Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe

Overview

General Information

Sample Name:SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
Analysis ID:795583
MD5:ecad138645d6e9bb23777c2871786211
SHA1:7c194ebd4c5f629669a8b22cba2f448b859d7e4d
SHA256:c4878022138a1fdbf5c1ba0fb8fe739810ec31b9e83fd334ba4c2f96e675610d
Tags:exe
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Uses 32bit PE files
Sample file is different than original file name gathered from version info
Found large amount of non-executed APIs
Program does not show much activity (idle)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe, 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYAZOKULU_2019.exe vs SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeBinary or memory string: OriginalFilenameYAZOKULU_2019.exe vs SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeCode function: 0_2_0040CA700_2_0040CA70
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeFile created: C:\Users\user~1\AppData\Local\Temp\~DFC0D365B42DF662A8.TMPJump to behavior
Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeSection loaded: C:\Windows\SysWOW64\msvbvm60.dllJump to behavior
Source: classification engineClassification label: clean3.winEXE@1/1@0/0
Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe, 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: <q@*\AC:\Users\Tuncay\hesaplar_yazokulu\Project1.vbp
Source: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeBinary or memory string: A*\AC:\Users\Tuncay\hesaplar_yazokulu\Project1.vbp
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeCode function: 0_2_00406A30 pushad ; retf 0040h0_2_00406A31
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exeAPI coverage: 0.3 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
Obfuscated Files or Information
OS Credential Dumping1
System Information Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe10%ReversingLabsWin32.Trojan.Symmi
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:36.0.0 Rainbow Opal
Analysis ID:795583
Start date and time:2023-02-01 01:36:17 +01:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:10
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample file name:SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
Detection:CLEAN
Classification:clean3.winEXE@1/1@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 95.1% (good quality ratio 62.7%)
  • Quality average: 33.2%
  • Quality standard deviation: 29.8%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 2
  • Number of non-executed functions: 6
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ctldl.windowsupdate.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
File Type:Composite Document File V2 Document, Cannot read section info
Category:dropped
Size (bytes):16384
Entropy (8bit):1.5168694484330218
Encrypted:false
SSDEEP:48:rUxxn2I2GsTQ3oS5edgYiTQnKsIkx0WOhRDC39aJT:ImI975sHnK7kRTMJT
MD5:43B68DE5EDF8DFE164E4243459B13D7E
SHA1:8B42FEB93406FD7E86FFCF7C4C095B9555B72C80
SHA-256:9F6A958F818CB695A118C22CEE8447B3AA99CFA85F5529FB1459FE26E438189B
SHA-512:C86524C75AFDD81F151EE8B1C7F037687F785967A561A4E2E994FB4D716BB686D5E2B5BFE8EF80AF4A2EC3788F3DBDFC1F8840FB6BF5A2E348C8628305F6F700
Malicious:false
Reputation:low
Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.696418687753263
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.15%
  • Win32 Executable Microsoft Visual Basic 6 (82127/2) 0.81%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
File size:77824
MD5:ecad138645d6e9bb23777c2871786211
SHA1:7c194ebd4c5f629669a8b22cba2f448b859d7e4d
SHA256:c4878022138a1fdbf5c1ba0fb8fe739810ec31b9e83fd334ba4c2f96e675610d
SHA512:503ab6dcc50aba02793db4cb46ef9bb55119f6db25706eb7846c0c7962ecde83fad0b05346d9f8f99d129564f6205b95507f4faafd22dc9f9a6d8bd22df0ca90
SSDEEP:768:xMWsiW/asd0ZA/YuOeaSuSRZOnh6MmW/asdDOeaSuSBkFNVHrQQnsWMLS92GddJp:xMWU/AA/YucSRYh6Mp/RcSWQ8sI7UG
TLSH:56734B23DDA4B8A2EE468A721C40516845434D359915BE0BBF0D3F2CAEB66C3DDF532B
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........K...*...*...*...6...*...5...*..t5...*..Rich.*..................PE..L..../.].....................0....................@........
Icon Hash:ecd4e4f4e4e4fc7c
Entrypoint:0x4012cc
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x5D1D2F85 [Wed Jul 3 22:43:17 2019 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:5770ff113a3e44536505c9eb45bc8281
Instruction
push 004068E8h
call 00007FB7ECBADAF3h
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
xor byte ptr [eax], al
add byte ptr [eax], al
inc eax
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add dl, dl
nop
mov edx, 1116481Dh
dec edi
movsb
pushfd
lodsb
xor cl, byte ptr [edi]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x106b40x28.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x130000xca4.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x2300x20
IMAGE_DIRECTORY_ENTRY_IAT0x10000xe0.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xfaf40x10000False0.3323974609375data6.217406699604862IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x110000x11840x1000False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x130000xca40x1000False0.498779296875data4.802431331554205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_ICON0x133fc0x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0
RT_GROUP_ICON0x133e80x14data
RT_VERSION0x130f00x2f8dataEnglishUnited States
DLLImport
MSVBVM60.DLL__vbaVarSub, __vbaStrI2, _CIcos, _adj_fptan, __vbaVarMove, __vbaFreeVar, __vbaFreeVarList, _adj_fdiv_m64, __vbaFreeObjList, _adj_fprem1, __vbaHresultCheckObj, _adj_fdiv_m32, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaFpR8, _CIsin, __vbaChkstk, EVENT_SINK_AddRef, _adj_fpatan, __vbaStrR8, EVENT_SINK_Release, _CIsqrt, EVENT_SINK_QueryInterface, __vbaVarMul, __vbaExceptHandler, _adj_fprem, _adj_fdivr_m64, __vbaVarDiv, __vbaFPException, __vbaStrVarVal, __vbaVarCat, _CIlog, __vbaR8Str, __vbaNew2, __vbaVarInt, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaVarAdd, __vbaVarDup, _CIatan, __vbaStrMove, _allmul, _CItan, __vbaFPInt, _CIexp, __vbaFreeStr, __vbaFreeObj
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
Report size exceeds maximum size, go to the download page of this report and download PCAP to see all network behavior.

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:37:17
Start date:01/02/2023
Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
Wow64 process (32bit):true
Commandline:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Symmi.94861.7356.1827.exe
Imagebase:0x400000
File size:77824 bytes
MD5 hash:ECAD138645D6E9BB23777C2871786211
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Visual Basic
Reputation:low

Reset < >

    Execution Graph

    Execution Coverage:0.7%
    Dynamic/Decrypted Code Coverage:0.6%
    Signature Coverage:25.2%
    Total number of Nodes:477
    Total number of Limit Nodes:1
    execution_graph 858 40e240 859 40e280 __vbaObjSet 858->859 861 40e2b0 859->861 862 40e2b6 __vbaHresultCheckObj 861->862 863 40e2c8 __vbaFreeObj 861->863 862->863 864 40e2e1 __vbaObjSet __vbaStrI2 __vbaStrMove 863->864 865 40e33d __vbaObjSet 863->865 869 40e310 864->869 868 40e35c 865->868 870 40e362 __vbaHresultCheckObj 868->870 871 40e374 __vbaFreeObj 868->871 872 40e325 __vbaFreeStr __vbaFreeObj 869->872 873 40e316 __vbaHresultCheckObj 869->873 870->871 874 40e3ea __vbaObjSet 871->874 875 40e38e __vbaObjSet __vbaStrI2 __vbaStrMove 871->875 872->865 873->872 878 40e409 874->878 879 40e3bd 875->879 880 40e421 __vbaFreeObj 878->880 881 40e40f __vbaHresultCheckObj 878->881 882 40e3d2 __vbaFreeStr __vbaFreeObj 879->882 883 40e3c3 __vbaHresultCheckObj 879->883 884 40e497 __vbaObjSet 880->884 885 40e43b __vbaObjSet __vbaStrI2 __vbaStrMove 880->885 881->880 882->874 883->882 889 40e4b6 884->889 888 40e46a 885->888 892 40e470 __vbaHresultCheckObj 888->892 893 40e47f __vbaFreeStr __vbaFreeObj 888->893 890 40e4bc __vbaHresultCheckObj 889->890 891 40e4ce __vbaFreeObj 889->891 890->891 894 40e4e8 __vbaObjSet __vbaStrI2 __vbaStrMove 891->894 895 40e53e 891->895 892->893 893->884 897 40e517 894->897 898 40e52c __vbaFreeStr __vbaFreeObj 897->898 899 40e51d __vbaHresultCheckObj 897->899 898->895 899->898 900 40ca70 901 40cab3 __vbaObjSet 900->901 903 40cb02 901->903 904 40cb21 __vbaObjSet 903->904 905 40cb08 __vbaHresultCheckObj 903->905 907 40cb47 904->907 905->904 908 40cb4d __vbaHresultCheckObj 907->908 909 40cb5e __vbaFreeObjList 907->909 908->909 910 40cb94 __vbaObjSet __vbaStrR8 __vbaStrMove 909->910 911 40cc05 __vbaObjSet 909->911 914 40cbd1 910->914 915 40cc25 911->915 916 40cbd7 __vbaHresultCheckObj 914->916 917 40cbed 914->917 918 40cc2b __vbaHresultCheckObj 915->918 919 40cc3c __vbaObjSet 915->919 920 40cbf3 __vbaFreeStr __vbaFreeObj 916->920 917->920 918->919 922 40cc5c 919->922 920->911 923 40cc62 __vbaHresultCheckObj 922->923 924 40cc73 __vbaObjSet 922->924 923->924 926 40cc93 924->926 927 40cc99 __vbaHresultCheckObj 926->927 928 40ccaa __vbaObjSet 926->928 927->928 930 40ccca 928->930 931 40ccd0 __vbaHresultCheckObj 930->931 932 40cce1 __vbaFreeObjList 930->932 931->932 933 40cd3d __vbaObjSet __vbaStrR8 __vbaStrMove 932->933 934 40cdae __vbaObjSet 932->934 937 40cd7a 933->937 938 40cdce 934->938 941 40cd80 __vbaHresultCheckObj 937->941 942 40cd96 937->942 939 40cdd4 __vbaHresultCheckObj 938->939 940 40cde5 __vbaObjSet 938->940 939->940 945 40ce05 940->945 943 40cd9c __vbaFreeStr __vbaFreeObj 941->943 942->943 943->934 946 40ce0b __vbaHresultCheckObj 945->946 947 40ce1c __vbaFreeObjList 945->947 946->947 948 40ce53 __vbaObjSet __vbaStrR8 __vbaStrMove 947->948 949 40cece __vbaObjSet 947->949 953 40ce9a 948->953 952 40ceee 949->952 954 40cef4 __vbaHresultCheckObj 952->954 955 40cf05 __vbaObjSet 952->955 956 40cea0 __vbaHresultCheckObj 953->956 957 40ceb6 953->957 954->955 960 40cf25 955->960 958 40cebc __vbaFreeStr __vbaFreeObj 956->958 957->958 958->949 961 40cf2b __vbaHresultCheckObj 960->961 962 40cf3c __vbaObjSet 960->962 961->962 964 40cf5c 962->964 965 40cf62 __vbaHresultCheckObj 964->965 966 40cf73 __vbaObjSet 964->966 965->966 968 40cf93 966->968 969 40cf99 __vbaHresultCheckObj 968->969 970 40cfaa __vbaObjSet 968->970 969->970 972 40cfca 970->972 973 40cfd0 __vbaHresultCheckObj 972->973 974 40cfe1 __vbaObjSet 972->974 973->974 976 40d001 974->976 977 40d007 __vbaHresultCheckObj 976->977 978 40d018 __vbaFreeObjList 976->978 977->978 979 40d112 __vbaObjSet 978->979 980 40d097 __vbaObjSet __vbaStrR8 __vbaStrMove 978->980 983 40d132 979->983 984 40d0de 980->984 985 40d138 __vbaHresultCheckObj 983->985 986 40d149 __vbaFreeObj 983->986 987 40d0e4 __vbaHresultCheckObj 984->987 988 40d0fa 984->988 985->986 989 40d169 __vbaObjSet __vbaStrR8 __vbaStrMove 986->989 990 40d1da __vbaObjSet 986->990 991 40d100 __vbaFreeStr __vbaFreeObj 987->991 988->991 995 40d1a6 989->995 994 40d1fa 990->994 991->979 996 40d200 __vbaHresultCheckObj 994->996 997 40d211 __vbaFreeObj 994->997 998 40d1c2 995->998 999 40d1ac __vbaHresultCheckObj 995->999 996->997 1000 40d231 __vbaObjSet __vbaStrR8 __vbaStrMove 997->1000 1001 40d2ac __vbaObjSet 997->1001 1002 40d1c8 __vbaFreeStr __vbaFreeObj 998->1002 999->1002 1005 40d278 1000->1005 1006 40d2cc 1001->1006 1002->990 1009 40d294 1005->1009 1010 40d27e __vbaHresultCheckObj 1005->1010 1007 40d2d2 __vbaHresultCheckObj 1006->1007 1008 40d2e3 __vbaFreeObj 1006->1008 1007->1008 1011 40d303 __vbaObjSet __vbaStrR8 __vbaStrMove 1008->1011 1012 40d374 __vbaObjSet 1008->1012 1013 40d29a __vbaFreeStr __vbaFreeObj 1009->1013 1010->1013 1016 40d340 1011->1016 1017 40d394 1012->1017 1013->1001 1018 40d346 __vbaHresultCheckObj 1016->1018 1019 40d35c 1016->1019 1020 40d39a __vbaHresultCheckObj 1017->1020 1021 40d3ab __vbaObjSet 1017->1021 1022 40d362 __vbaFreeStr __vbaFreeObj 1018->1022 1019->1022 1020->1021 1024 40d3cb 1021->1024 1022->1012 1025 40d3d1 __vbaHresultCheckObj 1024->1025 1026 40d3e2 __vbaFreeObjList 1024->1026 1025->1026 1027 40d494 __vbaObjSet 1026->1027 1028 40d419 __vbaObjSet __vbaStrR8 __vbaStrMove 1026->1028 1031 40d4b4 1027->1031 1032 40d460 1028->1032 1033 40d4ba __vbaHresultCheckObj 1031->1033 1034 40d4cb __vbaObjSet 1031->1034 1035 40d466 __vbaHresultCheckObj 1032->1035 1036 40d47c 1032->1036 1033->1034 1039 40d4eb 1034->1039 1037 40d482 __vbaFreeStr __vbaFreeObj 1035->1037 1036->1037 1037->1027 1040 40d4f1 __vbaHresultCheckObj 1039->1040 1041 40d502 __vbaFreeObjList 1039->1041 1040->1041 1042 40d539 __vbaObjSet __vbaStrR8 __vbaStrMove 1041->1042 1043 40d59c 1041->1043 1047 40d576 1042->1047 1045 40d5b7 1043->1045 1046 40d5a9 __vbaHresultCheckObj 1043->1046 1046->1045 1048 40d58a __vbaFreeStr __vbaFreeObj 1047->1048 1049 40d57c __vbaHresultCheckObj 1047->1049 1048->1043 1049->1048 1050 40d620 1051 40d657 __vbaObjSet 1050->1051 1053 40d681 __vbaObjSet 1051->1053 1054 40d697 1053->1054 1055 40d69d __vbaHresultCheckObj 1054->1055 1056 40d6af 1054->1056 1055->1056 1057 40d6ce __vbaFreeStr __vbaFreeObjList 1056->1057 1058 40d6bf __vbaHresultCheckObj 1056->1058 1059 40d70e 1057->1059 1058->1057 1060 40d730 1061 40d76a __vbaObjSet 1060->1061 1063 40d7bd 1061->1063 1064 40d7c3 __vbaHresultCheckObj 1063->1064 1065 40d7d8 __vbaFreeObj 1063->1065 1064->1065 1066 40d7ea __vbaObjSet 1065->1066 1067 40d828 1066->1067 1068 40d843 __vbaFreeObj 1067->1068 1069 40d82e __vbaHresultCheckObj 1067->1069 1070 40d855 __vbaObjSet 1068->1070 1069->1068 1071 40d893 1070->1071 1072 40d899 __vbaHresultCheckObj 1071->1072 1073 40d8ae __vbaFreeObj 1071->1073 1072->1073 1074 40d8c0 __vbaObjSet 1073->1074 1075 40d8fe 1074->1075 1076 40d904 __vbaHresultCheckObj 1075->1076 1077 40d919 __vbaFreeObj 1075->1077 1076->1077 1078 40d92b __vbaObjSet 1077->1078 1079 40d969 1078->1079 1080 40d984 __vbaFreeObj 1079->1080 1081 40d96f __vbaHresultCheckObj 1079->1081 1082 40d996 __vbaObjSet 1080->1082 1081->1080 1083 40d9d4 1082->1083 1084 40d9da __vbaHresultCheckObj 1083->1084 1085 40d9ef __vbaFreeObj 1083->1085 1084->1085 1086 40da01 __vbaObjSet 1085->1086 1087 40da3f 1086->1087 1088 40da45 __vbaHresultCheckObj 1087->1088 1089 40da5a __vbaFreeObj 1087->1089 1088->1089 1090 40da6c __vbaObjSet 1089->1090 1091 40daaa 1090->1091 1092 40dab0 __vbaHresultCheckObj 1091->1092 1093 40dac5 __vbaFreeObj 1091->1093 1092->1093 1094 40dad7 __vbaObjSet 1093->1094 1095 40db15 1094->1095 1096 40db30 __vbaFreeObj 1095->1096 1097 40db1b __vbaHresultCheckObj 1095->1097 1098 40db42 __vbaObjSet 1096->1098 1097->1096 1099 40db80 1098->1099 1100 40db86 __vbaHresultCheckObj 1099->1100 1101 40db9b __vbaFreeObj 1099->1101 1100->1101 1102 40dbad __vbaObjSet 1101->1102 1103 40dbeb 1102->1103 1104 40dbf1 __vbaHresultCheckObj 1103->1104 1105 40dc06 __vbaFreeObj 1103->1105 1104->1105 1106 40dc18 __vbaObjSet 1105->1106 1107 40dc56 1106->1107 1108 40dc71 __vbaFreeObj 1107->1108 1109 40dc5c __vbaHresultCheckObj 1107->1109 1110 40dc83 __vbaObjSet 1108->1110 1109->1108 1111 40dcc1 1110->1111 1112 40dcc7 __vbaHresultCheckObj 1111->1112 1113 40dcdc __vbaFreeObj 1111->1113 1112->1113 1114 40dcee __vbaObjSet 1113->1114 1115 40dd2c 1114->1115 1116 40dd32 __vbaHresultCheckObj 1115->1116 1117 40dd47 __vbaFreeObj 1115->1117 1116->1117 1118 40dd59 __vbaObjSet 1117->1118 1119 40dd97 1118->1119 1120 40ddb2 __vbaFreeObj 1119->1120 1121 40dd9d __vbaHresultCheckObj 1119->1121 1122 40ddc4 __vbaObjSet 1120->1122 1121->1120 1123 40de02 1122->1123 1124 40de08 __vbaHresultCheckObj 1123->1124 1125 40de1d __vbaFreeObj 1123->1125 1124->1125 1126 40de2f __vbaObjSet 1125->1126 1127 40de6d 1126->1127 1128 40de73 __vbaHresultCheckObj 1127->1128 1129 40de88 __vbaFreeObj 1127->1129 1128->1129 1130 40de9a __vbaObjSet 1129->1130 1131 40ded8 1130->1131 1132 40def3 __vbaFreeObj 1131->1132 1133 40dede __vbaHresultCheckObj 1131->1133 1134 40df05 __vbaObjSet 1132->1134 1133->1132 1135 40df49 1134->1135 1136 40df64 __vbaFreeObj 1135->1136 1137 40df4f __vbaHresultCheckObj 1135->1137 1138 40df76 __vbaObjSet 1136->1138 1137->1136 1139 40dfba 1138->1139 1140 40dfc0 __vbaHresultCheckObj 1139->1140 1141 40dfd5 __vbaFreeObj 1139->1141 1140->1141 1142 40dfe7 __vbaObjSet 1141->1142 1143 40e02b 1142->1143 1144 40e031 __vbaHresultCheckObj 1143->1144 1145 40e046 __vbaFreeObj 1143->1145 1144->1145 1146 40e058 __vbaObjSet 1145->1146 1147 40e09c 1146->1147 1148 40e0a2 __vbaHresultCheckObj 1147->1148 1149 40e0b7 __vbaFreeObj 1147->1149 1148->1149 1150 40e0c9 __vbaObjSet 1149->1150 1151 40e10d 1150->1151 1152 40e113 __vbaHresultCheckObj 1151->1152 1153 40e128 __vbaFreeObj 1151->1153 1152->1153 1154 40e13a __vbaObjSet 1153->1154 1155 40e17e 1154->1155 1156 40e184 __vbaHresultCheckObj 1155->1156 1157 40e199 __vbaFreeObj 1155->1157 1156->1157 1158 40e1ab __vbaObjSet 1157->1158 1159 40e1df 1158->1159 1160 40e1e5 __vbaHresultCheckObj 1159->1160 1161 40e1f7 __vbaFreeObj 1159->1161 1160->1161 1162 40e211 1161->1162 1171 4010e0 1172 401107 __vbaExceptHandler 1171->1172 1184 40e580 1185 40e5c3 __vbaObjSet 1184->1185 1187 40e636 1185->1187 1188 40e64b __vbaObjSet 1187->1188 1189 40e63c __vbaHresultCheckObj 1187->1189 1191 40e66b 1188->1191 1189->1188 1192 40e680 __vbaR8Str __vbaR8Str 1191->1192 1193 40e671 __vbaHresultCheckObj 1191->1193 1194 40e6c5 6 API calls 1192->1194 1195 4100cf 1192->1195 1193->1192 1196 40e751 __vbaObjSet 1194->1196 1195->1195 1197 40e76b 1196->1197 1198 40e771 __vbaHresultCheckObj 1197->1198 1199 40e783 __vbaObjSet 1197->1199 1198->1199 1201 40e7bd 1199->1201 1202 40e7c3 __vbaHresultCheckObj 1201->1202 1203 40e7d5 6 API calls 1201->1203 1202->1203 1204 40e878 __vbaObjSet 1203->1204 1205 40e896 1204->1205 1206 40e8b4 13 API calls 1205->1206 1207 40e89c __vbaHresultCheckObj 1205->1207 1208 40e9f9 7 API calls 1206->1208 1207->1206 1209 40eab5 1208->1209 1210 40eaca __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1209->1210 1211 40eabb __vbaHresultCheckObj 1209->1211 1212 40eb0c 9 API calls 1210->1212 1211->1210 1213 40ebec 1212->1213 1214 40ec01 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1213->1214 1215 40ebf2 __vbaHresultCheckObj 1213->1215 1216 40ec68 __vbaObjSet 1214->1216 1215->1214 1217 40ec82 1216->1217 1218 40ec88 __vbaHresultCheckObj 1217->1218 1219 40ec9a __vbaVarDiv __vbaVarDiv __vbaVarMove __vbaFreeObj __vbaFreeVar 1217->1219 1218->1219 1220 40ed04 __vbaObjSet __vbaVarMul __vbaVarMove #714 __vbaStrVarVal 1219->1220 1221 40ed83 1220->1221 1222 40ed98 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1221->1222 1223 40ed89 __vbaHresultCheckObj 1221->1223 1224 40edcc __vbaObjSet __vbaVarMul __vbaVarMove #714 __vbaStrVarVal 1222->1224 1223->1222 1225 40ee4b 1224->1225 1226 40ee60 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1225->1226 1227 40ee51 __vbaHresultCheckObj 1225->1227 1228 40ee94 __vbaObjSet __vbaVarMul __vbaVarMove #714 __vbaStrVarVal 1226->1228 1227->1226 1229 40ef13 1228->1229 1230 40ef28 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1229->1230 1231 40ef19 __vbaHresultCheckObj 1229->1231 1232 40ef5c __vbaObjSet __vbaVarMul __vbaVarMove #714 __vbaStrVarVal 1230->1232 1231->1230 1233 40efd8 1232->1233 1234 40efed __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1233->1234 1235 40efde __vbaHresultCheckObj 1233->1235 1236 40f021 __vbaObjSet __vbaVarMul __vbaVarMove #714 __vbaStrVarVal 1234->1236 1235->1234 1237 40f0aa 1236->1237 1238 40f0b0 __vbaHresultCheckObj 1237->1238 1239 40f0bf __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1237->1239 1238->1239 1240 40f0f3 __vbaObjSet #714 __vbaStrVarVal 1239->1240 1241 40f139 1240->1241 1242 40f14e __vbaFreeStr __vbaFreeObj __vbaFreeVar 1241->1242 1243 40f13f __vbaHresultCheckObj 1241->1243 1244 40f175 __vbaObjSet #714 __vbaVarSub __vbaStrVarVal 1242->1244 1243->1242 1245 40f1e4 1244->1245 1246 40f1f9 __vbaFreeStr __vbaFreeObj __vbaFreeVar 1245->1246 1247 40f1ea __vbaHresultCheckObj 1245->1247 1248 40f220 __vbaObjSet 1246->1248 1247->1246 1249 40f237 1248->1249 1250 40f24c __vbaR8Str 1249->1250 1251 40f23d __vbaHresultCheckObj 1249->1251 1252 40f267 _adj_fdiv_m64 1250->1252 1253 40f25f 1250->1253 1251->1250 1252->1253 1253->1195 1254 40f282 __vbaFPInt __vbaFpR8 1253->1254 1255 40f29b __vbaFreeStr __vbaFreeObj 1254->1255 1257 40f2c4 6 API calls 1255->1257 1258 40f388 6 API calls 1255->1258 1261 40f379 1257->1261 1258->1261 1262 40f455 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1261->1262 1263 40f446 __vbaHresultCheckObj 1261->1263 1264 40f490 __vbaObjSet 1262->1264 1263->1262 1265 40f4a7 1264->1265 1266 40f4bc __vbaR8Str 1265->1266 1267 40f4ad __vbaHresultCheckObj 1265->1267 1268 40f4d7 _adj_fdiv_m64 1266->1268 1269 40f4cf 1266->1269 1267->1266 1268->1269 1269->1195 1270 40f4f2 __vbaFPInt __vbaFpR8 1269->1270 1271 40f50b __vbaFreeStr __vbaFreeObj 1270->1271 1273 40f534 6 API calls 1271->1273 1274 40f5ee 6 API calls 1271->1274 1277 40f5df 1273->1277 1274->1277 1278 40f6b1 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1277->1278 1279 40f6a2 __vbaHresultCheckObj 1277->1279 1280 40f6ec __vbaObjSet 1278->1280 1279->1278 1281 40f703 1280->1281 1282 40f718 __vbaR8Str 1281->1282 1283 40f709 __vbaHresultCheckObj 1281->1283 1284 40f733 _adj_fdiv_m64 1282->1284 1285 40f72b 1282->1285 1283->1282 1284->1285 1285->1195 1286 40f74e __vbaFPInt __vbaFpR8 1285->1286 1287 40f767 __vbaFreeStr __vbaFreeObj 1286->1287 1289 40f790 6 API calls 1287->1289 1290 40f84a 6 API calls 1287->1290 1293 40f83b 1289->1293 1290->1293 1294 40f90d __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1293->1294 1295 40f8fe __vbaHresultCheckObj 1293->1295 1296 40f948 __vbaObjSet 1294->1296 1295->1294 1297 40f95f 1296->1297 1298 40f974 __vbaR8Str 1297->1298 1299 40f965 __vbaHresultCheckObj 1297->1299 1300 40f987 1298->1300 1301 40f98f _adj_fdiv_m64 1298->1301 1299->1298 1300->1195 1302 40f9aa __vbaFPInt __vbaFpR8 1300->1302 1301->1300 1303 40f9c3 __vbaFreeStr __vbaFreeObj 1302->1303 1305 40f9ec 6 API calls 1303->1305 1306 40faad 6 API calls 1303->1306 1309 40fa9e 1305->1309 1306->1309 1310 40fb77 __vbaFreeStr __vbaFreeObj __vbaFreeVarList 1309->1310 1311 40fb68 __vbaHresultCheckObj 1309->1311 1312 40fbb2 __vbaObjSet 1310->1312 1311->1310 1313 40fbc9 1312->1313 1314 40fbde __vbaR8Str 1313->1314 1315 40fbcf __vbaHresultCheckObj 1313->1315 1316 40fbf1 1314->1316 1317 40fbf9 _adj_fdiv_m64 1314->1317 1315->1314 1316->1195 1318 40fc14 __vbaFPInt __vbaFpR8 1316->1318 1317->1316 1319 40fc2d __vbaFreeStr __vbaFreeObj 1318->1319 1321 40fc53 6 API calls 1319->1321 1322 40fd3e 6 API calls 1319->1322 1325 40fcfd 1321->1325 1326 40fdeb 1322->1326 1327 40fd12 __vbaFreeStr __vbaFreeObj 1325->1327 1328 40fd03 __vbaHresultCheckObj 1325->1328 1329 40fe00 __vbaFreeStr __vbaFreeObj 1326->1329 1330 40fdf1 __vbaHresultCheckObj 1326->1330 1331 40fe27 __vbaFreeVarList 1327->1331 1328->1327 1329->1331 1330->1329 1332 40fe3b __vbaObjSet 1331->1332 1333 40fe54 1332->1333 1334 40fe69 __vbaR8Str 1333->1334 1335 40fe5a __vbaHresultCheckObj 1333->1335 1336 40fe84 _adj_fdiv_m64 1334->1336 1337 40fe7c 1334->1337 1335->1334 1336->1337 1337->1195 1338 40fe9f __vbaFPInt __vbaFpR8 1337->1338 1339 40feb8 __vbaFreeStr __vbaFreeObj 1338->1339 1341 40fee0 __vbaObjSet #714 __vbaVarAdd __vbaStrVarVal 1339->1341 1342 40ff7e __vbaObjSet #714 __vbaVarAdd __vbaStrVarVal 1339->1342 1346 40ff43 1341->1346 1345 40ffe4 1342->1345 1349 40fff9 __vbaFreeStr __vbaFreeObj 1345->1349 1350 40ffea __vbaHresultCheckObj 1345->1350 1347 40ff58 __vbaFreeStr __vbaFreeObj 1346->1347 1348 40ff49 __vbaHresultCheckObj 1346->1348 1351 41001b __vbaFreeVarList 1347->1351 1348->1347 1349->1351 1350->1349 1352 410090 __vbaFreeVar __vbaFreeVar __vbaFreeVar __vbaFreeVar __vbaFreeVar 1351->1352 824 4102a0 825 4102e0 824->825 826 4102f5 __vbaHresultCheckObj 825->826 827 410307 __vbaObjSet 825->827 826->827 829 41032a 827->829 830 410330 __vbaHresultCheckObj 829->830 831 410342 __vbaFreeObj 829->831 830->831 832 410354 __vbaObjSet 831->832 833 410368 832->833 834 410380 __vbaFreeObj 833->834 835 41036e __vbaHresultCheckObj 833->835 836 410392 __vbaObjSet __vbaStrI2 __vbaStrMove 834->836 835->834 837 4103be 836->837 838 4103c4 __vbaHresultCheckObj 837->838 839 4103d6 __vbaFreeStr __vbaFreeObj 837->839 838->839 840 4103f1 __vbaObjSet __vbaStrI2 __vbaStrMove 839->840 841 41041d 840->841 842 410423 __vbaHresultCheckObj 841->842 843 410432 __vbaFreeStr __vbaFreeObj 841->843 842->843 844 41044d __vbaObjSet __vbaStrR8 __vbaStrMove 843->844 845 41047e 844->845 846 410493 __vbaFreeStr __vbaFreeObj 845->846 847 410484 __vbaHresultCheckObj 845->847 848 4104ae __vbaObjSet __vbaStrI2 __vbaStrMove 846->848 847->846 849 4104da 848->849 850 4104e0 __vbaHresultCheckObj 849->850 851 4104f2 __vbaFreeStr __vbaFreeObj 849->851 850->851 852 41050f __vbaObjSet __vbaStrI2 __vbaStrMove 851->852 853 410535 852->853 854 41053b __vbaHresultCheckObj 853->854 855 41054d __vbaFreeStr __vbaFreeObj 853->855 854->855 856 41057d 855->856 1163 4101d0 1164 410210 1163->1164 1165 41022e __vbaObjSetAddref 1164->1165 1166 41021e __vbaNew2 1164->1166 1167 41024c 1165->1167 1166->1165 1168 410261 __vbaFreeObj 1167->1168 1169 410252 __vbaHresultCheckObj 1167->1169 1170 41027e 1168->1170 1169->1168 1174 4100e0 1175 41011f 1174->1175 1176 410138 1175->1176 1177 410128 __vbaNew2 1175->1177 1178 410161 1176->1178 1179 41014f __vbaHresultCheckObj 1176->1179 1177->1176 1180 41016a __vbaNew2 1178->1180 1181 41017a 1178->1181 1179->1178 1180->1181 1182 410191 __vbaHresultCheckObj 1181->1182 1183 4101a3 1181->1183 1182->1183 1353 4105a0 1354 4105e0 1353->1354 1355 4105fe __vbaObjSetAddref 1354->1355 1356 4105ee __vbaNew2 1354->1356 1357 41061c 1355->1357 1356->1355 1358 410631 __vbaFreeObj 1357->1358 1359 410622 __vbaHresultCheckObj 1357->1359 1360 410652 1358->1360 1361 410642 __vbaNew2 1358->1361 1359->1358 1362 410669 __vbaHresultCheckObj 1360->1362 1363 41067b 1360->1363 1361->1360 1362->1363 857 4012cc #100

    Control-flow Graph

    APIs
    • __vbaHresultCheckObj.MSVBVM60(00000000,00401160,00407260,000006FC), ref: 00410301
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0041031B
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F4), ref: 0041033C
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410345
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410359
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F4), ref: 0041037A
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410383
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410397
    • __vbaStrI2.MSVBVM60(00000004,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004103A0
    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004103AB
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 004103D0
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004103D9
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004103E2
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004103F6
    • __vbaStrI2.MSVBVM60(0000012C,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410402
    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0041040D
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074F0,00000054), ref: 0041042C
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410435
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0041043E
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410452
    • __vbaStrR8.MSVBVM60(392189BE,3FC1B899,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410463
    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0041046E
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074F0,00000054), ref: 0041048D
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410496
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0041049F
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004104B3
    • __vbaStrI2.MSVBVM60(00000014,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004104BC
    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004104C7
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 004104EC
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 004104FB
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410500
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410514
    • __vbaStrI2.MSVBVM60(00000005,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0041051C
    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410527
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074E0,000000A4), ref: 00410547
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410550
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 00410555
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$Free$CheckHresult$Move
    • String ID:
    • API String ID: 1589273832-0
    • Opcode ID: a9a9f2d0cde0cea1997a3e5cbf9bf2c1d32576560a98d29440eee8d519e142a8
    • Instruction ID: 01fa24e23c7938e60703d02d94e922959e4058f226e3b6f1959942de30d8e2fe
    • Opcode Fuzzy Hash: a9a9f2d0cde0cea1997a3e5cbf9bf2c1d32576560a98d29440eee8d519e142a8
    • Instruction Fuzzy Hash: 3C914F70A00246AFDB109F65CD88EAEBBB8FF18705F104139F645E75A0DB785985CF68
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 34 4012cc-4012f3 #100
    C-Code - Quality: 77%
    			_entry_(signed int __eax, signed int __ebx, signed int __ecx, void* __edx, void* __edi, signed int* __esi) {
    				signed int _t11;
    				signed int _t12;
    				signed char _t13;
    				signed char _t20;
    				signed int* _t30;
    
    				_t30 = __esi;
    				_t17 = __ebx;
    				_push(0x4068e8); // executed
    				L004012C4(); // executed
    				 *__eax =  *__eax + __eax;
    				 *__eax =  *__eax + __eax;
    				 *__eax =  *__eax + __eax;
    				 *__eax =  *__eax ^ __eax;
    				 *__eax =  *__eax + __eax;
    				_t11 = __eax + 1;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				asm("movsb");
    				asm("pushfd");
    				asm("lodsb");
    				_t20 = __ecx ^  *(__edi - 1);
    				asm("invalid");
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				 *_t11 =  *_t11 + _t11;
    				_push(_t11);
    				if( *_t11 >= 0) {
    					_push(0x65);
    					asm("arpl [ecx+esi], si");
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					asm("int3");
    					 *_t11 =  *_t11 ^ _t11;
    					asm("rol byte [ecx-0x77], cl");
    					asm("cld");
    					_t11 = (_t11 ^  *__esi) + 0x00000001 - 0x00000001 &  *(__esi - 0x7f970722);
    					_t17 = __ebx + __ebx ^  *(_t20 - 0x48ee309a);
    					asm("cdq");
    					asm("iretw");
    					asm("adc [edi+0xaa000c], esi");
    					asm("pushad");
    					asm("rcl dword [ebx], cl");
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					 *_t11 =  *_t11 + _t11;
    					ds = 0x55;
    				}
    				 *_t11 =  *_t11 | _t11;
    				 *_t11 =  *_t11 + _t11;
    				_t12 = _t11 + 0x726f4600;
    				asm("insd");
    				 *_t12 =  *_t12 ^ _t12;
    				_t13 = _t12 | 0xc0c0c003;
    				 *_t20 =  *_t20 + _t17;
    				 *_t13 =  *_t13 + _t13;
    				 *0x23012200 =  *0x23012200 + _t17;
    				asm("invalid");
    				 *_t13 =  *_t13 + _t13;
    				asm("insb");
    				if ( *_t13 == 0) goto L4;
    				_t30[2] = _t30[2] + _t17;
    				 *_t20 =  *_t20 + _t13;
    				 *_t20 =  *_t20 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 & _t13;
    				 *_t20 =  *_t20 + _t13;
    				 *_t13 =  *_t13 + _t20;
    				 *((intOrPtr*)(_t13 + 0x16000008)) =  *((intOrPtr*)(_t13 + 0x16000008)) + _t20;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t20;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 | _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				 *_t13 =  *_t13 + _t13;
    				asm("o16 add bh, bh");
    				goto 0xdd;
    				return _t13;
    			}








    0x004012cc
    0x004012cc
    0x004012cc
    0x004012d1
    0x004012d6
    0x004012d8
    0x004012da
    0x004012dc
    0x004012de
    0x004012e0
    0x004012e1
    0x004012e3
    0x004012e5
    0x004012f0
    0x004012f1
    0x004012f2
    0x004012f3
    0x004012f5
    0x004012f8
    0x004012fa
    0x004012fc
    0x004012fe
    0x00401300
    0x00401302
    0x00401304
    0x00401306
    0x00401308
    0x00401309
    0x0040130b
    0x0040130d
    0x00401311
    0x00401313
    0x00401315
    0x00401317
    0x00401319
    0x0040131d
    0x0040131e
    0x00401327
    0x0040132b
    0x0040132f
    0x00401344
    0x00401345
    0x00401346
    0x00401348
    0x0040134e
    0x0040134f
    0x00401355
    0x00401357
    0x00401359
    0x0040135b
    0x0040135d
    0x0040135f
    0x00401361
    0x00401363
    0x00401365
    0x00401367
    0x00401369
    0x0040136b
    0x0040136d
    0x0040136f
    0x00401371
    0x00401373
    0x00401377
    0x00401379
    0x00401379
    0x0040137a
    0x0040137c
    0x0040137e
    0x00401383
    0x00401384
    0x00401386
    0x0040138b
    0x0040138d
    0x00401390
    0x00401396
    0x00401398
    0x0040139a
    0x0040139b
    0x0040139d
    0x004013a3
    0x004013a5
    0x004013a7
    0x004013a9
    0x004013ab
    0x004013ad
    0x004013af
    0x004013b5
    0x004013b7
    0x004013b9
    0x004013bb
    0x004013bd
    0x004013bf
    0x004013c2
    0x004013c4
    0x004013c6
    0x004013c8
    0x004013ca
    0x004013cc
    0x004013ce
    0x004013d0
    0x004013d2
    0x004013d4
    0x004013d6
    0x004013d8
    0x004013da
    0x004013dc
    0x004013de
    0x004013e0
    0x004013e2
    0x004013e4
    0x004013e9
    0x004013f0

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: #100
    • String ID:
    • API String ID: 1341478452-0
    • Opcode ID: aaa4a5cd0952de0969f6eea08c13a7b033a28e8169f4feff0301c58671faf835
    • Instruction ID: 2d17c5d3732dba9d6cc34c97304b9ac55b38fc5d251dc2073ca1345d9b488a27
    • Opcode Fuzzy Hash: aaa4a5cd0952de0969f6eea08c13a7b033a28e8169f4feff0301c58671faf835
    • Instruction Fuzzy Hash: 78D0488105E3C10EE303237608711866FB64D5315435B51D780C0EB4F3C05C0C6EC726
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 224 40ca70-40cb06 __vbaObjSet 228 40cb21 224->228 229 40cb08-40cb1f __vbaHresultCheckObj 224->229 230 40cb27-40cb4b __vbaObjSet 228->230 229->230 233 40cb4d-40cb5c __vbaHresultCheckObj 230->233 234 40cb5e-40cb92 __vbaFreeObjList 230->234 233->234 235 40cb94-40cbd5 __vbaObjSet __vbaStrR8 __vbaStrMove 234->235 236 40cc05-40cc29 __vbaObjSet 234->236 241 40cbd7-40cbeb __vbaHresultCheckObj 235->241 242 40cbed 235->242 243 40cc2b-40cc3a __vbaHresultCheckObj 236->243 244 40cc3c-40cc60 __vbaObjSet 236->244 245 40cbf3-40cbff __vbaFreeStr __vbaFreeObj 241->245 242->245 243->244 248 40cc62-40cc71 __vbaHresultCheckObj 244->248 249 40cc73-40cc97 __vbaObjSet 244->249 245->236 248->249 252 40cc99-40cca8 __vbaHresultCheckObj 249->252 253 40ccaa-40ccce __vbaObjSet 249->253 252->253 256 40ccd0-40ccdf __vbaHresultCheckObj 253->256 257 40cce1-40cd3b __vbaFreeObjList 253->257 256->257 258 40cd3d-40cd7e __vbaObjSet __vbaStrR8 __vbaStrMove 257->258 259 40cdae-40cdd2 __vbaObjSet 257->259 266 40cd80-40cd94 __vbaHresultCheckObj 258->266 267 40cd96 258->267 264 40cdd4-40cde3 __vbaHresultCheckObj 259->264 265 40cde5-40ce09 __vbaObjSet 259->265 264->265 271 40ce0b-40ce1a __vbaHresultCheckObj 265->271 272 40ce1c-40ce51 __vbaFreeObjList 265->272 268 40cd9c-40cda8 __vbaFreeStr __vbaFreeObj 266->268 267->268 268->259 271->272 273 40ce53-40ce9e __vbaObjSet __vbaStrR8 __vbaStrMove 272->273 274 40cece-40cef2 __vbaObjSet 272->274 281 40cea0-40ceb4 __vbaHresultCheckObj 273->281 282 40ceb6 273->282 279 40cef4-40cf03 __vbaHresultCheckObj 274->279 280 40cf05-40cf29 __vbaObjSet 274->280 279->280 286 40cf2b-40cf3a __vbaHresultCheckObj 280->286 287 40cf3c-40cf60 __vbaObjSet 280->287 283 40cebc-40cec8 __vbaFreeStr __vbaFreeObj 281->283 282->283 283->274 286->287 290 40cf62-40cf71 __vbaHresultCheckObj 287->290 291 40cf73-40cf97 __vbaObjSet 287->291 290->291 294 40cf99-40cfa8 __vbaHresultCheckObj 291->294 295 40cfaa-40cfce __vbaObjSet 291->295 294->295 298 40cfd0-40cfdf __vbaHresultCheckObj 295->298 299 40cfe1-40d005 __vbaObjSet 295->299 298->299 302 40d007-40d016 __vbaHresultCheckObj 299->302 303 40d018-40d095 __vbaFreeObjList 299->303 302->303 304 40d112-40d136 __vbaObjSet 303->304 305 40d097-40d0e2 __vbaObjSet __vbaStrR8 __vbaStrMove 303->305 310 40d138-40d147 __vbaHresultCheckObj 304->310 311 40d149-40d167 __vbaFreeObj 304->311 312 40d0e4-40d0f8 __vbaHresultCheckObj 305->312 313 40d0fa 305->313 310->311 314 40d169-40d1aa __vbaObjSet __vbaStrR8 __vbaStrMove 311->314 315 40d1da-40d1fe __vbaObjSet 311->315 316 40d100-40d10c __vbaFreeStr __vbaFreeObj 312->316 313->316 323 40d1c2 314->323 324 40d1ac-40d1c0 __vbaHresultCheckObj 314->324 321 40d200-40d20f __vbaHresultCheckObj 315->321 322 40d211-40d22f __vbaFreeObj 315->322 316->304 321->322 325 40d231-40d27c __vbaObjSet __vbaStrR8 __vbaStrMove 322->325 326 40d2ac-40d2d0 __vbaObjSet 322->326 327 40d1c8-40d1d4 __vbaFreeStr __vbaFreeObj 323->327 324->327 334 40d294 325->334 335 40d27e-40d292 __vbaHresultCheckObj 325->335 332 40d2d2-40d2e1 __vbaHresultCheckObj 326->332 333 40d2e3-40d301 __vbaFreeObj 326->333 327->315 332->333 336 40d303-40d344 __vbaObjSet __vbaStrR8 __vbaStrMove 333->336 337 40d374-40d398 __vbaObjSet 333->337 338 40d29a-40d2a6 __vbaFreeStr __vbaFreeObj 334->338 335->338 343 40d346-40d35a __vbaHresultCheckObj 336->343 344 40d35c 336->344 345 40d39a-40d3a9 __vbaHresultCheckObj 337->345 346 40d3ab-40d3cf __vbaObjSet 337->346 338->326 347 40d362-40d36e __vbaFreeStr __vbaFreeObj 343->347 344->347 345->346 350 40d3d1-40d3e0 __vbaHresultCheckObj 346->350 351 40d3e2-40d417 __vbaFreeObjList 346->351 347->337 350->351 352 40d494-40d4b8 __vbaObjSet 351->352 353 40d419-40d464 __vbaObjSet __vbaStrR8 __vbaStrMove 351->353 358 40d4ba-40d4c9 __vbaHresultCheckObj 352->358 359 40d4cb-40d4ef __vbaObjSet 352->359 360 40d466-40d47a __vbaHresultCheckObj 353->360 361 40d47c 353->361 358->359 365 40d4f1-40d500 __vbaHresultCheckObj 359->365 366 40d502-40d537 __vbaFreeObjList 359->366 362 40d482-40d48e __vbaFreeStr __vbaFreeObj 360->362 361->362 362->352 365->366 367 40d539-40d57a __vbaObjSet __vbaStrR8 __vbaStrMove 366->367 368 40d59c-40d5a7 366->368 375 40d58a-40d596 __vbaFreeStr __vbaFreeObj 367->375 376 40d57c-40d588 __vbaHresultCheckObj 367->376 371 40d5b7-40d5f3 368->371 372 40d5a9-40d5b5 __vbaHresultCheckObj 368->372 372->371 375->368 376->375
    APIs
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CAF0
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CB1D
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CB35
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CB5C
    • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0040CB84
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CBA2
    • __vbaStrR8.MSVBVM60(51EB851F,40091EB8), ref: 0040CBB3
    • __vbaStrMove.MSVBVM60 ref: 0040CBBE
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040CBE9
    • __vbaFreeStr.MSVBVM60 ref: 0040CBF6
    • __vbaFreeObj.MSVBVM60 ref: 0040CBFF
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CC13
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CC3A
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CC4A
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CC71
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CC81
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040CCA8
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CCB8
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CCDF
    • __vbaFreeObjList.MSVBVM60(00000004,?,?,?,?), ref: 0040CD2D
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CD4B
    • __vbaStrR8.MSVBVM60(C28F5C29,400428F5), ref: 0040CD5C
    • __vbaStrMove.MSVBVM60 ref: 0040CD67
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040CD92
    • __vbaFreeStr.MSVBVM60 ref: 0040CD9F
    • __vbaFreeObj.MSVBVM60 ref: 0040CDA8
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CDBC
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CDE3
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CDF3
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CE1A
    • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0040CE43
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CE61
    • __vbaStrR8.MSVBVM60(F5C28F5C,3FFB5C28), ref: 0040CE72
    • __vbaStrMove.MSVBVM60 ref: 0040CE7D
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040CEB2
    • __vbaFreeStr.MSVBVM60 ref: 0040CEBF
    • __vbaFreeObj.MSVBVM60 ref: 0040CEC8
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CEDC
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CF03
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CF13
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CF3A
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CF4A
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040CF71
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CF81
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040CFA8
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CFB8
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040CFDF
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040CFEF
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040D016
    • __vbaFreeObjList.MSVBVM60(00000006,?,?,?,?,?,?), ref: 0040D087
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D0A5
    • __vbaStrR8.MSVBVM60(0A3D70A4,3FFCA3D7), ref: 0040D0B6
    • __vbaStrMove.MSVBVM60 ref: 0040D0C1
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040D0F6
    • __vbaFreeStr.MSVBVM60 ref: 0040D103
    • __vbaFreeObj.MSVBVM60 ref: 0040D10C
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D120
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040D147
    • __vbaFreeObj.MSVBVM60 ref: 0040D15C
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D177
    • __vbaStrR8.MSVBVM60(70A3D70A,400F0A3D), ref: 0040D188
    • __vbaStrMove.MSVBVM60 ref: 0040D193
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040D1BE
    • __vbaFreeStr.MSVBVM60 ref: 0040D1CB
    • __vbaFreeObj.MSVBVM60 ref: 0040D1D4
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D1E8
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040D20F
    • __vbaFreeObj.MSVBVM60 ref: 0040D224
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D23F
    • __vbaStrR8.MSVBVM60(147AE148,400147AE), ref: 0040D250
    • __vbaStrMove.MSVBVM60 ref: 0040D25B
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040D290
    • __vbaFreeStr.MSVBVM60 ref: 0040D29D
    • __vbaFreeObj.MSVBVM60 ref: 0040D2A6
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D2BA
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040D2E1
    • __vbaFreeObj.MSVBVM60 ref: 0040D2F6
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D311
    • __vbaStrR8.MSVBVM60(F5C28F5C,3FFF5C28), ref: 0040D322
    • __vbaStrMove.MSVBVM60 ref: 0040D32D
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040D358
    • __vbaFreeStr.MSVBVM60 ref: 0040D365
    • __vbaFreeObj.MSVBVM60 ref: 0040D36E
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D382
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040D3A9
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D3B9
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040D3E0
    • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0040D409
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D427
    • __vbaStrR8.MSVBVM60(EB851EB8,3FFEB851), ref: 0040D438
    • __vbaStrMove.MSVBVM60 ref: 0040D443
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040D478
    • __vbaFreeStr.MSVBVM60 ref: 0040D485
    • __vbaFreeObj.MSVBVM60 ref: 0040D48E
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D4A2
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074D0,000000F0), ref: 0040D4C9
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D4D9
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040D500
    • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 0040D529
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040D547
    • __vbaStrR8.MSVBVM60(66666666,3FF66666), ref: 0040D558
    • __vbaStrMove.MSVBVM60 ref: 0040D563
    • __vbaHresultCheckObj.MSVBVM60(00000000,?,004074E0,000000A4), ref: 0040D588
    • __vbaFreeStr.MSVBVM60 ref: 0040D58D
    • __vbaFreeObj.MSVBVM60 ref: 0040D596
    • __vbaHresultCheckObj.MSVBVM60(00000000,004010E0,00407260,000006F8), ref: 0040D5B5
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$CheckHresult$Free$Move$List
    • String ID:
    • API String ID: 2718955921-0
    • Opcode ID: 10535b1b9610a9968769cecacd8dd13529b5e627453465be5b680e553cfceeeb
    • Instruction ID: 3c5c02d7455250cd45a1fa1cbe2b702bfe16fb957843f0df2ac842a806c951f2
    • Opcode Fuzzy Hash: 10535b1b9610a9968769cecacd8dd13529b5e627453465be5b680e553cfceeeb
    • Instruction Fuzzy Hash: BA722D71E0020AAFDB14DFA5CD88EAEB7B8BF48304F108539E545E71A1DB74A946CF64
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    APIs
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E29F
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E2C2
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E2D6
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E2EF
    • __vbaStrI2.MSVBVM60(0000012C,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E2FA
    • __vbaStrMove.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E305
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074F0,00000054,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E31F
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E328
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E331
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E34B
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040E36E
    • __vbaFreeObj.MSVBVM60 ref: 0040E383
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040E39C
    • __vbaStrI2.MSVBVM60(000000FA), ref: 0040E3A7
    • __vbaStrMove.MSVBVM60 ref: 0040E3B2
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074F0,00000054), ref: 0040E3CC
    • __vbaFreeStr.MSVBVM60 ref: 0040E3D5
    • __vbaFreeObj.MSVBVM60 ref: 0040E3DE
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040E3F8
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040E41B
    • __vbaFreeObj.MSVBVM60 ref: 0040E430
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040E449
    • __vbaStrI2.MSVBVM60(000000C8), ref: 0040E454
    • __vbaStrMove.MSVBVM60 ref: 0040E45F
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074F0,00000054), ref: 0040E479
    • __vbaFreeStr.MSVBVM60 ref: 0040E482
    • __vbaFreeObj.MSVBVM60 ref: 0040E48B
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040E4A5
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074D0,000000F0), ref: 0040E4C8
    • __vbaFreeObj.MSVBVM60 ref: 0040E4DD
    • __vbaObjSet.MSVBVM60(?,00000000), ref: 0040E4F6
    • __vbaStrI2.MSVBVM60(000000A0), ref: 0040E501
    • __vbaStrMove.MSVBVM60 ref: 0040E50C
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074F0,00000054), ref: 0040E526
    • __vbaFreeStr.MSVBVM60 ref: 0040E52F
    • __vbaFreeObj.MSVBVM60 ref: 0040E538
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$Free$CheckHresult$Move
    • String ID:
    • API String ID: 1589273832-0
    • Opcode ID: 379ea3765e5af314ad5f453610cca845d453eb75f90509deb16a7d9f19d08d56
    • Instruction ID: cfffcb0f6003e92d88f736ae2ad91d2e8261de0951408bb7b3057c9d87e8e5ef
    • Opcode Fuzzy Hash: 379ea3765e5af314ad5f453610cca845d453eb75f90509deb16a7d9f19d08d56
    • Instruction Fuzzy Hash: D0914F31A00245ABDB009FB5CD88EAE7BBCFF48705F108539F542E75A1DB786946CB68
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 523 40d620-40d69b __vbaObjSet * 2 528 40d69d-40d6a9 __vbaHresultCheckObj 523->528 529 40d6af-40d6bd 523->529 528->529 531 40d6ce-40d70e __vbaFreeStr __vbaFreeObjList 529->531 532 40d6bf-40d6c8 __vbaHresultCheckObj 529->532 532->531
    C-Code - Quality: 17%
    			E0040D620(void* __ebx, void* __edi, void* __esi, intOrPtr* _a4) {
    				char _v8;
    				intOrPtr _v12;
    				intOrPtr _v16;
    				char _v28;
    				char _v32;
    				char _v36;
    				void* _t23;
    				void* _t29;
    				void* _t30;
    				char* _t31;
    				intOrPtr* _t33;
    				intOrPtr* _t44;
    				intOrPtr* _t46;
    				intOrPtr* _t47;
    				void* _t48;
    				void* _t50;
    				intOrPtr _t51;
    
    				_t51 = _t50 - 0xc;
    				 *[fs:0x0] = _t51;
    				_v16 = _t51 - 0x24;
    				_v12 = 0x4010f0;
    				_v8 = 0;
    				_t46 = _a4;
    				 *((intOrPtr*)( *_t46 + 4))(_t46, __edi, __esi, __ebx,  *[fs:0x0], 0x401186, _t48);
    				_v28 = 0;
    				_v32 = 0;
    				_v36 = 0;
    				_t23 =  *((intOrPtr*)( *_t46 + 0x32c))(_t46);
    				_t33 = __imp____vbaObjSet;
    				_t44 =  *_t33( &_v36, _t23);
    				_t47 =  *_t33( &_v32,  *((intOrPtr*)( *_t46 + 0x324))(_t46));
    				_t29 =  *((intOrPtr*)( *_t47 + 0xa0))(_t47,  &_v28);
    				asm("fclex");
    				if(_t29 < 0) {
    					__imp____vbaHresultCheckObj(_t29, _t47, 0x4074e0, 0xa0);
    				}
    				_t30 =  *((intOrPtr*)( *_t44 + 0x54))(_t44, _v28);
    				asm("fclex");
    				if(_t30 < 0) {
    					__imp____vbaHresultCheckObj(_t30, _t44, 0x4074f0, 0x54);
    				}
    				__imp____vbaFreeStr();
    				_t31 =  &_v36;
    				__imp____vbaFreeObjList(2,  &_v32, _t31);
    				_push(0x40d70f);
    				return _t31;
    			}




















    0x0040d623
    0x0040d632
    0x0040d63f
    0x0040d642
    0x0040d64b
    0x0040d64e
    0x0040d654
    0x0040d65a
    0x0040d65d
    0x0040d660
    0x0040d663
    0x0040d669
    0x0040d676
    0x0040d688
    0x0040d691
    0x0040d699
    0x0040d69b
    0x0040d6a9
    0x0040d6a9
    0x0040d6b6
    0x0040d6bb
    0x0040d6bd
    0x0040d6c8
    0x0040d6c8
    0x0040d6d1
    0x0040d6d7
    0x0040d6e1
    0x0040d6ea
    0x00000000

    APIs
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040D674
    • __vbaObjSet.MSVBVM60(?,00000000,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040D686
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074E0,000000A0,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040D6A9
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004074F0,00000054,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040D6C8
    • __vbaFreeStr.MSVBVM60(?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040D6D1
    • __vbaFreeObjList.MSVBVM60(00000002,?,?,?,?,?,?,?,?,?,?,?,?,?,00401186), ref: 0040D6E1
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$CheckFreeHresult$List
    • String ID:
    • API String ID: 2830907855-0
    • Opcode ID: 281f1b9a5f0ac1c1d2d7da50d7f8fa8a2d8c4047caa3dd9ca370c50370486af1
    • Instruction ID: fb9d06809fb7f965de9e5e6255bda1f486782a40148adf14d3c442f0134af40c
    • Opcode Fuzzy Hash: 281f1b9a5f0ac1c1d2d7da50d7f8fa8a2d8c4047caa3dd9ca370c50370486af1
    • Instruction Fuzzy Hash: 86211D70900249AFDB109FA5CD49EAFBBFCFF48704F10812AF545A31A1D7789945CBA5
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 534 4105a0-4105ec 536 4105fe-410620 __vbaObjSetAddref 534->536 537 4105ee-4105f8 __vbaNew2 534->537 539 410631-410640 __vbaFreeObj 536->539 540 410622-41062b __vbaHresultCheckObj 536->540 537->536 541 410652-410667 539->541 542 410642-41064c __vbaNew2 539->542 540->539 544 410669-410675 __vbaHresultCheckObj 541->544 545 41067b-41068f 541->545 542->541 544->545
    APIs
    • __vbaNew2.MSVBVM60(00407A20,0041133C,?,?,?,?,?,?,?,?,00401186), ref: 004105F8
    • __vbaObjSetAddref.MSVBVM60(?,00401170,?,?,?,?,?,?,?,?,00401186), ref: 0041060E
    • __vbaHresultCheckObj.MSVBVM60(00000000,02B3E9AC,00407A10,00000010,?,?,?,?,?,?,?,?,00401186), ref: 0041062B
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,00401186), ref: 00410634
    • __vbaNew2.MSVBVM60(00407BB4,00411010,?,?,?,?,?,?,?,?,00401186), ref: 0041064C
    • __vbaHresultCheckObj.MSVBVM60(00000000,005404A0,00407230,000001BC,?,?,?,?,?,?,?,?,00401186), ref: 00410675
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$CheckHresultNew2$AddrefFree
    • String ID:
    • API String ID: 4015893416-0
    • Opcode ID: 78ddf6b98a59f16f161818537b2fac434ea9bbf79a9db2ac722cca1ecbe8624b
    • Instruction ID: de10622d7d530a891a444557367db9db3dcc9e99ca436ff96b44cbd4ef364f2a
    • Opcode Fuzzy Hash: 78ddf6b98a59f16f161818537b2fac434ea9bbf79a9db2ac722cca1ecbe8624b
    • Instruction Fuzzy Hash: 0521A374A00204ABC7009F65CE45ADEBBB8FB48700B20853AF651B36E1C37858818B98
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 547 4100e0-410126 549 410138-41014d 547->549 550 410128-410132 __vbaNew2 547->550 552 410161-410168 549->552 553 41014f-41015b __vbaHresultCheckObj 549->553 550->549 554 41017a-41018f 552->554 555 41016a-410174 __vbaNew2 552->555 553->552 557 410191-41019d __vbaHresultCheckObj 554->557 558 4101a3-4101c6 554->558 555->554 557->558
    C-Code - Quality: 28%
    			E004100E0(signed char _a4) {
    				signed int _v8;
    				intOrPtr _v12;
    				intOrPtr _v16;
    				intOrPtr _v24;
    				signed char _t15;
    				signed char _t16;
    				intOrPtr _t18;
    				void* _t20;
    				intOrPtr _t21;
    				void* _t22;
    				signed char _t23;
    				void* _t26;
    				void* _t34;
    				void* _t36;
    				intOrPtr* _t37;
    				intOrPtr* _t38;
    				intOrPtr _t40;
    
    				 *[fs:0x0] = _t40;
    				_v16 = _t40 - 0x10;
    				_v12 = 0x401148;
    				_t15 = _a4;
    				_v8 = _t15 & 0x00000001;
    				_t16 = _t15 & 0x000000fe;
    				_a4 = _t16;
    				 *((intOrPtr*)( *_t16 + 4))(_t16, _t34, _t36, _t26,  *[fs:0x0], 0x401186);
    				_t18 =  *0x411024; // 0x0
    				if(_t18 == 0) {
    					__imp____vbaNew2(0x406c60, 0x411024);
    				}
    				_t37 =  *0x411024; // 0x0
    				_t20 =  *((intOrPtr*)( *_t37 + 0x1bc))(_t37, 0xffffffff);
    				asm("fclex");
    				if(_t20 < 0) {
    					__imp____vbaHresultCheckObj(_t20, _t37, 0x4079c4, 0x1bc);
    				}
    				_t21 =  *0x411010; // 0x5404a0
    				if(_t21 == 0) {
    					__imp____vbaNew2(0x407bb4, 0x411010);
    				}
    				_t38 =  *0x411010; // 0x5404a0
    				_t22 =  *((intOrPtr*)( *_t38 + 0x1bc))(_t38, 0);
    				asm("fclex");
    				if(_t22 < 0) {
    					__imp____vbaHresultCheckObj(_t22, _t38, 0x407230, 0x1bc);
    				}
    				_v8 = 0;
    				_t23 = _a4;
    				 *((intOrPtr*)( *_t23 + 8))(_t23);
    				 *[fs:0x0] = _v24;
    				return _v8;
    			}




















    0x004100f2
    0x004100ff
    0x00410102
    0x00410109
    0x00410111
    0x00410114
    0x00410117
    0x0041011c
    0x0041011f
    0x00410126
    0x00410132
    0x00410132
    0x00410138
    0x00410143
    0x0041014b
    0x0041014d
    0x0041015b
    0x0041015b
    0x00410161
    0x00410168
    0x00410174
    0x00410174
    0x0041017a
    0x00410185
    0x0041018d
    0x0041018f
    0x0041019d
    0x0041019d
    0x004101a3
    0x004101aa
    0x004101b0
    0x004101bb
    0x004101c6

    APIs
    • __vbaNew2.MSVBVM60(00406C60,00411024,?,?,?,?,?,?,00401186), ref: 00410132
    • __vbaHresultCheckObj.MSVBVM60(00000000,00000000,004079C4,000001BC,?,?,?,?,?,?,00401186), ref: 0041015B
    • __vbaNew2.MSVBVM60(00407BB4,00411010,?,?,?,?,?,?,00401186), ref: 00410174
    • __vbaHresultCheckObj.MSVBVM60(00000000,005404A0,00407230,000001BC,?,?,?,?,?,?,00401186), ref: 0041019D
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$CheckHresultNew2
    • String ID:
    • API String ID: 1998677070-0
    • Opcode ID: 289e525710720ce647f129ee04bde52d07fd0e9582bcd63e0d25116479a698e7
    • Instruction ID: ef5bc2f68a0a9d6af99f82fc43cff1bc5c7c197f985a77063a862a5cd70b0e72
    • Opcode Fuzzy Hash: 289e525710720ce647f129ee04bde52d07fd0e9582bcd63e0d25116479a698e7
    • Instruction Fuzzy Hash: A4218175B40240BBD710DF69CE49BDA7BF8FB09714F10816AF945E76A0C778A8808B98
    Uniqueness

    Uniqueness Score: -1.00%

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 560 4101d0-41021c 562 41022e-410250 __vbaObjSetAddref 560->562 563 41021e-410228 __vbaNew2 560->563 565 410261-41027e __vbaFreeObj 562->565 566 410252-41025b __vbaHresultCheckObj 562->566 563->562 566->565
    APIs
    • __vbaNew2.MSVBVM60(00407A20,0041133C,?,?,?,?,?,?,?,?,00401186), ref: 00410228
    • __vbaObjSetAddref.MSVBVM60(?,00401150,?,?,?,?,?,?,?,?,00401186), ref: 0041023E
    • __vbaHresultCheckObj.MSVBVM60(00000000,02B3E9AC,00407A10,00000010,?,?,?,?,?,?,?,?,00401186), ref: 0041025B
    • __vbaFreeObj.MSVBVM60(?,?,?,?,?,?,?,?,00401186), ref: 00410264
    Memory Dump Source
    • Source File: 00000000.00000002.515259832.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.515244693.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515293210.0000000000411000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.515304205.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __vba$AddrefCheckFreeHresultNew2
    • String ID:
    • API String ID: 1649212984-0
    • Opcode ID: 20a9c60f855d2ff761649c30d33cdf927133c8ae100917f8970f8fdea304e204
    • Instruction ID: 25fb5bacfb309643818aadf6102744031a4e32d005fbae359a864b7f90695bab
    • Opcode Fuzzy Hash: 20a9c60f855d2ff761649c30d33cdf927133c8ae100917f8970f8fdea304e204
    • Instruction Fuzzy Hash: 94115874900208EFDB00DF55CD49ADEBFB8FB58704F20846AF955B72A1C7745985CB98
    Uniqueness

    Uniqueness Score: -1.00%