • Part of subcall function 00475B16: __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00403046), ref: 00475B32
                                                                                • Part of subcall function 00475B16: __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,00403046), ref: 00475B62
                                                                                • Part of subcall function 00475B16: __vbaAryDestruct.MSVBVM60(00000000,000000FF,00475D04,?,?,?,00006011,00000040,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 00475CFE
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,?,00000000,?,?,?,?,?,000000FF), ref: 00475A50
                                                                              • __vbaAryCopy.MSVBVM60(?,?,?,?,00000000,?,00000000,?,?,?,?,?,000000FF), ref: 00475A64
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,?,?,?,00000000,?,00000000,?,?,?,?,?,000000FF), ref: 00475A78
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,?,?,?,?,00000000,?,00000000,?,?,?,?,?,000000FF), ref: 00475A8C
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00475AFD,?,?,?,?,?,?,00000000,?,00000000,?,?,?,?), ref: 00475AEF
                                                                              • __vbaFreeStr.MSVBVM60(00000000,?,00475AFD,?,?,?,?,?,?,00000000,?,00000000,?,?,?,?), ref: 00475AF7
                                                                              • __vbaErrorOverflow.MSVBVM60(00000001,?,00000001,?,000000FF,?,?,?,?,00403046), ref: 00475B11
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Error$System$Free$#644#685Ary1CheckChkstkCopyDerefDestructHresultListLockUnlock$BstrLboundMoveOverflowRedimUbound
                                                                              • String ID: F0@
                                                                              • API String ID: 2820688552-583819011
                                                                              • Opcode ID: fe5edf81040c078596d376604625cfd9373e5fcb5daa3f8465aa070db372963f
                                                                              • Instruction ID: a14fe08241c79dcff0c69ddc3c8f68b881984a82ac9761bb85a0a27e7e2fdeed
                                                                              • Opcode Fuzzy Hash: fe5edf81040c078596d376604625cfd9373e5fcb5daa3f8465aa070db372963f
                                                                              • Instruction Fuzzy Hash: 34B1F8B190021DEFDB20EF91CD45BDDBBB8BB08305F1084AAE508BB291DB795B489F55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                              • __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                              • #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                              • __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                              • __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001), ref: 00491AC9
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00008008), ref: 00491AEE
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00008008), ref: 00491B18
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00008008,?,00008008), ref: 00491B83
                                                                              • __vbaFreeVar.MSVBVM60(00491BF3,?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491BED
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$#632BstrChkstkMove
                                                                              • String ID: 043B0116002A06073B281612$1206353B08372F1136263825080A3539$1C0100033A30213538360A3B3C0E$38281B223F341E01101F2A$3B10262E18013C111C3021232E2C3B32$3B27111936082716310C1217370D1F2D1734$3F2B05183B27331D2A012820$@$@$HmNvmVBguXdIDGamMqtRfgtXNvflHSUVSGyInRTHemd$OJhrwOQMtTZeXyviJEEOdmuZCLFTOAUl$TnAiVJUrGbzOUPNJtbkcuRw$bFcGVaYNeSvJJkoFJsJYi$hRRsbuKjFWDyqgfNeuSWqzyK$jlUxmSXUyRiadzhrBeMIDpy$lhuRzpsYpxsNMZICFWscCc
                                                                              • API String ID: 709305823-3171199598
                                                                              • Opcode ID: c789da3a91e03e876003480e175595c10095d36da3ee9ec1228387a3dfa28664
                                                                              • Instruction ID: 3656713adc2afd8e35e1ff5a70ae8da70269f6e9e7552f26c9d82625b11d7697
                                                                              • Opcode Fuzzy Hash: c789da3a91e03e876003480e175595c10095d36da3ee9ec1228387a3dfa28664
                                                                              • Instruction Fuzzy Hash: 7D711D71D0060ADADF10CFE5C884AEEBBBCBF04745F10847BA554E6150EB7C9A0ACB69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,00000000,00403046,000000FF), ref: 004770AE
                                                                              • __vbaOnError.MSVBVM60(00000001,?,?,?,00000000,00403046), ref: 004770D0
                                                                              • __vbaRedim.MSVBVM60(00000080,00000001,00000000,00000011,00000001,00100015,00000000,00000001,?,?,?,00000000,00403046), ref: 004770F4
                                                                              • #644.MSVBVM60(AES), ref: 00477160
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,00000000,00000000,AES), ref: 0047717B
                                                                              • #644.MSVBVM60(ChainingMode,?,?,00000000,00000000,AES), ref: 0047719B
                                                                              • #644.MSVBVM60(ChainingModeGCM,ChainingMode,?,?,00000000,00000000,AES), ref: 004771A8
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode,?,?,00000000,00000000,AES), ref: 004771CB
                                                                              • __vbaAryLock.MSVBVM60(?,00000000,?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode,?,?,00000000,00000000,AES), ref: 004771EF
                                                                              • __vbaDerefAry1.MSVBVM60(?,00000000,?,00000000,?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode,?,?,00000000,00000000,AES), ref: 004771F9
                                                                              • #644.MSVBVM60(00000000,?,00000000,?,00000000,?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode,?,?,00000000,00000000), ref: 004771FF
                                                                              • __vbaAryUnlock.MSVBVM60(?,00000000,?,00000000,?,00000000,?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode,?,?,00000000), ref: 0047720B
                                                                              • __vbaUbound.MSVBVM60(00000001,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode), ref: 00477219
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,00000000,00000000,00000000,-00000001,00000001,00000000,00000000,?,00000000,?,00000000,?,00000000,?), ref: 0047723E
                                                                              • #644.MSVBVM60(?,?,?,00000000,00000000,00000000,-00000001,00000001,00000000,00000000,?,00000000,?,00000000,?,00000000), ref: 0047725D
                                                                              • __vbaAryLock.MSVBVM60(?,00000000,?,?,?,00000000,00000000,00000000,-00000001,00000001,00000000,00000000,?,00000000,?,00000000), ref: 00477271
                                                                              • __vbaDerefAry1.MSVBVM60(?,00000000,?,00000000,?,?,?,00000000,00000000,00000000,-00000001,00000001,00000000,00000000,?,00000000), ref: 0047727B
                                                                              • #644.MSVBVM60(00000000,?,00000000,?,00000000,?,?,?,00000000,00000000,00000000,-00000001,00000001,00000000,00000000,?), ref: 00477281
                                                                              • __vbaAryUnlock.MSVBVM60(?,00000000,?,00000000,?,00000000,?,?,?,00000000,00000000,00000000,-00000001,00000001,00000000,00000000), ref: 0047728D
                                                                              • __vbaSetSystemError.MSVBVM60(?,00000000,00401E30,?,00000000,00000000,00000000,00401E30,?,00000000,?,00000000,?,00000000,?,00000000), ref: 004772BF
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,00000000,00401E30,?,00000000,00000000,00000000,00401E30,?,00000000,?,00000000,?,00000000,?), ref: 004772F1
                                                                              • __vbaSetSystemError.MSVBVM60(?,00000000,?,?,?,00000020,00000000,ChainingModeGCM,ChainingMode,?,?,00000000,00000000,AES), ref: 00477300
                                                                              • __vbaExitProc.MSVBVM60(?,?,00000000,00000000,AES), ref: 00477305
                                                                              • __vbaFreeStr.MSVBVM60(00477324,?,?,00000000,00000000,AES), ref: 0047731E
                                                                              • __vbaErrorOverflow.MSVBVM60(00000000,00000001,?,?,?,00000000,00403046), ref: 00477339
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Error$#644System$Ary1DerefLockUnlock$ChkstkExitFreeOverflowProcRedimUbound
                                                                              • String ID: AES$ChainingMode$ChainingModeGCM$F0@
                                                                              • API String ID: 3939052650-1881033959
                                                                              • Opcode ID: afaf53f97e1fa5ecd2acecaf44f6ee6b93b9ea5235e1cede29078ed972f24d75
                                                                              • Instruction ID: fdfc90a0a0d61808a7e9ff62fba440733b72b8e899038cff710dc1e959dee4f4
                                                                              • Opcode Fuzzy Hash: afaf53f97e1fa5ecd2acecaf44f6ee6b93b9ea5235e1cede29078ed972f24d75
                                                                              • Instruction Fuzzy Hash: 99712D71940209AFDF20AFA5CC45B9E7BB8BF08705F10446AF504FB292DB799A40DF18
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00000001,?,00000000,00403046), ref: 00490EA5
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,00000000,00000000,00403046), ref: 00490ED5
                                                                                • Part of subcall function 00491966: __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                                • Part of subcall function 00491966: __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                                • Part of subcall function 00491966: #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                                • Part of subcall function 00491966: __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                                • Part of subcall function 00491966: __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • #632.MSVBVM60(?,00004008,00000000,00000002), ref: 00490F28
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 00490F4C
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 00490F62
                                                                              • #632.MSVBVM60(?,00004008,00000000,00000002), ref: 00490FDC
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 00491000
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 00491016
                                                                              • __vbaErrorOverflow.MSVBVM60 ref: 004911B7
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$#632Free$ChkstkErrorList$BstrMoveOverflow
                                                                              • String ID: : $Invalid Boolean at position $false$true$SF
                                                                              • API String ID: 1681788645-1317634540
                                                                              • Opcode ID: ccdd2b9ef101c2b6f6c13fdd4730a9ced8fca17eb42d9c36077967112b1e755d
                                                                              • Instruction ID: e9d0a11425906949053bd1652f24ebc86955a03ae0d70c9061dd86b73f211c37
                                                                              • Opcode Fuzzy Hash: ccdd2b9ef101c2b6f6c13fdd4730a9ced8fca17eb42d9c36077967112b1e755d
                                                                              • Instruction Fuzzy Hash: 5F81DAB1900218AEDF11DFD4CC85BDEBBBDBF08304F1441AAE509AB291DB799B488B55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046), ref: 0048FBCB
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 0048FBFB
                                                                                • Part of subcall function 00491966: __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                                • Part of subcall function 00491966: __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                                • Part of subcall function 00491966: #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                                • Part of subcall function 00491966: __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                                • Part of subcall function 00491966: __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • #632.MSVBVM60(?,00004008,00000000,00000002), ref: 0048FC45
                                                                              • __vbaVarMove.MSVBVM60(?,00004008,00000000,00000002), ref: 0048FC53
                                                                              • __vbaFreeVar.MSVBVM60(?,00004008,00000000,00000002), ref: 0048FC5B
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,?,00004008,00000000,00000002), ref: 0048FC80
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,?,00004008,00000000,00000002), ref: 0048FCCD
                                                                              • __vbaVarSetObj.MSVBVM60(000000FF,00000000,00000000,00000000,00008008,?,00008008,?,?,00004008,00000000,00000002), ref: 0048FCF0
                                                                              • __vbaFreeVar.MSVBVM60(0048FF35,00000000,00000000,00008008,?,00008008,?,00008008,?,?,00004008,00000000,00000002), ref: 0048FF2F
                                                                                • Part of subcall function 0048ECD3: __vbaChkstk.MSVBVM60(00000000,00403046,000000FF,?,?,?,00000000,00403046), ref: 0048ECF1
                                                                                • Part of subcall function 0048ECD3: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,000000FF), ref: 0048ED21
                                                                                • Part of subcall function 0048ECD3: __vbaNew.MSVBVM60(00468E24,000000FF,?,?,?,00000000,00403046,000000FF), ref: 0048ED32
                                                                                • Part of subcall function 0048ECD3: __vbaObjSet.MSVBVM60(?,00000000,00468E24,000000FF,?,?,?,00000000,00403046,000000FF), ref: 0048ED3C
                                                                                • Part of subcall function 0048ECD3: #632.MSVBVM60(?,00004008,00000000,00000002), ref: 0048ED8F
                                                                                • Part of subcall function 0048ECD3: __vbaVarTstNe.MSVBVM60(00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 0048EDB3
                                                                                • Part of subcall function 0048ECD3: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 0048EDC9
                                                                                • Part of subcall function 0048ECD3: __vbaStrCat.MSVBVM60(Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EDF2
                                                                                • Part of subcall function 0048ECD3: __vbaStrMove.MSVBVM60(Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EDFC
                                                                                • Part of subcall function 0048ECD3: __vbaStrI4.MSVBVM60(00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE07
                                                                                • Part of subcall function 0048ECD3: __vbaStrMove.MSVBVM60(00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE11
                                                                                • Part of subcall function 0048ECD3: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE17
                                                                                • Part of subcall function 0048ECD3: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE21
                                                                                • Part of subcall function 0048ECD3: __vbaStrCat.MSVBVM60( : ,00000000,00000000,00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE2C
                                                                              Strings
                                                                              • FYlFwJISozqIFHXalfKuuPtybyQRkyA, xrefs: 0048FE1C
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$#632Chkstk$Error$BstrList
                                                                              • String ID: FYlFwJISozqIFHXalfKuuPtybyQRkyA
                                                                              • API String ID: 1622249816-1543268161
                                                                              • Opcode ID: 3037f5e7d83434569d19d219b0dc2d37ea41aa2fe57262269aeee12480627aaa
                                                                              • Instruction ID: 255efccbd0627980e9180c79f431d3126568e6a10709dce6e9caf5d4119f52c2
                                                                              • Opcode Fuzzy Hash: 3037f5e7d83434569d19d219b0dc2d37ea41aa2fe57262269aeee12480627aaa
                                                                              • Instruction Fuzzy Hash: 7891B8B180021DAADF10EFE1CC45BDEBBB8BF04308F10856EE515AB191DBB99609DF55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046), ref: 004911DA
                                                                                • Part of subcall function 00491966: __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                                • Part of subcall function 00491966: __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                                • Part of subcall function 00491966: #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                                • Part of subcall function 00491966: __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                                • Part of subcall function 00491966: __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • #632.MSVBVM60(?,00004008,00000000,00000002,00000000,F0@,?,?,00000000,00000000,00403046), ref: 0049122C
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,?,00004008,00000000,00000002,00000000,F0@,?,?,00000000,00000000,00403046), ref: 00491250
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,00004008,00000000,00000002,00000000,F0@,?,?,00000000,00000000,00403046), ref: 00491266
                                                                              • __vbaVarMove.MSVBVM60(00000000,00000000,00403046), ref: 0049128C
                                                                              • __vbaStrCat.MSVBVM60(Invalid null value at position ,00000000,00000000,00403046), ref: 004912B4
                                                                              • __vbaStrMove.MSVBVM60(Invalid null value at position ,00000000,00000000,00403046), ref: 004912BE
                                                                              • __vbaStrI4.MSVBVM60(00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 004912C9
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 004912D3
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 004912D9
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 004912E3
                                                                              • __vbaStrCat.MSVBVM60( : ,00000000,00000000,00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 004912EE
                                                                              • #632.MSVBVM60(?,00004008,00000000,0000000A, : ,00000000,00000000,00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 00491332
                                                                              • __vbaVarCat.MSVBVM60(00000005,?,00000008,?,00004008,00000000,0000000A, : ,00000000,00000000,00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 00491357
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,00000000,00000005,?,00000008,?,00004008,00000000,0000000A, : ,00000000,00000000,00000000,00000000,Invalid null value at position ), ref: 00491368
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,?,00000008,00000000,00000005,?,00000008,?,00004008,00000000,0000000A, : ,00000000,00000000,00000000,00000000), ref: 0049136E
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000008,00000000,00000005,?,00000008,?,00004008,00000000,0000000A, : ,00000000,00000000,00000000,00000000), ref: 0049137A
                                                                              • __vbaFreeStrList.MSVBVM60(00000003,00000000,00402BC0,000000FF,00000000,?,00000008,00000000,00000005,?,00000008,?,00004008,00000000,0000000A, : ), ref: 0049138D
                                                                              • __vbaFreeVarList.MSVBVM60(00000005,0000000A,00000008,?,00000005,?,00000000,00000000,00000000,Invalid null value at position ,00000000,00000000,00403046), ref: 004913AB
                                                                              • __vbaErrorOverflow.MSVBVM60(00000000,00000000,00403046), ref: 00491420
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$#632List$Chkstk$BstrErrorOverflow
                                                                              • String ID: : $F0@$Invalid null value at position $null
                                                                              • API String ID: 1634014873-2541574809
                                                                              • Opcode ID: 7b08198524d9dcbd0360449e198f0d21a91504e1446aa9bcff9a87db695c8ee5
                                                                              • Instruction ID: 216e3fcd38b9e717e2d0f3010c0cae66cc1edf05e494358dd1fbd7a525ff7999
                                                                              • Opcode Fuzzy Hash: 7b08198524d9dcbd0360449e198f0d21a91504e1446aa9bcff9a87db695c8ee5
                                                                              • Instruction Fuzzy Hash: CB5109B2900218AECB11DFE5CC81BDEBBBCBB08305F0445AEF505F6181EB789A498B55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,00000001,?,?,?,00000000,00403046), ref: 0047497A
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046,00000001), ref: 004749A7
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,00000001), ref: 004749B5
                                                                              • __vbaNew.MSVBVM60(004645DC,000000FF,?,?,?,00000000,00403046,00000001), ref: 004749C6
                                                                              • __vbaObjSet.MSVBVM60(000000FF,00000000,004645DC,000000FF,?,?,?,00000000,00403046,00000001), ref: 004749D0
                                                                              • __vbaStrCat.MSVBVM60(\*.*,?,000000FF,00000000,004645DC,000000FF,?,?,?,00000000,00403046,00000001), ref: 004749E4
                                                                              • #645.MSVBVM60(00000008,00000017), ref: 004749F9
                                                                              • __vbaStrMove.MSVBVM60(00000008,00000017), ref: 00474A03
                                                                              • __vbaFreeVar.MSVBVM60(00000008,00000017), ref: 00474A0B
                                                                              • __vbaLenBstr.MSVBVM60(?,00000008,00000017), ref: 00474A1A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$#645BstrChkstkCopyErrorFreeMove
                                                                              • String ID: \*.*
                                                                              • API String ID: 1446046255-1173974218
                                                                              • Opcode ID: 5d9bc3205de85cc4ac703ac3837830a3bd268bb1d7e3c80d11df2511fcde154b
                                                                              • Instruction ID: 6a4283929d2c0455721d3d499e4aaf01ff5b9f5fa6265c183bb781c3f23c5fd2
                                                                              • Opcode Fuzzy Hash: 5d9bc3205de85cc4ac703ac3837830a3bd268bb1d7e3c80d11df2511fcde154b
                                                                              • Instruction Fuzzy Hash: F151F5B1C0121CEEDB10EFA5C945BDDBBB8BF08309F5080AAE514B7191DB785B489F69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,00000000,?,SELECT c3author FROM ,?,?,SELECT value FROM ,?,?,?,?,00000000,00000000), ref: 00476C5E
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,?), ref: 00476C8E
                                                                              • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,?,000000FF,00000000,00000000,000000FF,?,?,?,00000000,00403046,?), ref: 00476CB2
                                                                              • __vbaStrCopy.MSVBVM60(0000FDE9,00000000,?,000000FF,00000000,00000000,000000FF), ref: 00476CD9
                                                                              • __vbaVarDup.MSVBVM60 ref: 00476CFE
                                                                              • #607.MSVBVM60(?,00000000,00000000), ref: 00476D18
                                                                              • __vbaStrVarMove.MSVBVM60(?,?,00000000,00000000), ref: 00476D21
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,00000000), ref: 00476D2B
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000000,?,?,?,00000000,00000000), ref: 00476D3A
                                                                              • #644.MSVBVM60(?,?,00000000,00403046,?), ref: 00476D4C
                                                                              • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,?,000000FF,?,?,?,?,00000000,00403046,?), ref: 00476D6E
                                                                              • #685.MSVBVM60(0000FDE9,00000000,?,000000FF), ref: 00476D8D
                                                                              • __vbaObjSet.MSVBVM60(000000FF,00000000,0000FDE9,00000000,?,000000FF), ref: 00476D97
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463680,0000004C), ref: 00476DC6
                                                                              • __vbaFreeObj.MSVBVM60(00000000,?,00463680,0000004C), ref: 00476DDD
                                                                              • __vbaFreeStr.MSVBVM60(00476E1F,0000FDE9,00000000,?,000000FF), ref: 00476E19
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ErrorFree$MoveSystem$#607#644#685CheckChkstkCopyHresultList
                                                                              • String ID: ProcessorID$SerialNumber$Win32_BIOS$Win32_Processor
                                                                              • API String ID: 3864168162-628225305
                                                                              • Opcode ID: 57a8c50e9aac49094738cc86b2e50b3b689c364036051a8882cc6c66af2713fe
                                                                              • Instruction ID: 2e8d644a6789e3d85e2011c71e4e5fe1b601bbdfa463858721c4b65dbf1f8658
                                                                              • Opcode Fuzzy Hash: 57a8c50e9aac49094738cc86b2e50b3b689c364036051a8882cc6c66af2713fe
                                                                              • Instruction Fuzzy Hash: 6241F6B1D00208EADB10EFE5C946BDEBBB9BB04705F20816AE114BB191DB795B04DF59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,000000FF), ref: 00476E54
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476E84
                                                                              • __vbaLenBstr.MSVBVM60(00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476E95
                                                                              • __vbaLenBstr.MSVBVM60(00000000,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476EAF
                                                                              • _adj_fdiv_m64.MSVBVM60(00000000,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476EE3
                                                                              • __vbaFpI4.MSVBVM60(00000000,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476EF2
                                                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,00000000,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476F1F
                                                                              • __vbaUbound.MSVBVM60(00000001,?,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00476F33
                                                                              • #631.MSVBVM60(00000000,-00000001,00000002,00464494), ref: 00476F9C
                                                                              • __vbaStrMove.MSVBVM60(00000000,-00000001,00000002,00464494), ref: 00476FA6
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,-00000001,00000002,00464494), ref: 00476FAC
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,-00000001,00000002,00464494), ref: 00476FB6
                                                                              • #581.MSVBVM60(00000000,00000000,00000000,-00000001,00000002,00464494), ref: 00476FBC
                                                                              • __vbaFpUI1.MSVBVM60(00000000,00000000,00000000,-00000001,00000002,00464494), ref: 00476FC1
                                                                              • __vbaDerefAry1.MSVBVM60(?,00000000,00000000,00000000,00000000,-00000001,00000002,00464494), ref: 00476FCE
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,00000001,?,00000000,00000000,00000000,00000000,-00000001,00000002,00464494), ref: 00476FDF
                                                                              • __vbaFreeVar.MSVBVM60(?,00000001,?,00000000,000000FF), ref: 00476FEA
                                                                              • __vbaAryCopy.MSVBVM60(000000FF,?), ref: 0047700A
                                                                              • __vbaAryCopy.MSVBVM60(000000FF,?,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00477020
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00477074,000000FF,?,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 00477063
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,00000000,?,00477074,000000FF,?,00000000,000000FF,?,?,?,00000000,00403046,000000FF), ref: 0047706E
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$BstrCopyDestructFreeMove$#581#631Ary1ChkstkDerefErrorListRedimUbound_adj_fdiv_m64
                                                                              • String ID:
                                                                              • API String ID: 31443760-0
                                                                              • Opcode ID: f5b9b4a59d9173d440fe9370c254417df750a5888191ceaae65d471aa78c22cf
                                                                              • Instruction ID: bed623bccfcc157324efbdbd464c84bc8105601d5becf2d7752d45cbb4ac8e78
                                                                              • Opcode Fuzzy Hash: f5b9b4a59d9173d440fe9370c254417df750a5888191ceaae65d471aa78c22cf
                                                                              • Instruction Fuzzy Hash: A9514E71D04208EADB00EFE5C946BDDBBB9AF08705F50806AF104BB192DB7D9B449B59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,00403046), ref: 00475B32
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,00403046), ref: 00475B62
                                                                              • __vbaSetSystemError.MSVBVM60(00000000,000000FF,?,00000000,?,00000000,00403046), ref: 00475B8B
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,000000FF,00475D04,?,?,?,00006011,00000040,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000), ref: 00475CFE
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Error$ChkstkDestructSystem
                                                                              • String ID:
                                                                              • API String ID: 2510513230-0
                                                                              • Opcode ID: b7b5eca1c45295ae48faad1e766d23d8135aa9652536208d44cf8e03c5b77fae
                                                                              • Instruction ID: 7c51e9297e75aa27dce56e1adcb255b2b1f17d757afe5d55a426838ee07b4a45
                                                                              • Opcode Fuzzy Hash: b7b5eca1c45295ae48faad1e766d23d8135aa9652536208d44cf8e03c5b77fae
                                                                              • Instruction Fuzzy Hash: FC410971D0020CAADF00EFE1C946BDEBBBDAF04709F10846AF101BA1C1DBB95B498B59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(000000FF,00403046,?,00000000,00403046), ref: 004785D8
                                                                              • __vbaLenBstr.MSVBVM60(004020B8,?,00000000,?,000000FF,00403046), ref: 004785EF
                                                                              • #631.MSVBVM60(004020B8,00000001,00000002), ref: 0047863C
                                                                              • __vbaStrMove.MSVBVM60(004020B8,00000001,00000002), ref: 00478646
                                                                              • #516.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 0047864C
                                                                              • __vbaFreeStr.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478658
                                                                              • __vbaFreeVar.MSVBVM60(00000000,004020B8,00000001,00000002), ref: 00478660
                                                                              • __vbaLenBstr.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 0047867C
                                                                              • #631.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 00478698
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A2
                                                                              • #516.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786A8
                                                                              • __vbaFreeStr.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786B4
                                                                              • __vbaFreeVar.MSVBVM60(00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786BC
                                                                              • #608.MSVBVM60(00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786DE
                                                                              • __vbaVarAdd.MSVBVM60(?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786EF
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786F5
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8,00000001,00000002), ref: 004786FF
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00000000,?,00000002,00000008,00000002,004020B8,00000000,?,?,?,00000002,00000000,004020B8), ref: 0047870E
                                                                              • __vbaStrCopy.MSVBVM60 ref: 00478721
                                                                              • __vbaFreeStr.MSVBVM60(00478763), ref: 0047875D
                                                                              • __vbaErrorOverflow.MSVBVM60(?,00000002,00000000,004020B8,00000001,00000002), ref: 00478777
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$Move$#516#631Bstr$#608ChkstkCopyErrorListOverflow
                                                                              • String ID:
                                                                              • API String ID: 2799467133-0
                                                                              • Opcode ID: 805c7c0aa84d3a4a54678498b4187d948343e102a140c698c0ae319a6c3fbdac
                                                                              • Instruction ID: 024b6bc339e83c481be56151fc05f4262dbf58d9ce1b4ce22c6d60f65aa4794d
                                                                              • Opcode Fuzzy Hash: 805c7c0aa84d3a4a54678498b4187d948343e102a140c698c0ae319a6c3fbdac
                                                                              • Instruction Fuzzy Hash: F241FF71D00108ABCB04EFE5D885ADDBBBDAF08705F10846EF415BB191DF79AA09CB59
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00494A38
                                                                              • __vbaLenBstrB.MSVBVM60(?,?,?,?,?,00403046), ref: 00494A61
                                                                              • #525.MSVBVM60(10A025FF,120825FF,?,?,?,?,?,00403046), ref: 00494ACC
                                                                              • __vbaStrMove.MSVBVM60(10A025FF,120825FF,?,?,?,?,?,00403046), ref: 00494AD6
                                                                              • __vbaStrCat.MSVBVM60(00000000,10A025FF,120825FF,?,?,?,?,?,00403046), ref: 00494ADC
                                                                              • __vbaStrMove.MSVBVM60(00000000,10A025FF,120825FF,?,?,?,?,?,00403046), ref: 00494AE6
                                                                              • __vbaStrCopy.MSVBVM60(00000000,10A025FF,120825FF,?,?,?,?,?,00403046), ref: 00494AF3
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,?,120825FF,00000000,10A025FF,120825FF,?,?,?,?,?,00403046), ref: 00494B02
                                                                              • #644.MSVBVM60(120825FF,?,?,?,?,?,00403046), ref: 00494B19
                                                                              • #644.MSVBVM60(?,?,?,?,?,00403046), ref: 00494B46
                                                                              • __vbaSetSystemError.MSVBVM60(?,?,?,?,?,?,?,?,00403046), ref: 00494B5C
                                                                              • __vbaErrorOverflow.MSVBVM60(?,?,?,?,?,00403046), ref: 00494BAC
                                                                              • __vbaChkstk.MSVBVM60(?,?,?,?,?,?,00403046), ref: 00494BB7
                                                                              • __vbaErrorOverflow.MSVBVM60(?,?,?,?,?,?,00403046), ref: 00494C2F
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,00403046), ref: 00494C50
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ChkstkError$#644MoveOverflow$#525BstrCopyFreeListSystem
                                                                              • String ID: (0@F0@$F0@
                                                                              • API String ID: 21753614-824412338
                                                                              • Opcode ID: a5d37edb5aa6ed87d5e9dceb925bd93b76201e04ae2111d12fb003b81043e703
                                                                              • Instruction ID: d02c8303d614e6942f024641b83706b24c600e1474572b768152674ebf41ec75
                                                                              • Opcode Fuzzy Hash: a5d37edb5aa6ed87d5e9dceb925bd93b76201e04ae2111d12fb003b81043e703
                                                                              • Instruction Fuzzy Hash: 5781E175A00208AFCB00DFA9C891E9DBFB9FF48355F10846AF805AB351D739EA41DB58
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046), ref: 00490CAC
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 00490CDC
                                                                                • Part of subcall function 00491966: __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                                • Part of subcall function 00491966: __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                                • Part of subcall function 00491966: #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                                • Part of subcall function 00491966: __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                                • Part of subcall function 00491966: __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • __vbaLenBstr.MSVBVM60(00000000,00000000,00000000,000000FF,?,?,?,00000000,00403046), ref: 00490D0A
                                                                              • #632.MSVBVM60(?,00004008,00000000,00000002), ref: 00490D56
                                                                              • __vbaStrVarMove.MSVBVM60(?,?,00004008,00000000,00000002), ref: 00490D5F
                                                                              • __vbaStrMove.MSVBVM60(?,?,00004008,00000000,00000002), ref: 00490D69
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,00000002,?,?,?,00004008,00000000,00000002), ref: 00490D78
                                                                              • __vbaInStr.MSVBVM60(00000000,?,+-0123456789.eE,00000001,?,00000000,00403046), ref: 00490D93
                                                                              • __vbaStrCat.MSVBVM60(?,?,00000000,?,+-0123456789.eE,00000001,?,00000000,00403046), ref: 00490DA9
                                                                              • __vbaStrMove.MSVBVM60(?,?,00000000,?,+-0123456789.eE,00000001,?,00000000,00403046), ref: 00490DB3
                                                                              • #564.MSVBVM60(00004008,?), ref: 00490DF0
                                                                              • __vbaHresultCheck.MSVBVM60(00000000,?,?,?,00004008,?), ref: 00490E01
                                                                              • __vbaVarMove.MSVBVM60(?,?,?,?,?,?,?,?,?,00004008,?), ref: 00490E1B
                                                                              • __vbaFreeStr.MSVBVM60(00490E64,00000000,00000000,00000000,000000FF,?,?,?,00000000,00403046), ref: 00490E56
                                                                              • __vbaFreeStr.MSVBVM60(00490E64,00000000,00000000,00000000,000000FF,?,?,?,00000000,00403046), ref: 00490E5E
                                                                              • __vbaErrorOverflow.MSVBVM60(?,?,00000000,?,+-0123456789.eE,00000001,?,00000000,00403046), ref: 00490E82
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$#632BstrChkstkError$#564CheckHresultListOverflow
                                                                              • String ID: +-0123456789.eE
                                                                              • API String ID: 147337221-3706364263
                                                                              • Opcode ID: 923d83b75632b485d2c11022843f4067ea38f5cfb0656d46b141bfef58fabc62
                                                                              • Instruction ID: b4c9517b6f09b618a8107c4d90b7df975babe7787e58387b0ae789ef273bf138
                                                                              • Opcode Fuzzy Hash: 923d83b75632b485d2c11022843f4067ea38f5cfb0656d46b141bfef58fabc62
                                                                              • Instruction Fuzzy Hash: 4B5103B1800208EFDF00EFA1C945BDEBFB9BF08309F10456AE500BB291DB799A49DB55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,?,?,?,?,?,?,?,00460E8C,?,00000001), ref: 00488E33
                                                                              • __vbaOnError.MSVBVM60(00000001,?,00000000,?,00000000,00403046), ref: 00488E55
                                                                              • #556.MSVBVM60(00000000,00000001,?,00000000,?,00000000,00403046), ref: 00488E5D
                                                                              • __vbaVarDup.MSVBVM60 ref: 00488E8B
                                                                              • #710.MSVBVM60(00000000,?,004644BC), ref: 00488E9C
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,004644BC), ref: 00488EA6
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,?,004644BC), ref: 00488EAC
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,?,004644BC), ref: 00488EB6
                                                                              • __vbaStrCat.MSVBVM60(004644BC,00000000,00000000,00000000,?,004644BC), ref: 00488EC1
                                                                              • __vbaVarVargNofree.MSVBVM60(00000008,00000008,00000001,?,?,?,?,?,?,?,?,?,?,004644BC,00000000,00000000), ref: 00488F1F
                                                                              • __vbaVarCat.MSVBVM60(?,00000000,00000008,00000008,00000001,?,?,?,?,?,?,?,?,?,?,004644BC), ref: 00488F29
                                                                              • __vbaVarCat.MSVBVM60(?,00000008,00000000,?,00000000,00000008,00000008,00000001), ref: 00488F3A
                                                                              • __vbaInStrVar.MSVBVM60(?,00000000,00000000,?,00000008,00000000,?,00000000,00000008,00000008,00000001), ref: 00488F46
                                                                              • __vbaVarCmpGt.MSVBVM60(?,00008002,00000000,?,00000000,00000000,?,00000008,00000000,?,00000000,00000008,00000008,00000001), ref: 00488F5A
                                                                              • __vbaBoolVar.MSVBVM60(00000000,?,00008002,00000000,?,00000000,00000000,?,00000008,00000000,?,00000000,00000008,00000008,00000001), ref: 00488F60
                                                                              • __vbaFreeStrList.MSVBVM60(00000002,00000000,?,00000000,?,00008002,00000000,?,00000000,00000000,?,00000008,00000000,?,00000000,00000008), ref: 00488F73
                                                                              • __vbaFreeVarList.MSVBVM60(00000005,?,?,?,?,?,?,00000000,00403046), ref: 00488F91
                                                                              • __vbaExitProc.MSVBVM60(?,?,?,?,?,?,?,00000000,00403046), ref: 00488FA0
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$FreeListMove$#556#710BoolChkstkErrorExitNofreeProcVarg
                                                                              • String ID:
                                                                              • API String ID: 496232756-0
                                                                              • Opcode ID: 5766eb7f07c5e7f3c96da69af25459a4cd74179ba06b6afe8a122b50ab268b47
                                                                              • Instruction ID: d8c8723dd84a7c58c413ff041b81cd70f8e2881af4e3c357658b7d202f6d7855
                                                                              • Opcode Fuzzy Hash: 5766eb7f07c5e7f3c96da69af25459a4cd74179ba06b6afe8a122b50ab268b47
                                                                              • Instruction Fuzzy Hash: B241BFB1900218AADB51EFD1CC46FDEBBBCAF04705F5045AFB109B6181DF785B888BA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046), ref: 00477512
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046), ref: 0047752C
                                                                              • __vbaDerefAry1.MSVBVM60(00401EA8,?), ref: 0047756D
                                                                              • __vbaStrUI1.MSVBVM60(?,00401EA8,?), ref: 00477575
                                                                              • __vbaStrMove.MSVBVM60(?,00401EA8,?), ref: 0047757F
                                                                              • __vbaStrCmp.MSVBVM60(004648B0,00000000,?,00401EA8,?), ref: 0047758A
                                                                              • __vbaFreeStr.MSVBVM60(004648B0,00000000,?,00401EA8,?), ref: 0047759E
                                                                              • __vbaDerefAry1.MSVBVM60(00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?,00401EA8,?), ref: 004775C0
                                                                              • #608.MSVBVM60(?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?,00401EA8,?), ref: 004775CD
                                                                              • __vbaVarAdd.MSVBVM60(?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?,00401EA8), ref: 004775DE
                                                                              • __vbaStrVarMove.MSVBVM60(00000000,?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?), ref: 004775E4
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?,004648B0,00000000,?), ref: 004775EE
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,00000000,?,?,00000008,?,?,00401EA8,?,004648B0,00000000,?,00401EA8,?), ref: 004775FD
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Ary1DerefFree$#608ChkstkCopyList
                                                                              • String ID: F0@
                                                                              • API String ID: 2804146614-583819011
                                                                              • Opcode ID: dfeeba53d8b721d153a7f47a1445e391acb544fa285b8ef8c6c8049bc00c02ca
                                                                              • Instruction ID: 1fa34009cc65e06942ca74ea042959cc7c8fa6a1d4936e5125da6dda39293f91
                                                                              • Opcode Fuzzy Hash: dfeeba53d8b721d153a7f47a1445e391acb544fa285b8ef8c6c8049bc00c02ca
                                                                              • Instruction Fuzzy Hash: 20310A71904149AFCB01EFE5C841AEEBBB8BF08705F00806BF415FB295EA3C96058B58
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,?,00000000,00403046), ref: 0047735A
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046), ref: 0047738A
                                                                              • #644.MSVBVM60(00000000,000000FF,?,?,?,00000000,00403046), ref: 0047739B
                                                                              • __vbaLenBstr.MSVBVM60(00000000,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,?,00000000,00403046), ref: 004773B0
                                                                              • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,000000FF,?,?,?,00000000,00403046), ref: 004773C8
                                                                              • __vbaRedim.MSVBVM60(00000080,00000001,?,00000011,00000001,-00000001,00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00477409
                                                                              • #644.MSVBVM60(00000000,00000000,000000FF), ref: 0047741D
                                                                              • __vbaAryLock.MSVBVM60(000000FF,?,00000000,00000000,000000FF), ref: 0047742C
                                                                              • __vbaDerefAry1.MSVBVM60(000000FF,00000000,00000000,00000000,00000000,000000FF,?,00000000,00000000,000000FF), ref: 0047743D
                                                                              • __vbaLenBstr.MSVBVM60(00000000,00000000,000000FF,00000000,00000000,00000000,00000000,000000FF,?,00000000,00000000,000000FF), ref: 00477448
                                                                              • __vbaSetSystemError.MSVBVM60(0000FDE9,00000000,00000000,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,000000FF,?,00000000,00000000,000000FF), ref: 0047745D
                                                                              • __vbaAryUnlock.MSVBVM60(000000FF,0000FDE9,00000000,00000000,00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,000000FF,?,00000000,00000000), ref: 00477466
                                                                              • __vbaStr2Vec.MSVBVM60(00000000,00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,000000FF), ref: 0047747A
                                                                              • __vbaAryMove.MSVBVM60(?,00000000,00000000,00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,000000FF), ref: 00477487
                                                                              • __vbaAryMove.MSVBVM60(?,?,?,00000000,00000000,00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0047749B
                                                                              • __vbaAryDestruct.MSVBVM60(00000000,?,004774DD,?,?,?,00000000,00000000,00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004774D7
                                                                              • __vbaErrorOverflow.MSVBVM60(00000000,0000FDE9,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,000000FF), ref: 004774F1
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Error$#644BstrMoveSystem$Ary1ChkstkDerefDestructLockOverflowRedimStr2Unlock
                                                                              • String ID:
                                                                              • API String ID: 2358522550-0
                                                                              • Opcode ID: d0383a0aeae4827d520a0b53d0006da010700e3a95693ad010d06377ad10e70e
                                                                              • Instruction ID: 3f6dbc0fc1bb7ef8d33318de8db2392eb0991ec10d2ec3c79a1f94de0fe99bab
                                                                              • Opcode Fuzzy Hash: d0383a0aeae4827d520a0b53d0006da010700e3a95693ad010d06377ad10e70e
                                                                              • Instruction Fuzzy Hash: B941FE71941208BADF10EFE5CD46FDDBFBCAB08705F10806AF600BA1D1DBB95A449B69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046,000000FF,?,?,?,?,00403046), ref: 0048EB21
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046,000000FF), ref: 0048EB51
                                                                              • __vbaStrCopy.MSVBVM60(000000FF), ref: 0048EB75
                                                                              • __vbaOnError.MSVBVM60(000000FF,000000FF), ref: 0048EB83
                                                                                • Part of subcall function 00491966: __vbaChkstk.MSVBVM60(00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 00491983
                                                                                • Part of subcall function 00491966: __vbaLenBstr.MSVBVM60(?,?,?,?,00000001,00403046,?,?,?,0048EB9B,?,00000001,000000FF,000000FF), ref: 004919A5
                                                                                • Part of subcall function 00491966: #632.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919EA
                                                                                • Part of subcall function 00491966: __vbaVarMove.MSVBVM60(00000001,00004008,00000001,00000002), ref: 004919F8
                                                                                • Part of subcall function 00491966: __vbaFreeVar.MSVBVM60(00000001,00004008,00000001,00000002), ref: 00491A00
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00000001,00004008,00000001,00000002), ref: 00491A1E
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A43
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491A7F
                                                                                • Part of subcall function 00491966: __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,00008008,?,00008008,?,00000001,00004008,00000001,00000002,?,00008008,?), ref: 00491AA4
                                                                              • #632.MSVBVM60(?,00004008,00000001,00000002), ref: 0048EBCC
                                                                              • __vbaVarMove.MSVBVM60(?,00004008,00000001,00000002), ref: 0048EBD7
                                                                              • __vbaFreeVar.MSVBVM60(?,00004008,00000001,00000002), ref: 0048EBDF
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,?,00004008,00000001,00000002), ref: 0048EC01
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00000001,00008008,?,?,00004008,00000001,00000002), ref: 0048EC25
                                                                              • __vbaVarTstEq.MSVBVM60(00008008,?,00008008,?,?,00004008,00000001,00000002), ref: 0048EC49
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00000001,00008008,?,00008008,?,?,00004008,00000001,00000002), ref: 0048EC6D
                                                                              • __vbaFreeVar.MSVBVM60(0048ECBF,00008008,?,00008008,?,?,00004008,00000001,00000002), ref: 0048ECB9
                                                                                • Part of subcall function 0048ECD3: __vbaChkstk.MSVBVM60(00000000,00403046,000000FF,?,?,?,00000000,00403046), ref: 0048ECF1
                                                                                • Part of subcall function 0048ECD3: __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,000000FF), ref: 0048ED21
                                                                                • Part of subcall function 0048ECD3: __vbaNew.MSVBVM60(00468E24,000000FF,?,?,?,00000000,00403046,000000FF), ref: 0048ED32
                                                                                • Part of subcall function 0048ECD3: __vbaObjSet.MSVBVM60(?,00000000,00468E24,000000FF,?,?,?,00000000,00403046,000000FF), ref: 0048ED3C
                                                                                • Part of subcall function 0048ECD3: #632.MSVBVM60(?,00004008,00000000,00000002), ref: 0048ED8F
                                                                                • Part of subcall function 0048ECD3: __vbaVarTstNe.MSVBVM60(00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 0048EDB3
                                                                                • Part of subcall function 0048ECD3: __vbaFreeVarList.MSVBVM60(00000002,00000002,?,00008008,?,?,?,?,?,?,00004008,00000000,00000002), ref: 0048EDC9
                                                                                • Part of subcall function 0048ECD3: __vbaStrCat.MSVBVM60(Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EDF2
                                                                                • Part of subcall function 0048ECD3: __vbaStrMove.MSVBVM60(Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EDFC
                                                                                • Part of subcall function 0048ECD3: __vbaStrI4.MSVBVM60(00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE07
                                                                                • Part of subcall function 0048ECD3: __vbaStrMove.MSVBVM60(00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE11
                                                                                • Part of subcall function 0048ECD3: __vbaStrCat.MSVBVM60(00000000,00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE17
                                                                                • Part of subcall function 0048ECD3: __vbaStrMove.MSVBVM60(00000000,00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE21
                                                                                • Part of subcall function 0048ECD3: __vbaStrCat.MSVBVM60( : ,00000000,00000000,00000000,00000000,Invalid Object at position ,?,00000000,00403046,000000FF), ref: 0048EE2C
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Move$Free$#632ChkstkError$BstrCopyList
                                                                              • String ID: Invalid JSON
                                                                              • API String ID: 3751134648-3555352431
                                                                              • Opcode ID: 4fd0c46417dd99995627cd2afdbaae9b2e40a0e6949a0661b9b3d9715efca9a6
                                                                              • Instruction ID: 03092c2cacfc20c782f6c5d2315950161e4ba131d2f2e89e7150101fd213a12d
                                                                              • Opcode Fuzzy Hash: 4fd0c46417dd99995627cd2afdbaae9b2e40a0e6949a0661b9b3d9715efca9a6
                                                                              • Instruction Fuzzy Hash: B141BBB1800248EADF00EFD1C945BDEBFBCAF04309F50856AE510BB181D7B99B49DB55
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,004020B8,?,00000000,?,000000FF,00403046), ref: 00478798
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,00000000,00403046,004020B8), ref: 004787C8
                                                                              • __vbaNew2.MSVBVM60(00463A5C,00000000,000000FF), ref: 004787E3
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00463A6C,0000007C), ref: 00478830
                                                                              • __vbaCastObj.MSVBVM60(?,00464D1C), ref: 00478846
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,?,00464D1C), ref: 00478850
                                                                              • __vbaFreeObj.MSVBVM60(?,00000000,?,00464D1C), ref: 00478858
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464D1C,00000024), ref: 0047888B
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,?,00464D1C,00000034), ref: 004788CF
                                                                              • __vbaStrMove.MSVBVM60(00000000,?,00464D1C,00000034), ref: 004788ED
                                                                              • __vbaCastObj.MSVBVM60(00000000,00463A4C), ref: 00478905
                                                                              • __vbaObjSet.MSVBVM60(00000000,00000000,00000000,00463A4C), ref: 0047890F
                                                                              • __vbaCastObj.MSVBVM60(00000000,00464D1C,00000000,00000000,00000000,00463A4C), ref: 00478922
                                                                              • __vbaObjSet.MSVBVM60(?,00000000,00000000,00464D1C,00000000,00000000,00000000,00463A4C), ref: 0047892C
                                                                              • __vbaFreeObj.MSVBVM60(0047896C,?,00000000,00000000,00464D1C,00000000,00000000,00000000,00463A4C), ref: 0047895E
                                                                              • __vbaFreeObj.MSVBVM60(0047896C,?,00000000,00000000,00464D1C,00000000,00000000,00000000,00463A4C), ref: 00478966
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$CastCheckFreeHresult$ChkstkErrorMoveNew2
                                                                              • String ID:
                                                                              • API String ID: 654950517-0
                                                                              • Opcode ID: 08f02e002767579c76e1987b44969f9d1b92188ddb5b51177e661b4631c298fe
                                                                              • Instruction ID: 0fab55457e0a77d89b39cabaa7c6253668dcbc73b1f1cb5b782a602ca7d6afb8
                                                                              • Opcode Fuzzy Hash: 08f02e002767579c76e1987b44969f9d1b92188ddb5b51177e661b4631c298fe
                                                                              • Instruction Fuzzy Hash: 5051F470D40208EFDB00EFD5C949BDDBBB8AF08705F20806AF515BB1A1DB795A05DB29
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00476415
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,?,00403046), ref: 00476445
                                                                              • __vbaLenBstr.MSVBVM60(?,000000FF,?,?,?,?,00403046), ref: 00476456
                                                                              • #632.MSVBVM60(?,00004008,00000001,00000002), ref: 004764CF
                                                                              • __vbaStrVarVal.MSVBVM60(?,?,?,00004008,00000001,00000002), ref: 004764DC
                                                                              • #516.MSVBVM60(00000000,?,?,?,00004008,00000001,00000002), ref: 004764E2
                                                                              • #573.MSVBVM60(?,00000002,00000000,?,?,?,00004008,00000001,00000002), ref: 004764FA
                                                                              • __vbaVarCat.MSVBVM60(?,?,00000008,00000002,?,?,00000002,00000000,?,?,?,00004008,00000001,00000002), ref: 0047652A
                                                                              • __vbaStrVarVal.MSVBVM60(000000FF,00000000,?,?,00000008,00000002,?,?,00000002,00000000,?,?,?,00004008,00000001,00000002), ref: 00476534
                                                                              • #618.MSVBVM60(00000000,000000FF,00000000,?,?,00000008,00000002,?,?,00000002,00000000,?,?,?,00004008,00000001), ref: 0047653A
                                                                              • __vbaStrMove.MSVBVM60(00000000,000000FF,00000000,?,?,00000008,00000002,?,?,00000002,00000000,?,?,?,00004008,00000001), ref: 00476544
                                                                              • __vbaStrCat.MSVBVM60(00000000,00000000,000000FF,00000000,?,?,00000008,00000002,?,?,00000002,00000000,?,?,?,00004008), ref: 0047654A
                                                                              • __vbaStrMove.MSVBVM60(00000000,00000000,000000FF,00000000,?,?,00000008,00000002,?,?,00000002,00000000,?,?,?,00004008), ref: 00476554
                                                                              • __vbaFreeStrList.MSVBVM60(00000003,?,000000FF,?,00000000,00000000,000000FF,00000000,?,?,00000008,00000002,?,?,00000002,00000000), ref: 00476567
                                                                              • __vbaFreeVarList.MSVBVM60(00000005,?,?,?,?,?), ref: 00476588
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$FreeListMove$#516#573#618#632BstrChkstkError
                                                                              • String ID:
                                                                              • API String ID: 1267330968-0
                                                                              • Opcode ID: de3b394fadf6ca5d3213256b831a0828cd25cb45c27872dd4bcce134f0d4d8db
                                                                              • Instruction ID: 4e0ee072498f900ee49e0c126da5e68458c3bd2d6bab10bc40e721f4c63cabd6
                                                                              • Opcode Fuzzy Hash: de3b394fadf6ca5d3213256b831a0828cd25cb45c27872dd4bcce134f0d4d8db
                                                                              • Instruction Fuzzy Hash: 3141CCB2C01208AADB11EFD1C945FDEBBBCAB04305F5085AAF105B7181DB799B488FA5
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,00000001,?,?,?,00000000,00403046), ref: 004779FC
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046,00000001), ref: 00477A29
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A37
                                                                              • __vbaObjIs.MSVBVM60(00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A4B
                                                                              • __vbaNew.MSVBVM60(004645DC,00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A63
                                                                              • __vbaObjSet.MSVBVM60(0049607C,00000000,004645DC,00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A6E
                                                                              • __vbaOnError.MSVBVM60(00000001,00000000,000000FF,?,?,?,00000000,00403046,00000001), ref: 00477A7C
                                                                              • __vbaHresultCheckObj.MSVBVM60(00000000,004645CC,0000001C), ref: 00477AD1
                                                                              • __vbaObjVar.MSVBVM60(?), ref: 00477AE9
                                                                              • __vbaObjSetAddref.MSVBVM60(?,00000000,?), ref: 00477AF3
                                                                              • __vbaFreeVar.MSVBVM60(?,00000000,?), ref: 00477AFB
                                                                              • __vbaExitProc.MSVBVM60(?,00000000,?), ref: 00477BF4
                                                                              • __vbaFreeObj.MSVBVM60(00477C36,?,00000000,?), ref: 00477C28
                                                                              • __vbaFreeStr.MSVBVM60(00477C36,?,00000000,?), ref: 00477C30
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Free$Error$AddrefCheckChkstkCopyExitHresultProc
                                                                              • String ID:
                                                                              • API String ID: 1712222688-0
                                                                              • Opcode ID: 4221915d8c7856c727a45f4ec5a6659418511d81a2d2e7161dd394e216103a19
                                                                              • Instruction ID: 432711ed2de4fec5d5dbbcd990ee6b497f4cfb5afe0bf227ebe055017a69daab
                                                                              • Opcode Fuzzy Hash: 4221915d8c7856c727a45f4ec5a6659418511d81a2d2e7161dd394e216103a19
                                                                              • Instruction Fuzzy Hash: 98314070900208EEDB10EFE1DC46BDEBBB8AB08709F5080AAE115761D1DB7D5B058B69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046,?,?,?,?,?,?,00000000,000000FF,?,00000000), ref: 00475D34
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,00000000,?,?,00403046), ref: 00475D64
                                                                              • __vbaInStr.MSVBVM60(00000000,004644BC,?,00000001,000000FF,?,00000000,?,?,00403046), ref: 00475D7E
                                                                              • #617.MSVBVM60(?,00004008,-00000001), ref: 00475DBC
                                                                              • #520.MSVBVM60(?,?,?,00004008,-00000001), ref: 00475DC9
                                                                              • __vbaStrVarMove.MSVBVM60(?,?,?,?,00004008,-00000001), ref: 00475DD2
                                                                              • __vbaStrMove.MSVBVM60(?,?,?,?,00004008,-00000001), ref: 00475DDC
                                                                              • __vbaFreeVarList.MSVBVM60(00000002,?,?,?,?,?,?,00004008,-00000001), ref: 00475DEB
                                                                              • __vbaStrCopy.MSVBVM60(00000000,004644BC,?,00000001,000000FF), ref: 00475E04
                                                                              • __vbaErrorOverflow.MSVBVM60 ref: 00475E4A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ErrorMove$#520#617ChkstkCopyFreeListOverflow
                                                                              • String ID: 6^G
                                                                              • API String ID: 4098594408-321381593
                                                                              • Opcode ID: 55753058b5ea3f8bbc85644a66f69ab93ef7f4ad55d8febf48bf530437b9cb8a
                                                                              • Instruction ID: f6716d06a49342a6f0779142bb8248efca42eac72b7131cc9bbe5d767a5b1a65
                                                                              • Opcode Fuzzy Hash: 55753058b5ea3f8bbc85644a66f69ab93ef7f4ad55d8febf48bf530437b9cb8a
                                                                              • Instruction Fuzzy Hash: FD21FCB1900248EADB00EFD5C946BCEBFBCAF04709F50416AF504BB281DBB99B448B95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 92%
                                                                              			E10001B2A(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                                                                              				struct HINSTANCE__* _t23;
                                                                              				intOrPtr _t28;
                                                                              				intOrPtr _t32;
                                                                              				intOrPtr _t45;
                                                                              				void* _t46;
                                                                              
                                                                              				_t35 = __ebx;
                                                                              				_push(0xc);
                                                                              				_push(0x1000c4a0);
                                                                              				E10002DCC(__ebx, __edi, __esi);
                                                                              				_t44 = L"KERNEL32.DLL";
                                                                              				_t23 = GetModuleHandleW(L"KERNEL32.DLL");
                                                                              				if(_t23 == 0) {
                                                                              					_t23 = E1000213B(_t44);
                                                                              				}
                                                                              				 *(_t46 - 0x1c) = _t23;
                                                                              				_t45 =  *((intOrPtr*)(_t46 + 8));
                                                                              				 *((intOrPtr*)(_t45 + 0x5c)) = 0x1000b298;
                                                                              				 *((intOrPtr*)(_t45 + 0x14)) = 1;
                                                                              				if(_t23 != 0) {
                                                                              					_t35 = GetProcAddress;
                                                                              					 *((intOrPtr*)(_t45 + 0x1f8)) = GetProcAddress(_t23, "EncodePointer");
                                                                              					 *((intOrPtr*)(_t45 + 0x1fc)) = GetProcAddress( *(_t46 - 0x1c), "DecodePointer");
                                                                              				}
                                                                              				 *((intOrPtr*)(_t45 + 0x70)) = 1;
                                                                              				 *((char*)(_t45 + 0xc8)) = 0x43;
                                                                              				 *((char*)(_t45 + 0x14b)) = 0x43;
                                                                              				 *(_t45 + 0x68) = 0x1000e288;
                                                                              				E100031D6(_t35, 0xd);
                                                                              				 *(_t46 - 4) =  *(_t46 - 4) & 0x00000000;
                                                                              				InterlockedIncrement( *(_t45 + 0x68));
                                                                              				 *(_t46 - 4) = 0xfffffffe;
                                                                              				E10001BFF();
                                                                              				E100031D6(_t35, 0xc);
                                                                              				 *(_t46 - 4) = 1;
                                                                              				_t28 =  *((intOrPtr*)(_t46 + 0xc));
                                                                              				 *((intOrPtr*)(_t45 + 0x6c)) = _t28;
                                                                              				if(_t28 == 0) {
                                                                              					_t32 =  *0x1000e278; // 0x1000e1a0
                                                                              					 *((intOrPtr*)(_t45 + 0x6c)) = _t32;
                                                                              				}
                                                                              				E10003352( *((intOrPtr*)(_t45 + 0x6c)));
                                                                              				 *(_t46 - 4) = 0xfffffffe;
                                                                              				return E10002E11(E10001C08());
                                                                              			}








                                                                              0x10001b2a
                                                                              0x10001b2a
                                                                              0x10001b2c
                                                                              0x10001b31
                                                                              0x10001b36
                                                                              0x10001b3c
                                                                              0x10001b44
                                                                              0x10001b47
                                                                              0x10001b4c
                                                                              0x10001b4d
                                                                              0x10001b50
                                                                              0x10001b53
                                                                              0x10001b5d
                                                                              0x10001b62
                                                                              0x10001b6a
                                                                              0x10001b72
                                                                              0x10001b82
                                                                              0x10001b82
                                                                              0x10001b88
                                                                              0x10001b8b
                                                                              0x10001b92
                                                                              0x10001b99
                                                                              0x10001ba2
                                                                              0x10001ba8
                                                                              0x10001baf
                                                                              0x10001bb5
                                                                              0x10001bbc
                                                                              0x10001bc3
                                                                              0x10001bc9
                                                                              0x10001bcc
                                                                              0x10001bcf
                                                                              0x10001bd4
                                                                              0x10001bd6
                                                                              0x10001bdb
                                                                              0x10001bdb
                                                                              0x10001be1
                                                                              0x10001be7
                                                                              0x10001bf8

                                                                              APIs
                                                                              • GetModuleHandleW.KERNEL32(KERNEL32.DLL,1000C4A0,0000000C,10001C65,00000000,00000000,?,1000206D,00000000,00000001,00000000,?,10003160,00000018,1000C550,0000000C), ref: 10001B3C
                                                                              • __crt_waiting_on_module_handle.LIBCMT ref: 10001B47
                                                                                • Part of subcall function 1000213B: Sleep.KERNEL32(000003E8,00000000,?,10001A8D,KERNEL32.DLL,?,?,10001E21,00000000,?,1000179A,00000000,?,?,?,100017FD), ref: 10002147
                                                                                • Part of subcall function 1000213B: GetModuleHandleW.KERNEL32(00000000,?,10001A8D,KERNEL32.DLL,?,?,10001E21,00000000,?,1000179A,00000000,?,?,?,100017FD,?), ref: 10002150
                                                                              • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 10001B70
                                                                              • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 10001B80
                                                                              • __lock.LIBCMT ref: 10001BA2
                                                                              • InterlockedIncrement.KERNEL32(?), ref: 10001BAF
                                                                              • __lock.LIBCMT ref: 10001BC3
                                                                              • ___addlocaleref.LIBCMT ref: 10001BE1
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                                              • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                                              • API String ID: 1028249917-2843748187
                                                                              • Opcode ID: 3aab2e40c07b96fa469cfb35431ef16034e502bbcfde3bb1a2af4d4c0dc897a7
                                                                              • Instruction ID: 327e284df4bf0b52d487dd6bc2c9f515799aeae1f8ee13131d010672ea08ef77
                                                                              • Opcode Fuzzy Hash: 3aab2e40c07b96fa469cfb35431ef16034e502bbcfde3bb1a2af4d4c0dc897a7
                                                                              • Instruction Fuzzy Hash: F211AF75840B41AEF720DF39CC40B8EBBE4EF14390F508A1DE4A9972A9DB74AA01CB11
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,000000FF), ref: 00491C25
                                                                              • __vbaOnError.MSVBVM60(000000FF,?,?,00000000,00000000,00403046,000000FF), ref: 00491C55
                                                                              • __vbaUbound.MSVBVM60(00000001,?,000000FF,?,?,00000000,00000000,00403046,000000FF), ref: 00491C68
                                                                              • __vbaLbound.MSVBVM60(00000001,?,00000001,?,000000FF,?,?,00000000,00000000,00403046,000000FF), ref: 00491C76
                                                                              • __vbaErrorOverflow.MSVBVM60(00000001,?,00000001,?,000000FF,?,?,00000000,00000000,00403046,000000FF), ref: 00491C9B
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,00000000,00000000,00403046,000000FF), ref: 00491CBC
                                                                              • __vbaStrCopy.MSVBVM60(?,00000000,00000000,00000000,00403046,00000000), ref: 00491CD6
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ChkstkError$CopyLboundOverflowUbound
                                                                              • String ID:
                                                                              • API String ID: 418150138-0
                                                                              • Opcode ID: fcdbfe32aba5967d807b4170fe1b9acbf6423aa88e55867293358edbec62bb0c
                                                                              • Instruction ID: 60161f432270c3b997e2105f2772e03049180df1f0a7c2fcfb934a817a6d2fb4
                                                                              • Opcode Fuzzy Hash: fcdbfe32aba5967d807b4170fe1b9acbf6423aa88e55867293358edbec62bb0c
                                                                              • Instruction Fuzzy Hash: CD118271940208BBDB10AF96C946B8EBFBCEB05B45F10812AF5147B1D2D7BD5B048BD9
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(00000000,00403046,?,?,?,004723DD,?,00000000,?,SELECT value FROM ,?,?,?,?,00000000,00000000), ref: 00476B77
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,00000000,00403046,?,?,?,004723DD,?,00000000,?,SELECT value FROM ,?,?), ref: 00476B8F
                                                                              • #644.MSVBVM60(?,?,?,?,00000000,00403046,?,?,?,004723DD,?,00000000,?,SELECT value FROM ,?,?), ref: 00476B97
                                                                              • __vbaLenBstr.MSVBVM60(?,?,00000000,?,?,?,?,00000000,00403046,?,?,?,004723DD,?,00000000,?), ref: 00476BA7
                                                                              • __vbaSetSystemError.MSVBVM60(?,004723DD,00000000,?,?,00000000,?,?,?,?,00000000,00403046,?,?,?,004723DD), ref: 00476BC0
                                                                              • __vbaFreeStr.MSVBVM60(00476BD9,?,004723DD,00000000,?,?,00000000,?,?,?,?,00000000,00403046), ref: 00476BD3
                                                                              • __vbaErrorOverflow.MSVBVM60(?,?,00000000,?,?,?,?,00000000,00403046,?,?,?,004723DD,?,00000000,?), ref: 00476BED
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$Error$#644BstrChkstkCopyFreeOverflowSystem
                                                                              • String ID:
                                                                              • API String ID: 113567838-0
                                                                              • Opcode ID: 3eeabc6764eeda633207353f0ba6f2e80513020b9db7a6fc86f02a1521f20702
                                                                              • Instruction ID: 488ae89743a5eff4ae6cfa1c38c5364b142087636b38a37c3734a1957f19a8fb
                                                                              • Opcode Fuzzy Hash: 3eeabc6764eeda633207353f0ba6f2e80513020b9db7a6fc86f02a1521f20702
                                                                              • Instruction Fuzzy Hash: 1501CC70900209AADB10EFA2CD47EAEBE79EF05705F50446AB500BA191D67DAA009B69
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046,?,?,?,0047239D,?,?,?,00000000,00000000,00000000,00463A4C), ref: 00476AD1
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00403046,?,?,?,0047239D,?), ref: 00476AE9
                                                                              • #644.MSVBVM60(?,?,?,?,?,00403046,?,?,?,0047239D,?), ref: 00476AF1
                                                                              • __vbaSetSystemError.MSVBVM60(?,0047239D,?,?,?,?,?,00403046,?,?,?,0047239D,?), ref: 00476B07
                                                                              • __vbaFreeStr.MSVBVM60(00476B20,?,0047239D,?,?,?,?,?,00403046,?,?,?,0047239D,?), ref: 00476B1A
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$#644ChkstkCopyErrorFreeSystem
                                                                              • String ID: F0@
                                                                              • API String ID: 2256115027-583819011
                                                                              • Opcode ID: b7f6ed28b569aa57570e9f3449b3cf8008d8bb178ff1ee104f1cc5b503e8175e
                                                                              • Instruction ID: ffe245e206cd9058670549d2fc68e17a8fc269ccf1dc6f0b23465b1d025956fd
                                                                              • Opcode Fuzzy Hash: b7f6ed28b569aa57570e9f3449b3cf8008d8bb178ff1ee104f1cc5b503e8175e
                                                                              • Instruction Fuzzy Hash: 3EF0ECB1810209AFCF00EF92CC46EAEBF78EF05B05F50846EB504761A1D77D6A418BA4
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 89%
                                                                              			E10003754(void* __ebx, void* __edx, void* __edi, void* __esi, void* __eflags) {
                                                                              				signed int _t15;
                                                                              				LONG* _t21;
                                                                              				long _t23;
                                                                              				void* _t31;
                                                                              				LONG* _t33;
                                                                              				void* _t34;
                                                                              				void* _t35;
                                                                              
                                                                              				_t35 = __eflags;
                                                                              				_t29 = __edx;
                                                                              				_t25 = __ebx;
                                                                              				_push(0xc);
                                                                              				_push(0x1000c590);
                                                                              				E10002DCC(__ebx, __edi, __esi);
                                                                              				_t31 = E10001C8A(__ebx, __edx, __edi, _t35);
                                                                              				_t15 =  *0x1000eafc; // 0xfffffffe
                                                                              				if(( *(_t31 + 0x70) & _t15) == 0 ||  *((intOrPtr*)(_t31 + 0x6c)) == 0) {
                                                                              					E100031D6(_t25, 0xd);
                                                                              					 *(_t34 - 4) =  *(_t34 - 4) & 0x00000000;
                                                                              					_t33 =  *(_t31 + 0x68);
                                                                              					 *(_t34 - 0x1c) = _t33;
                                                                              					__eflags = _t33 -  *0x1000e6b0; // 0x4601608
                                                                              					if(__eflags != 0) {
                                                                              						__eflags = _t33;
                                                                              						if(_t33 != 0) {
                                                                              							_t23 = InterlockedDecrement(_t33);
                                                                              							__eflags = _t23;
                                                                              							if(_t23 == 0) {
                                                                              								__eflags = _t33 - 0x1000e288;
                                                                              								if(__eflags != 0) {
                                                                              									_push(_t33);
                                                                              									E10001FCE(_t25, _t31, _t33, __eflags);
                                                                              								}
                                                                              							}
                                                                              						}
                                                                              						_t21 =  *0x1000e6b0; // 0x4601608
                                                                              						 *(_t31 + 0x68) = _t21;
                                                                              						_t33 =  *0x1000e6b0; // 0x4601608
                                                                              						 *(_t34 - 0x1c) = _t33;
                                                                              						InterlockedIncrement(_t33);
                                                                              					}
                                                                              					 *(_t34 - 4) = 0xfffffffe;
                                                                              					E100037EF();
                                                                              				} else {
                                                                              					_t33 =  *(_t31 + 0x68);
                                                                              				}
                                                                              				if(_t33 == 0) {
                                                                              					E1000216B(_t29, _t31, 0x20);
                                                                              				}
                                                                              				return E10002E11(_t33);
                                                                              			}










                                                                              0x10003754
                                                                              0x10003754
                                                                              0x10003754
                                                                              0x10003754
                                                                              0x10003756
                                                                              0x1000375b
                                                                              0x10003765
                                                                              0x10003767
                                                                              0x1000376f
                                                                              0x10003790
                                                                              0x10003796
                                                                              0x1000379a
                                                                              0x1000379d
                                                                              0x100037a0
                                                                              0x100037a6
                                                                              0x100037a8
                                                                              0x100037aa
                                                                              0x100037ad
                                                                              0x100037b3
                                                                              0x100037b5
                                                                              0x100037b7
                                                                              0x100037bd
                                                                              0x100037bf
                                                                              0x100037c0
                                                                              0x100037c5
                                                                              0x100037bd
                                                                              0x100037b5
                                                                              0x100037c6
                                                                              0x100037cb
                                                                              0x100037ce
                                                                              0x100037d4
                                                                              0x100037d8
                                                                              0x100037d8
                                                                              0x100037de
                                                                              0x100037e5
                                                                              0x10003777
                                                                              0x10003777
                                                                              0x10003777
                                                                              0x1000377c
                                                                              0x10003780
                                                                              0x10003785
                                                                              0x1000378d

                                                                              APIs
                                                                              • __getptd.LIBCMT ref: 10003760
                                                                                • Part of subcall function 10001C8A: __getptd_noexit.LIBCMT ref: 10001C8D
                                                                                • Part of subcall function 10001C8A: __amsg_exit.LIBCMT ref: 10001C9A
                                                                              • __amsg_exit.LIBCMT ref: 10003780
                                                                              • __lock.LIBCMT ref: 10003790
                                                                              • InterlockedDecrement.KERNEL32(?), ref: 100037AD
                                                                              • InterlockedIncrement.KERNEL32(04601608), ref: 100037D8
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                                              • String ID:
                                                                              • API String ID: 4271482742-0
                                                                              • Opcode ID: f8c0021167843d35bfca29ade749eb2077696021552e8c73dbcff10ac58cc65f
                                                                              • Instruction ID: 3f0cb8655d7b6067d64e170c8f1ef4de47676f464eb321f6bbefc787718de492
                                                                              • Opcode Fuzzy Hash: f8c0021167843d35bfca29ade749eb2077696021552e8c73dbcff10ac58cc65f
                                                                              • Instruction Fuzzy Hash: 1D0184B5D08A6197F762DF65888574F77A4FF04BD0F018109E818A769DCB346D41CBD1
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 41%
                                                                              			E10001FCE(void* __ebx, void* __edi, void* __esi, void* __eflags) {
                                                                              				intOrPtr* _t10;
                                                                              				intOrPtr _t13;
                                                                              				intOrPtr _t23;
                                                                              				void* _t25;
                                                                              
                                                                              				_push(0xc);
                                                                              				_push(0x1000c4f0);
                                                                              				_t8 = E10002DCC(__ebx, __edi, __esi);
                                                                              				_t23 =  *((intOrPtr*)(_t25 + 8));
                                                                              				if(_t23 == 0) {
                                                                              					L9:
                                                                              					return E10002E11(_t8);
                                                                              				}
                                                                              				if( *0x1000fa08 != 3) {
                                                                              					_push(_t23);
                                                                              					L7:
                                                                              					_t8 = HeapFree( *0x1000f414, 0, ??);
                                                                              					_t31 = _t8;
                                                                              					if(_t8 == 0) {
                                                                              						_t10 = E10003CDA(_t31);
                                                                              						 *_t10 = E10003C98(GetLastError());
                                                                              					}
                                                                              					goto L9;
                                                                              				}
                                                                              				E100031D6(__ebx, 4);
                                                                              				 *(_t25 - 4) =  *(_t25 - 4) & 0x00000000;
                                                                              				_t13 = E10003CED(_t23);
                                                                              				 *((intOrPtr*)(_t25 - 0x1c)) = _t13;
                                                                              				if(_t13 != 0) {
                                                                              					_push(_t23);
                                                                              					_push(_t13);
                                                                              					E10003D1D();
                                                                              				}
                                                                              				 *(_t25 - 4) = 0xfffffffe;
                                                                              				_t8 = E10002024();
                                                                              				if( *((intOrPtr*)(_t25 - 0x1c)) != 0) {
                                                                              					goto L9;
                                                                              				} else {
                                                                              					_push( *((intOrPtr*)(_t25 + 8)));
                                                                              					goto L7;
                                                                              				}
                                                                              			}







                                                                              0x10001fce
                                                                              0x10001fd0
                                                                              0x10001fd5
                                                                              0x10001fda
                                                                              0x10001fdf
                                                                              0x10002056
                                                                              0x1000205b
                                                                              0x1000205b
                                                                              0x10001fe8
                                                                              0x1000202d
                                                                              0x1000202e
                                                                              0x10002036
                                                                              0x1000203c
                                                                              0x1000203e
                                                                              0x10002040
                                                                              0x10002053
                                                                              0x10002055
                                                                              0x00000000
                                                                              0x1000203e
                                                                              0x10001fec
                                                                              0x10001ff2
                                                                              0x10001ff7
                                                                              0x10001ffd
                                                                              0x10002002
                                                                              0x10002004
                                                                              0x10002005
                                                                              0x10002006
                                                                              0x1000200c
                                                                              0x1000200d
                                                                              0x10002014
                                                                              0x1000201d
                                                                              0x00000000
                                                                              0x1000201f
                                                                              0x1000201f
                                                                              0x00000000
                                                                              0x1000201f

                                                                              APIs
                                                                              • __lock.LIBCMT ref: 10001FEC
                                                                                • Part of subcall function 100031D6: __mtinitlocknum.LIBCMT ref: 100031EC
                                                                                • Part of subcall function 100031D6: __amsg_exit.LIBCMT ref: 100031F8
                                                                                • Part of subcall function 100031D6: EnterCriticalSection.KERNEL32(00000000,00000000,?,10001D35,0000000D,1000C4C8,00000008,10001E2C,00000000,?,1000179A,00000000,?,?,?,100017FD), ref: 10003200
                                                                              • ___sbh_find_block.LIBCMT ref: 10001FF7
                                                                              • ___sbh_free_block.LIBCMT ref: 10002006
                                                                              • HeapFree.KERNEL32(00000000,00000000,1000C4F0,0000000C,10001C7B,00000000,?,1000206D,00000000,00000001,00000000,?,10003160,00000018,1000C550,0000000C), ref: 10002036
                                                                              • GetLastError.KERNEL32(?,1000206D,00000000,00000001,00000000,?,10003160,00000018,1000C550,0000000C,100031F1,00000000,00000000,?,10001D35,0000000D), ref: 10002047
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                                              • String ID:
                                                                              • API String ID: 2714421763-0
                                                                              • Opcode ID: b68067124560bcb0c995b0a13691c5c901e914ac94888172a888b3a906140acd
                                                                              • Instruction ID: 3b4b8ec7f9b35ede6bb60c2dee84031fd0dc59ead402009a6bf3f29708f812bf
                                                                              • Opcode Fuzzy Hash: b68067124560bcb0c995b0a13691c5c901e914ac94888172a888b3a906140acd
                                                                              • Instruction Fuzzy Hash: D8016275900716AAFB21DF709C0AB5F3BA8EF013E0F21811AF514A619ACB34A941DB95
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 65%
                                                                              			E1000872C() {
                                                                              				signed long long _v12;
                                                                              				signed int _v20;
                                                                              				signed long long _v28;
                                                                              				signed char _t8;
                                                                              
                                                                              				_t8 = GetModuleHandleA("KERNEL32");
                                                                              				if(_t8 == 0) {
                                                                              					L6:
                                                                              					_v20 =  *0x1000c360;
                                                                              					_v28 =  *0x1000c358;
                                                                              					asm("fsubr qword [ebp-0x18]");
                                                                              					_v12 = _v28 / _v20 * _v20;
                                                                              					asm("fld1");
                                                                              					asm("fcomp qword [ebp-0x8]");
                                                                              					asm("fnstsw ax");
                                                                              					if((_t8 & 0x00000005) != 0) {
                                                                              						return 0;
                                                                              					} else {
                                                                              						return 1;
                                                                              					}
                                                                              				} else {
                                                                              					__eax = GetProcAddress(__eax, "IsProcessorFeaturePresent");
                                                                              					if(__eax == 0) {
                                                                              						goto L6;
                                                                              					} else {
                                                                              						_push(0);
                                                                              						return __eax;
                                                                              					}
                                                                              				}
                                                                              			}







                                                                              0x10008731
                                                                              0x10008739
                                                                              0x10008750
                                                                              0x100086fc
                                                                              0x10008705
                                                                              0x10008711
                                                                              0x10008714
                                                                              0x10008717
                                                                              0x10008719
                                                                              0x1000871c
                                                                              0x10008721
                                                                              0x1000872b
                                                                              0x10008723
                                                                              0x10008727
                                                                              0x10008727
                                                                              0x1000873b
                                                                              0x10008741
                                                                              0x10008749
                                                                              0x00000000
                                                                              0x1000874b
                                                                              0x1000874b
                                                                              0x1000874f
                                                                              0x1000874f
                                                                              0x10008749

                                                                              APIs
                                                                              • GetModuleHandleA.KERNEL32(KERNEL32,10007BD4), ref: 10008731
                                                                              • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 10008741
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: AddressHandleModuleProc
                                                                              • String ID: IsProcessorFeaturePresent$KERNEL32
                                                                              • API String ID: 1646373207-3105848591
                                                                              • Opcode ID: 164972b940553d92bff9f993258d70a9589e7d65eabd95adffd82f22d968f5e8
                                                                              • Instruction ID: 0ed364909e793cae988e485c99f53d58ce9dfda6379281912a8d5cfde1ed4275
                                                                              • Opcode Fuzzy Hash: 164972b940553d92bff9f993258d70a9589e7d65eabd95adffd82f22d968f5e8
                                                                              • Instruction Fuzzy Hash: FDF0F930910F1DE2FB005BA1AC49AAE7AB4FB807C2F924490E6D6A008CDF3182748356
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 100%
                                                                              			E10008618(intOrPtr _a4, intOrPtr _a8, intOrPtr _a12, intOrPtr _a16, intOrPtr _a20, intOrPtr _a24, intOrPtr _a28) {
                                                                              				intOrPtr _t25;
                                                                              				void* _t26;
                                                                              				void* _t28;
                                                                              
                                                                              				_t25 = _a16;
                                                                              				if(_t25 == 0x65 || _t25 == 0x45) {
                                                                              					_t26 = E10007F09(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                                                                              					goto L9;
                                                                              				} else {
                                                                              					_t34 = _t25 - 0x66;
                                                                              					if(_t25 != 0x66) {
                                                                              						__eflags = _t25 - 0x61;
                                                                              						if(_t25 == 0x61) {
                                                                              							L7:
                                                                              							_t26 = E10007FF9(_t28, _a4, _a8, _a12, _a20, _a24, _a28);
                                                                              						} else {
                                                                              							__eflags = _t25 - 0x41;
                                                                              							if(__eflags == 0) {
                                                                              								goto L7;
                                                                              							} else {
                                                                              								_t26 = E1000851E(_t28, __eflags, _a4, _a8, _a12, _a20, _a24, _a28);
                                                                              							}
                                                                              						}
                                                                              						L9:
                                                                              						return _t26;
                                                                              					} else {
                                                                              						return E10008463(_t28, _t34, _a4, _a8, _a12, _a20, _a28);
                                                                              					}
                                                                              				}
                                                                              			}






                                                                              0x1000861d
                                                                              0x10008623
                                                                              0x10008696
                                                                              0x00000000
                                                                              0x1000862a
                                                                              0x1000862a
                                                                              0x1000862d
                                                                              0x10008648
                                                                              0x1000864b
                                                                              0x1000866b
                                                                              0x1000867d
                                                                              0x1000864d
                                                                              0x1000864d
                                                                              0x10008650
                                                                              0x00000000
                                                                              0x10008652
                                                                              0x10008664
                                                                              0x10008664
                                                                              0x10008650
                                                                              0x1000869b
                                                                              0x1000869f
                                                                              0x1000862f
                                                                              0x10008647
                                                                              0x10008647
                                                                              0x1000862d

                                                                              APIs
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                              • String ID:
                                                                              • API String ID: 3016257755-0
                                                                              • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                              • Instruction ID: 6cf60620f3e20027b95bc62eea8d4d019cd06b7205c037b7666ec62e7d915359
                                                                              • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
                                                                              • Instruction Fuzzy Hash: 5A118C3640018EFBDF129E84CC01CEE3F66FB18290B1A8415FE9899135D737DAB1AB85
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              C-Code - Quality: 90%
                                                                              			E100034B8(void* __ebx, void* __edx, intOrPtr __edi, void* __esi, void* __eflags) {
                                                                              				signed int _t13;
                                                                              				intOrPtr _t28;
                                                                              				void* _t29;
                                                                              				void* _t30;
                                                                              
                                                                              				_t30 = __eflags;
                                                                              				_t26 = __edi;
                                                                              				_t25 = __edx;
                                                                              				_t22 = __ebx;
                                                                              				_push(0xc);
                                                                              				_push(0x1000c570);
                                                                              				E10002DCC(__ebx, __edi, __esi);
                                                                              				_t28 = E10001C8A(__ebx, __edx, __edi, _t30);
                                                                              				_t13 =  *0x1000eafc; // 0xfffffffe
                                                                              				if(( *(_t28 + 0x70) & _t13) == 0) {
                                                                              					L6:
                                                                              					E100031D6(_t22, 0xc);
                                                                              					 *(_t29 - 4) =  *(_t29 - 4) & 0x00000000;
                                                                              					_t8 = _t28 + 0x6c; // 0x6c
                                                                              					_t26 =  *0x1000e278; // 0x1000e1a0
                                                                              					 *((intOrPtr*)(_t29 - 0x1c)) = E1000347A(_t8, _t26);
                                                                              					 *(_t29 - 4) = 0xfffffffe;
                                                                              					E10003522();
                                                                              				} else {
                                                                              					_t32 =  *((intOrPtr*)(_t28 + 0x6c));
                                                                              					if( *((intOrPtr*)(_t28 + 0x6c)) == 0) {
                                                                              						goto L6;
                                                                              					} else {
                                                                              						_t28 =  *((intOrPtr*)(E10001C8A(_t22, __edx, _t26, _t32) + 0x6c));
                                                                              					}
                                                                              				}
                                                                              				if(_t28 == 0) {
                                                                              					E1000216B(_t25, _t26, 0x20);
                                                                              				}
                                                                              				return E10002E11(_t28);
                                                                              			}







                                                                              0x100034b8
                                                                              0x100034b8
                                                                              0x100034b8
                                                                              0x100034b8
                                                                              0x100034b8
                                                                              0x100034ba
                                                                              0x100034bf
                                                                              0x100034c9
                                                                              0x100034cb
                                                                              0x100034d3
                                                                              0x100034f7
                                                                              0x100034f9
                                                                              0x100034ff
                                                                              0x10003503
                                                                              0x10003506
                                                                              0x10003511
                                                                              0x10003514
                                                                              0x1000351b
                                                                              0x100034d5
                                                                              0x100034d5
                                                                              0x100034d9
                                                                              0x00000000
                                                                              0x100034db
                                                                              0x100034e0
                                                                              0x100034e0
                                                                              0x100034d9
                                                                              0x100034e5
                                                                              0x100034e9
                                                                              0x100034ee
                                                                              0x100034f6

                                                                              APIs
                                                                              • __getptd.LIBCMT ref: 100034C4
                                                                                • Part of subcall function 10001C8A: __getptd_noexit.LIBCMT ref: 10001C8D
                                                                                • Part of subcall function 10001C8A: __amsg_exit.LIBCMT ref: 10001C9A
                                                                              • __getptd.LIBCMT ref: 100034DB
                                                                              • __amsg_exit.LIBCMT ref: 100034E9
                                                                              • __lock.LIBCMT ref: 100034F9
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.705830162.0000000010001000.00000020.00000001.01000000.0000000B.sdmp, Offset: 10000000, based on PE: true
                                                                              • Associated: 00000008.00000002.705821163.0000000010000000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705848358.000000001000B000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705861824.000000001000E000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                                              • Associated: 00000008.00000002.705870113.0000000010010000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_10000000_SecuriteInfo.jbxd
                                                                              Similarity
                                                                              • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                                              • String ID:
                                                                              • API String ID: 3521780317-0
                                                                              • Opcode ID: 72c504d80336559d7c4e75b4ae66946539dcafe56ba2c2618ce4557f545bf54b
                                                                              • Instruction ID: 32c0ebc3ffbb126f94d5ba8f0c00b5f828418d2dafc6c39caa795769e0f62008
                                                                              • Opcode Fuzzy Hash: 72c504d80336559d7c4e75b4ae66946539dcafe56ba2c2618ce4557f545bf54b
                                                                              • Instruction Fuzzy Hash: 76F0903A944B108BF723DBB08802B8E73E4EB047E1F11C11AE540AB2D9CB34B941CA52
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%

                                                                              APIs
                                                                              • __vbaChkstk.MSVBVM60(?,00403046), ref: 00494CCA
                                                                              • __vbaStrCopy.MSVBVM60(?,?,?,?,00403046), ref: 00494CF9
                                                                              Strings
                                                                              Memory Dump Source
                                                                              • Source File: 00000008.00000002.704326968.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                                              Joe Sandbox IDA Plugin
                                                                              • Snapshot File: hcaresult_8_2_400000_SecuriteInfo.jbxd
                                                                              Yara matches
                                                                              Similarity
                                                                              • API ID: __vba$ChkstkCopy
                                                                              • String ID: 00@
                                                                              • API String ID: 4177765151-1924156385
                                                                              • Opcode ID: 05924e746dbb64efecd6cbe5b91512925b86fa28431761b5757b61d0073d5733
                                                                              • Instruction ID: 907577e6af46017744c09fb1ef2b76f87e1f8d661a1c02d5154f8d24655d3c90
                                                                              • Opcode Fuzzy Hash: 05924e746dbb64efecd6cbe5b91512925b86fa28431761b5757b61d0073d5733
                                                                              • Instruction Fuzzy Hash: AE010475600208EFCB00DF89C589B8ABFB8FB44795F00806AF905AB291C379EA44CB94
                                                                              Uniqueness

                                                                              Uniqueness Score: -1.00%