Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER.exe

Overview

General Information

Sample name:ORDER.exe
Analysis ID:1509918
MD5:08d42759644a2b6c75d6e1cdf188bf40
SHA1:c3c6ddce56119679354eddc452ef29151ddf47cd
SHA256:342a7c418f2125aee7a228634841450a97c0b0653c5f9217bd1bb0677a5b14db
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ORDER.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\ORDER.exe" MD5: 08D42759644A2B6C75D6E1CDF188BF40)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: ORDER.exeVirustotal: Detection: 20%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
Source: ORDER.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: ORDER.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004055F6
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
Source: ORDER.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: ORDER.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040515D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_0040515D

System Summary

barindex
Source: initial sampleStatic PE information: Filename: ORDER.exe
Source: C:\Users\user\Desktop\ORDER.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403217
Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Windows\resources\0809Jump to behavior
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_004063100_2_00406310
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040499C0_2_0040499C
Source: ORDER.exeStatic PE information: invalid certificate
Source: ORDER.exe, 00000000.00000000.2016613536.0000000000437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs ORDER.exe
Source: ORDER.exeBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs ORDER.exe
Source: ORDER.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal60.evad.winEXE@1/14@0/0
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040442A GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_0040442A
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00402036 LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,0_2_00402036
Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\Videos\legioner.iniJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\nsr68E1.tmpJump to behavior
Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: ORDER.exeVirustotal: Detection: 20%
Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\ORDER.exeJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: iconcodecservice.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
Source: Besiddetrang.lnk.0.drLNK file: ..\..\..\Program Files (x86)\rytmiskes.cry
Source: ORDER.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_04C75454 push ds; retf 0_2_04C75458
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_04C78454 push ds; retf 0_2_04C78458
Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\ORDER.exeRDTSC instruction interceptor: First address: 5123092 second address: 5123092 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007F1C54C04FA9h 0x00000007 test cl, dl 0x00000009 cmp ebx, ecx 0x0000000b jc 00007F1C54C04D9Ah 0x00000011 cmp eax, ebx 0x00000013 inc ebp 0x00000014 push edx 0x00000015 mov edx, 0FCA7FC4h 0x0000001a cmp edx, 00000095h 0x00000020 je 00007F1C54C64004h 0x00000026 pop edx 0x00000027 inc ebx 0x00000028 rdtsc
Source: C:\Users\user\Desktop\ORDER.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004055F6
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
Source: C:\Users\user\Desktop\ORDER.exeAPI call chain: ExitProcess graph end nodegraph_0-4496
Source: C:\Users\user\Desktop\ORDER.exeAPI call chain: ExitProcess graph end nodegraph_0-4328
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00405D58 GetVersion,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D58
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00405D58 GetVersion,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D58
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
DLL Side-Loading
11
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory2
File and Directory Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager13
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
ORDER.exe11%ReversingLabs
ORDER.exe20%VirustotalBrowse
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://nsis.sf.net/NSIS_ErrorORDER.exefalse
  • Avira URL Cloud: safe
unknown
http://nsis.sf.net/NSIS_ErrorErrorORDER.exefalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1509918
Start date and time:2024-09-12 10:06:07 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 11s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:ORDER.exe
Detection:MAL
Classification:mal60.evad.winEXE@1/14@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 98%
  • Number of executed functions: 55
  • Number of non-executed functions: 31
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dllulACwpUCSU.exeGet hashmaliciousFormBook, GuLoaderBrowse
    fJuwM4Bwi7.exeGet hashmaliciousFormBook, GuLoaderBrowse
      ulACwpUCSU.exeGet hashmaliciousGuLoaderBrowse
        fJuwM4Bwi7.exeGet hashmaliciousGuLoaderBrowse
          Factura 02297-23042024.exeGet hashmaliciousFormBook, GuLoaderBrowse
            anebilledes.exeGet hashmaliciousFormBook, GuLoaderBrowse
              Factura 02297-23042024.exeGet hashmaliciousGuLoaderBrowse
                anebilledes.exeGet hashmaliciousGuLoaderBrowse
                  Purchase Order1613400027654123.pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                    Purchase Order1613400027654123.pdf.exeGet hashmaliciousGuLoaderBrowse
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                      Category:dropped
                      Size (bytes):756
                      Entropy (8bit):3.5570837464528497
                      Encrypted:false
                      SSDEEP:12:8wl080a/ledp8tzIAGbdpYQI1BQ1EyPWEMMgQ/CNUvH4t2YZ/elFlSJm:8wudOaAidU1mPWNMXOUFqy
                      MD5:C78E53B9BE9EB3F8016740AC1923F477
                      SHA1:6F396E75B1866F87CA3D745F413E8B7D90A1917A
                      SHA-256:B047C37A4F4E714BB018A207453131148F15F9407BE4B90CEB70F1FD5B768A18
                      SHA-512:B01EFD7B7C8D0783E839BA6DCAA657BB97253F834D1D5FABCFE32EEDACCEE1A0A2B20AEE591E394DE85369089B27B39601896881DDCCB510BED06C3A7A9E5EA9
                      Malicious:false
                      Reputation:low
                      Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".h.2...........rytmiskes.cry.L............................................r.y.t.m.i.s.k.e.s...c.r.y.......*.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.r.y.t.m.i.s.k.e.s...c.r.y.:.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.R.h.a.b.d.o.p.h.o.r.a.\.f.r.y.s.e.r.e.\.t.u.r.n.p.i.k.e.........*................@Z|...K.J.....................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:TTComp archive data, binary, 1K dictionary
                      Category:dropped
                      Size (bytes):423918
                      Entropy (8bit):7.056310992282221
                      Encrypted:false
                      SSDEEP:6144:LR/oEr7eSvNoL2p1W6HbPaQhjyywLs2pIvDwKRQtv6ZHHbcdp7gE2bA:LbeSvNoCpcdOh7Yuxk
                      MD5:FCBEE77EDA0CE7EB77135B3D6F72B73A
                      SHA1:7864B4676126C1EFEB6EE69A554D23238737F09D
                      SHA-256:1A548CF97C4C367B8EB2AB64799639D5BA8132177EC1A52760E4A44DEB4BD8A3
                      SHA-512:E0BA8ABD6CEBA77803FD589A03475A1739D9873B469E7B83640CD492A9FA3FDB2B319C94EED0A252B85FE72F124EB8322F03A7C5C311CC854CC399C81634B6B3
                      Malicious:false
                      Reputation:low
                      Preview:......................V...S......4..............................y...u........U............`......BBBB................\.v..............g......LLL.............HH.......................:::................F...................44.RR.....................................(((......!......HH........................;...................MM../..................RRR.........**............%............'............................#................O.....}}}.....Q...ZZZZ................ .WW.................[.....................A...GG.................mm.;;........DDD....S.....U..ccc...ZZZZ...............^..W.4...........`......U.....~......q....KKK...]]]]].....>>>.\\\...Y...oo.B.............vvv.....%%%...&.l...........`...B.....p...'...e...h......^....*.......====...].............#....II.x.................O...xxxxxx.........#......}}.zz..f..nn..99.Z..................a.......1..................................................a......i............77..D...........UU.rr....^....................u.....##.......
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):70089
                      Entropy (8bit):1.2513184695627344
                      Encrypted:false
                      SSDEEP:384:lvTTNGT9BZiwMEYhyzAd97w8/LgInf+mLOcPI5fVOv5NxF1FOn4Y0ZNvh5OHgG:lTNWFTMEYYE72InTCuKQ7FOnQv/OAG
                      MD5:D8E80CDEDAE3E054BA1D69902A2CA6D4
                      SHA1:B53C03824D1EDE6681868FF46E00E42D5E7A046F
                      SHA-256:F5C68DAB62BFF1B4F551D1128A5A7ABD4C4B337C1CDA41F3397C22E8E10F019C
                      SHA-512:D1830FA22A6E13BF580D118B14F602520909886DE720B38BA592F427D0553735E981CFA05A2366DAEF86735B6F83C2BD217AF44B12E5826B74C78E25E9F62295
                      Malicious:false
                      Reputation:low
                      Preview:......p.................n...X....................d..........................*............................................................................M............[...........~...............................d....39...................................................................................................................................................................................................................................}.............X........................................................................................q...............................................^.................O....................................................................................Z...........................'................................................................4.........................................................o...[............................................m...............0......................X....0.........................................................
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):34386
                      Entropy (8bit):4.593516032021315
                      Encrypted:false
                      SSDEEP:384:/R0lmqYIbLPEEeT7gXtZ40w83qZ1U++424QHulBg1/5Ji+gKC9LeyoWZzP:8tY6e4Xs0i/Izj5Ji+gKC9a2V
                      MD5:55E2980D6158B9CC092CECE482A70C13
                      SHA1:6368C8BEF4088CE4F56C6C3802B1D335F6DA51E2
                      SHA-256:3311A4FA71C9FF2F3054E279640CF4C5B5A44F9993036456EDDA5649897CB410
                      SHA-512:8202336DD1F2D37FB762E27E1DF8D06E66301424586B2A3DEA5AC9E7E143839F3BA138EED39FAA0EFDF0C2210EA9151FAF27BF94352419449AA5DCD1D9193048
                      Malicious:false
                      Reputation:low
                      Preview:..o....ff.""............bb........4...............00000.............GG........\......////.....L.QQQQ.......p......ll.....oo.......W..............@@.............x......%..........&&......N...xx.....A.J.....55.$.WW...000........Q............z....MM....111.99.......#..........H...................TTTTT........88888888..P..................>.......yy...........b.....;...........##....22..++............222......nn.aa......vv...........kkkk..............................................W......p......................................:.....qq.l.!.................SSS..........CCC...........U..........................ZZZ.WWWW....{{..............ii..H.((((...................1.............dd.....................-.........aaa.[[.D.....{......r..j...........3..........f..........444.....J...............uuuuu........P..a......WW.........rr.................N..]..........QQ................v..........~..............BBBB.hh..:.....HH...[[............66.........d.........!!..................... .77.........
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:FoxPro FPT, blocks size 88, next free block index 170, field type 0
                      Category:dropped
                      Size (bytes):316850
                      Entropy (8bit):1.2494344843876144
                      Encrypted:false
                      SSDEEP:768:UI1y6B1e+17bZEPl0Rnof0brVBSd/oyoTbFlbQ/BZ97yVOTLjv13Y5vx70El7oAN:ra0Xi31pavVKOa4fVlj
                      MD5:5D01D49C1498EC6723D7F194D210DDEB
                      SHA1:283514D6E17F8552A70B4B0DFB419D77FA0AE033
                      SHA-256:6D1337BE2B7C1C17CA7BE7B75518902C618F904923FE3FFBDF4F519DB6BB2BB8
                      SHA-512:286727E8962A8339E4527BFAE8B5879FF2A319C6DA090EB8130FBBB94C0C51AA0931CBCDCFC8D0B63D1DC3F30271AC193FE78C809D3F6A8B0648EB2228FEAF4D
                      Malicious:false
                      Reputation:low
                      Preview:.......X.........................J....q..................o....................................................n..............................{....5.p..V.........GV.........c........$..................................R...e.....E....................3..u...................%.....................+.......T.............z......................................`..............v....................................0................Y............................................................................................................................................................................W.........................D..................c.......................$...............N................f............... ...........R........ ....................y..............g......................P...............................................................................V.......t..............J.se...L.........................................\.........,.w.......................................D..
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):291479
                      Entropy (8bit):1.2623895916251218
                      Encrypted:false
                      SSDEEP:768:I4aF3mt3WBkVYqYZkjVzW72s6Y1rHtslWyNS652rpnfdK4xlkidjdUgxuZHUKiji:+8WZqVPshpX7P/77Lm7X7
                      MD5:2DAE10B8A993D301D5B30447CD554D49
                      SHA1:C0E795B9EBEA6ABAE51A0A56B377BDCE7A52CCF2
                      SHA-256:991EFFB618E7714390252B543789A0B6FE9E2650BD0F5049164DA51717031F51
                      SHA-512:738EE8FC2733644DD773F975075895D5D32AE2F5220A885F07F50873EA2D8FBD2E4DD9400647DF0A11E26B1489CE7391D692874D5E998E1979005D80A2790683
                      Malicious:false
                      Reputation:low
                      Preview:..................Y......................H...............Z..B............................!...................b..D........................................n...........{..........................9...............................................u.......................................*...................................................I.........T...............U.............&.............*.R.....................................................................................y..................F.....Z.....&................................................B.......L.............%...U.......;..........................I..................................._.......D....t........g.....................#.................n..a......................................M......i.....................Z..............................................{..................................................................................#....h.....U.............?.G..............L...........................................
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):527
                      Entropy (8bit):4.275388286900901
                      Encrypted:false
                      SSDEEP:12:sfiS0lw/iN/QGXqpBqt1J5WgR+FofZRVoENhEWJv:sfi3G/iRuLqzGe+FGoENhEqv
                      MD5:E22011A429D7D0729AA1A0B9CADAC17A
                      SHA1:793AE0FACF787AD29AA11A91EBFA079616EC1F10
                      SHA-256:5B857AAE7EEA7961E5571C1E7FA394E6B98C833E74E106C960BBD4D0564AC87B
                      SHA-512:32E762E9309D70F33F6B0537D55629C437D380EF2C5849A1187F4219D53075E0D6C3DF93DF500EA3F3CB5E07E0CBA85165002671362AF5500DD569C3CEB417CE
                      Malicious:false
                      Reputation:low
                      Preview:vilkaarligheden primaternes somewhere reformistiskes pseudoscientifically aggraverende ascidian tidsindstillet udvekslingsformaters porker igjen daddels..recoagulate submucronated cupular miasm mikrofon butterdejssnitter boreholes scrunger lafite childbirth samfundsvidenskaber..coabode archaeolater prisoning,taurean terminalknudes raisons trindadiske kardinaliteter fakkeltogene necessitarianism.altsaxofoner coliseum overdosage forbindelsesofficer reuphold ndlidendes amant,gldesfesternes spejlblankt toastable urol puffwig,
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):74
                      Entropy (8bit):3.9637832956585757
                      Encrypted:false
                      SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                      MD5:16D513397F3C1F8334E8F3E4FC49828F
                      SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                      SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                      SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                      Malicious:false
                      Reputation:moderate, very likely benign file
                      Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):56
                      Entropy (8bit):4.277864128228976
                      Encrypted:false
                      SSDEEP:3:sAAEVvjssEL84n:fLzq
                      MD5:2DD0441AF10D920D942B7ABD6DB12A0E
                      SHA1:A30239629869D259B9F8EB8C52892FB5BA1E6420
                      SHA-256:5C77D97F033A82507A0DB34CF67C39F2CF329E74701C2FF64EA8C45E1460FFD5
                      SHA-512:C85FB31758D365493D0E88EC6772BE1ED15ACE5198B4A570FDE92D31C820311F7303FCCB8A80D5D1B3E122AC69F9539AC0DE4134ACE0DE178DE38306D03A227E
                      Malicious:false
                      Reputation:low
                      Preview:kernel32::ReadFile(i r5, i r1, i 10485760,*i 0, i 0)i.r3
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:data
                      Category:dropped
                      Size (bytes):1155432
                      Entropy (8bit):4.242047758434036
                      Encrypted:false
                      SSDEEP:6144:5MfR/oEr7eSvNoL2p1W6HbPaQhjyywLs2pIvDwKRQtv6ZHHbcdp7gE2bN0s7ytij:ObeSvNoCpcdOh7YuxT
                      MD5:EA34E794F6026FC2664F8A371ECF01E4
                      SHA1:BDAC91F92F955B9DBC45F9B077382986756F7E76
                      SHA-256:CDCF28ADC6C21C0272D483EB69CECD5D1358CE0C2CD03058AC8C92978D24C7FD
                      SHA-512:6A084FBEE9503D72D0275B62774268A2B35074EB0A9EADD57599B311C15257FB3AE55334FF0FBCB1482E877909CEFD14D1A01122673995CF81013818C057CB59
                      Malicious:false
                      Reputation:low
                      Preview:........,...................x...............................................................................................................................................................................................................................................................J...b..........."...j...............................................................................................................................k...................Y...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                      Category:dropped
                      Size (bytes):11264
                      Entropy (8bit):5.779474184733856
                      Encrypted:false
                      SSDEEP:96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
                      MD5:6F5257C0B8C0EF4D440F4F4FCE85FB1B
                      SHA1:B6AC111DFB0D1FC75AD09C56BDE7830232395785
                      SHA-256:B7CCB923387CC346731471B20FC3DF1EAD13EC8C2E3147353C71BB0BD59BC8B1
                      SHA-512:A3CC27F1EFB52FB8ECDA54A7C36ADA39CEFEABB7B16F2112303EA463B0E1A4D745198D413EEBB3551E012C84A20DCDF4359E511E51BC3F1A60B13F1E3BAD1AA8
                      Malicious:false
                      Antivirus:
                      • Antivirus: ReversingLabs, Detection: 0%
                      Joe Sandbox View:
                      • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                      • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                      • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                      • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                      • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                      • Filename: anebilledes.exe, Detection: malicious, Browse
                      • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                      • Filename: anebilledes.exe, Detection: malicious, Browse
                      • Filename: Purchase Order1613400027654123.pdf.exe, Detection: malicious, Browse
                      • Filename: Purchase Order1613400027654123.pdf.exe, Detection: malicious, Browse
                      Reputation:moderate, very likely benign file
                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....\.U...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):60
                      Entropy (8bit):4.487582004007327
                      Encrypted:false
                      SSDEEP:3:sEMBQEJkJVEj3j9xQoXUn:A9xvUn
                      MD5:F401D6814F595B89476ABE6FE3F36969
                      SHA1:0F1036DA630FFE4D7981E8BE4086A49950192E6E
                      SHA-256:212700C392AD28F9246B5F2C4ACC11B9800911C76F75CED1D6CDC2D83CA2C3FC
                      SHA-512:4C79CE1F02E2192CB961B34910E34EB5C3D8B8159755BBAE10E2C03A33608BE8B6F5CD30377E80807FB2D6C38DA4673CAA9776E6753E95AD524F7C8FE9E3DA73
                      Malicious:false
                      Preview:kernel32::VirtualAlloc(i 0,i 10485760, i 0x3000, i 0x40)p.r1
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):30
                      Entropy (8bit):4.256564762130954
                      Encrypted:false
                      SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                      MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                      SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                      SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                      SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                      Malicious:false
                      Preview:user32::EnumWindows(i r1 ,i 0)
                      Process:C:\Users\user\Desktop\ORDER.exe
                      File Type:ASCII text, with no line terminators
                      Category:dropped
                      Size (bytes):52
                      Entropy (8bit):4.0914493934217315
                      Encrypted:false
                      SSDEEP:3:sBa99k1NoCFOn:KankVg
                      MD5:5D04A35D3950677049C7A0CF17E37125
                      SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                      SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                      SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                      Malicious:false
                      Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                      Entropy (8bit):7.968875746267401
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 92.16%
                      • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:ORDER.exe
                      File size:493'216 bytes
                      MD5:08d42759644a2b6c75d6e1cdf188bf40
                      SHA1:c3c6ddce56119679354eddc452ef29151ddf47cd
                      SHA256:342a7c418f2125aee7a228634841450a97c0b0653c5f9217bd1bb0677a5b14db
                      SHA512:32feac648482fbf434525f1f8bfe776e8dfb0643bd8d86e0a00056ad1a6cf4a4e4e5e41813d1e3842d10ad25530f80bc97dba761b8e481897cf59e38833af06f
                      SSDEEP:12288:oirXIqhvMRU8b+R9N/W5WOBSirZKysFIfb3kp01C:oicqt0bWNhOIircysFIfbUK1C
                      TLSH:ADA4236236E605BFDEC209713527AEB4E6B5D309503192CF2B537EBBAE713839447412
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\.U.................^...........2.......p....@
                      Icon Hash:6b69616563c36a25
                      Entrypoint:0x403217
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows gui
                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                      Time Stamp:0x55C15CE3 [Wed Aug 5 00:46:27 2015 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:4
                      OS Version Minor:0
                      File Version Major:4
                      File Version Minor:0
                      Subsystem Version Major:4
                      Subsystem Version Minor:0
                      Import Hash:59a4a44a250c4cf4f2d9de2b3fe5d95f
                      Signature Valid:false
                      Signature Issuer:CN="Majestical Hurricano ", O=Emneomraadedefinitionen, L=Princetown, S=England, C=GB
                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                      Error Number:-2146762487
                      Not Before, Not After
                      • 11/06/2024 06:46:36 11/06/2027 06:46:36
                      Subject Chain
                      • CN="Majestical Hurricano ", O=Emneomraadedefinitionen, L=Princetown, S=England, C=GB
                      Version:3
                      Thumbprint MD5:823245696C81DBEB8360A86EC2BD6600
                      Thumbprint SHA-1:918F162D8133F66E92EFC734228B539A11D51115
                      Thumbprint SHA-256:2261985A5B39C77E11B7E67265836ECAB80B6C446BF3A73F25B63C2D84C89041
                      Serial:321044E07399001AC894E678091B1130917A5EAF
                      Instruction
                      sub esp, 00000184h
                      push ebx
                      push ebp
                      push esi
                      xor ebx, ebx
                      push edi
                      mov dword ptr [esp+18h], ebx
                      mov dword ptr [esp+10h], 00409130h
                      mov dword ptr [esp+20h], ebx
                      mov byte ptr [esp+14h], 00000020h
                      call dword ptr [00407034h]
                      push 00008001h
                      call dword ptr [004070B4h]
                      push ebx
                      call dword ptr [0040728Ch]
                      push 00000009h
                      mov dword ptr [004237B8h], eax
                      call 00007F1C552C332Ah
                      mov dword ptr [00423704h], eax
                      push ebx
                      lea eax, dword ptr [esp+38h]
                      push 00000160h
                      push eax
                      push ebx
                      push 0041ECB8h
                      call dword ptr [00407164h]
                      push 004091E4h
                      push 00422F00h
                      call 00007F1C552C2FD4h
                      call dword ptr [004070B0h]
                      mov ebp, 00429000h
                      push eax
                      push ebp
                      call 00007F1C552C2FC2h
                      push ebx
                      call dword ptr [00407118h]
                      cmp byte ptr [00429000h], 00000022h
                      mov dword ptr [00423700h], eax
                      mov eax, ebp
                      jne 00007F1C552C052Ch
                      mov byte ptr [esp+14h], 00000022h
                      mov eax, 00429001h
                      push dword ptr [esp+14h]
                      push eax
                      call 00007F1C552C2A52h
                      push eax
                      call dword ptr [00407220h]
                      mov dword ptr [esp+1Ch], eax
                      jmp 00007F1C552C05E5h
                      cmp cl, 00000020h
                      jne 00007F1C552C0528h
                      inc eax
                      cmp byte ptr [eax], 00000020h
                      je 00007F1C552C051Ch
                      Programming Language:
                      • [EXP] VC++ 6.0 SP5 build 8804
                      NameVirtual AddressVirtual Size Is in Section
                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x1898.rsrc
                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                      IMAGE_DIRECTORY_ENTRY_SECURITY0x773980x1308
                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                      .text0x10000x5c3a0x5e00e5e7adda692e6e028f515fe3daa2b69fFalse0.658951130319149data6.410406825129756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      .rdata0x70000x11ce0x12005801d712ecba58aa87d1e7d1aa24f3aaFalse0.4522569444444444OpenPGP Secret Key5.236122428806677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      .data0x90000x1a7f80x400cc58d0a55ac015d8f1470ea90f440596False0.615234375data5.02661163746607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .ndata0x240000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                      .rsrc0x370000x18980x1a00af44e2ba305b9ce094acbbb3fd1dcbf7False0.6658653846153846data6.24140956459458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                      NameRVASizeTypeLanguageCountryZLIB Complexity
                      RT_ICON0x371d80xe23PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8623929262227135
                      RT_DIALOG0x380000x100dataEnglishUnited States0.5234375
                      RT_DIALOG0x381000x11cdataEnglishUnited States0.6056338028169014
                      RT_DIALOG0x382200x60dataEnglishUnited States0.7291666666666666
                      RT_GROUP_ICON0x382800x14dataEnglishUnited States1.05
                      RT_VERSION0x382980x2c0dataEnglishUnited States0.4772727272727273
                      RT_MANIFEST0x385580x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                      DLLImport
                      KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, CloseHandle, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, GetTempPathA, GetWindowsDirectoryA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                      USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                      SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                      ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                      COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                      ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                      VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                      Language of compilation systemCountry where language is spokenMap
                      EnglishUnited States
                      No network behavior found

                      Click to jump to process

                      Click to jump to process

                      Click to dive into process behavior distribution

                      Target ID:0
                      Start time:04:06:55
                      Start date:12/09/2024
                      Path:C:\Users\user\Desktop\ORDER.exe
                      Wow64 process (32bit):true
                      Commandline:"C:\Users\user\Desktop\ORDER.exe"
                      Imagebase:0x400000
                      File size:493'216 bytes
                      MD5 hash:08D42759644A2B6C75D6E1CDF188BF40
                      Has elevated privileges:true
                      Has administrator privileges:true
                      Programmed in:C, C++ or other language
                      Reputation:low
                      Has exited:false

                      Reset < >

                        Execution Graph

                        Execution Coverage:20.9%
                        Dynamic/Decrypted Code Coverage:14.4%
                        Signature Coverage:19.5%
                        Total number of Nodes:1461
                        Total number of Limit Nodes:40
                        execution_graph 4956 10001000 4959 1000101b 4956->4959 4966 100014bb 4959->4966 4961 10001020 4962 10001024 4961->4962 4963 10001027 GlobalAlloc 4961->4963 4964 100014e2 3 API calls 4962->4964 4963->4962 4965 10001019 4964->4965 4968 100014c1 4966->4968 4967 100014c7 4967->4961 4968->4967 4969 100014d3 GlobalFree 4968->4969 4969->4961 5329 4022c0 5330 4022f0 5329->5330 5331 4022c5 5329->5331 5332 4029fd 18 API calls 5330->5332 5333 402b07 19 API calls 5331->5333 5334 4022f7 5332->5334 5335 4022cc 5333->5335 5340 402a3d RegOpenKeyExA 5334->5340 5336 4029fd 18 API calls 5335->5336 5339 40230d 5335->5339 5338 4022dd RegDeleteValueA RegCloseKey 5336->5338 5338->5339 5345 402a68 5340->5345 5347 402ab4 5340->5347 5341 402a8e RegEnumKeyA 5342 402aa0 RegCloseKey 5341->5342 5341->5345 5343 406061 3 API calls 5342->5343 5346 402ab0 5343->5346 5344 402ac5 RegCloseKey 5344->5347 5345->5341 5345->5342 5345->5344 5348 402a3d 3 API calls 5345->5348 5346->5347 5349 402ae0 RegDeleteKeyA 5346->5349 5347->5339 5348->5345 5349->5347 5350 4019c0 5351 4029fd 18 API calls 5350->5351 5352 4019c7 5351->5352 5353 4029fd 18 API calls 5352->5353 5354 4019d0 5353->5354 5355 4019d7 lstrcmpiA 5354->5355 5356 4019e9 lstrcmpA 5354->5356 5357 4019dd 5355->5357 5356->5357 4970 402b42 4971 402b51 SetTimer 4970->4971 4972 402b6a 4970->4972 4971->4972 4973 402bb8 4972->4973 4974 402bbe MulDiv 4972->4974 4975 402b78 wsprintfA SetWindowTextA SetDlgItemTextA 4974->4975 4975->4973 4977 402645 4978 4029fd 18 API calls 4977->4978 4979 40264c FindFirstFileA 4978->4979 4980 40266f 4979->4980 4981 40265f 4979->4981 4985 405c94 wsprintfA 4980->4985 4983 402676 4986 405d36 lstrcpynA 4983->4986 4985->4983 4986->4981 4987 403745 4988 403750 4987->4988 4989 403754 4988->4989 4990 403757 GlobalAlloc 4988->4990 4990->4989 5358 4023c8 5359 402b07 19 API calls 5358->5359 5360 4023d2 5359->5360 5361 4029fd 18 API calls 5360->5361 5362 4023db 5361->5362 5363 4023e5 RegQueryValueExA 5362->5363 5366 402663 5362->5366 5364 40240b RegCloseKey 5363->5364 5365 402405 5363->5365 5364->5366 5365->5364 5369 405c94 wsprintfA 5365->5369 5369->5364 4175 4014ca 4176 40501f 25 API calls 4175->4176 4177 4014d1 4176->4177 5370 401ccc GetDlgItem GetClientRect 5371 4029fd 18 API calls 5370->5371 5372 401cfc LoadImageA SendMessageA 5371->5372 5373 402892 5372->5373 5374 401d1a DeleteObject 5372->5374 5374->5373 5005 1000180d 5006 10001830 5005->5006 5007 10001860 GlobalFree 5006->5007 5008 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5006->5008 5007->5008 5009 10001266 2 API calls 5008->5009 5010 100019e3 GlobalFree GlobalFree 5009->5010 4199 1000270f 4200 1000275f 4199->4200 4201 1000271f VirtualProtect 4199->4201 4201->4200 4202 4024d1 4203 4024d6 4202->4203 4204 4024e7 4202->4204 4205 4029e0 18 API calls 4203->4205 4206 4029fd 18 API calls 4204->4206 4208 4024dd 4205->4208 4207 4024ee lstrlenA 4206->4207 4207->4208 4209 40250d WriteFile 4208->4209 4210 402663 4208->4210 4209->4210 4234 4025d3 4235 4025da 4234->4235 4237 40283f 4234->4237 4236 4029e0 18 API calls 4235->4236 4238 4025e5 4236->4238 4239 4025ec SetFilePointer 4238->4239 4239->4237 4240 4025fc 4239->4240 4242 405c94 wsprintfA 4240->4242 4242->4237 4290 4014d6 4291 4029e0 18 API calls 4290->4291 4292 4014dc Sleep 4291->4292 4294 402892 4292->4294 4701 401dd8 4702 4029fd 18 API calls 4701->4702 4703 401dde 4702->4703 4704 4029fd 18 API calls 4703->4704 4705 401de7 4704->4705 4706 4029fd 18 API calls 4705->4706 4707 401df0 4706->4707 4708 4029fd 18 API calls 4707->4708 4709 401df9 4708->4709 4710 401423 25 API calls 4709->4710 4711 401e00 ShellExecuteA 4710->4711 4712 401e2d 4711->4712 5011 1000161a 5012 10001649 5011->5012 5013 10001a5d 18 API calls 5012->5013 5014 10001650 5013->5014 5015 10001663 5014->5015 5016 10001657 5014->5016 5018 1000168a 5015->5018 5019 1000166d 5015->5019 5017 10001266 2 API calls 5016->5017 5027 10001661 5017->5027 5020 10001690 5018->5020 5021 100016b4 5018->5021 5022 100014e2 3 API calls 5019->5022 5023 10001559 3 API calls 5020->5023 5024 100014e2 3 API calls 5021->5024 5025 10001672 5022->5025 5026 10001695 5023->5026 5024->5027 5028 10001559 3 API calls 5025->5028 5029 10001266 2 API calls 5026->5029 5030 10001678 5028->5030 5031 1000169b GlobalFree 5029->5031 5032 10001266 2 API calls 5030->5032 5031->5027 5033 100016af GlobalFree 5031->5033 5034 1000167e GlobalFree 5032->5034 5033->5027 5034->5027 5035 40155b 5036 401577 ShowWindow 5035->5036 5037 40157e 5035->5037 5036->5037 5038 402892 5037->5038 5039 40158c ShowWindow 5037->5039 5039->5038 5382 401edc 5383 4029fd 18 API calls 5382->5383 5384 401ee3 GetFileVersionInfoSizeA 5383->5384 5385 401f06 GlobalAlloc 5384->5385 5387 401f5c 5384->5387 5386 401f1a GetFileVersionInfoA 5385->5386 5385->5387 5386->5387 5388 401f2b VerQueryValueA 5386->5388 5388->5387 5389 401f44 5388->5389 5393 405c94 wsprintfA 5389->5393 5391 401f50 5394 405c94 wsprintfA 5391->5394 5393->5391 5394->5387 4858 40515d 4859 405308 4858->4859 4860 40517f GetDlgItem GetDlgItem GetDlgItem 4858->4860 4862 405310 GetDlgItem CreateThread CloseHandle 4859->4862 4863 405338 4859->4863 4904 404021 SendMessageA 4860->4904 4862->4863 4907 4050f1 5 API calls 4862->4907 4865 405366 4863->4865 4866 405387 4863->4866 4867 40534e ShowWindow ShowWindow 4863->4867 4864 4051ef 4870 4051f6 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4864->4870 4868 4053c1 4865->4868 4869 40536e 4865->4869 4874 404053 8 API calls 4866->4874 4906 404021 SendMessageA 4867->4906 4868->4866 4877 4053ce SendMessageA 4868->4877 4872 405376 4869->4872 4873 40539a ShowWindow 4869->4873 4875 405264 4870->4875 4876 405248 SendMessageA SendMessageA 4870->4876 4878 403fc5 SendMessageA 4872->4878 4879 4053ba 4873->4879 4880 4053ac 4873->4880 4886 405393 4874->4886 4883 405277 4875->4883 4884 405269 SendMessageA 4875->4884 4876->4875 4885 4053e7 CreatePopupMenu 4877->4885 4877->4886 4878->4866 4882 403fc5 SendMessageA 4879->4882 4881 40501f 25 API calls 4880->4881 4881->4879 4882->4868 4888 403fec 19 API calls 4883->4888 4884->4883 4887 405d58 18 API calls 4885->4887 4889 4053f7 AppendMenuA 4887->4889 4890 405287 4888->4890 4891 405415 GetWindowRect 4889->4891 4892 405428 TrackPopupMenu 4889->4892 4893 405290 ShowWindow 4890->4893 4894 4052c4 GetDlgItem SendMessageA 4890->4894 4891->4892 4892->4886 4896 405444 4892->4896 4897 4052b3 4893->4897 4898 4052a6 ShowWindow 4893->4898 4894->4886 4895 4052eb SendMessageA SendMessageA 4894->4895 4895->4886 4899 405463 SendMessageA 4896->4899 4905 404021 SendMessageA 4897->4905 4898->4897 4899->4899 4900 405480 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4899->4900 4902 4054a2 SendMessageA 4900->4902 4902->4902 4903 4054c4 GlobalUnlock SetClipboardData CloseClipboard 4902->4903 4903->4886 4904->4864 4905->4894 4906->4865 5395 4018e3 5396 40191a 5395->5396 5397 4029fd 18 API calls 5396->5397 5398 40191f 5397->5398 5399 4055f6 71 API calls 5398->5399 5400 401928 5399->5400 5401 4043e3 5402 4043f3 5401->5402 5403 404419 5401->5403 5404 403fec 19 API calls 5402->5404 5405 404053 8 API calls 5403->5405 5406 404400 SetDlgItemTextA 5404->5406 5407 404425 5405->5407 5406->5403 5408 4018e6 5409 4029fd 18 API calls 5408->5409 5410 4018ed 5409->5410 5411 40554a MessageBoxIndirectA 5410->5411 5412 4018f6 5411->5412 3938 401f68 3939 401f7a 3938->3939 3940 402028 3938->3940 3959 4029fd 3939->3959 3942 401423 25 API calls 3940->3942 3948 402181 3942->3948 3944 4029fd 18 API calls 3945 401f8a 3944->3945 3946 401f92 GetModuleHandleA 3945->3946 3947 401f9f LoadLibraryExA 3945->3947 3946->3947 3949 401faf GetProcAddress 3946->3949 3947->3940 3947->3949 3950 401ffb 3949->3950 3951 401fbe 3949->3951 4010 40501f 3950->4010 3952 401fc6 3951->3952 3953 401fdd 3951->3953 4007 401423 3952->4007 3965 100016bd 3953->3965 3955 401fce 3955->3948 3957 40201c FreeLibrary 3955->3957 3957->3948 3960 402a09 3959->3960 4021 405d58 3960->4021 3963 401f81 3963->3944 3966 100016ed 3965->3966 4060 10001a5d 3966->4060 3968 100016f4 3969 1000180a 3968->3969 3970 10001705 3968->3970 3971 1000170c 3968->3971 3969->3955 4109 100021b0 3970->4109 4092 100021fa 3971->4092 3976 10001770 3982 100017b2 3976->3982 3983 10001776 3976->3983 3977 10001752 4122 100023da 3977->4122 3978 10001722 3981 10001728 3978->3981 3986 10001733 3978->3986 3979 1000173b 3992 10001731 3979->3992 4119 10002aa7 3979->4119 3981->3992 4103 100027ec 3981->4103 3984 100023da 11 API calls 3982->3984 3988 10001559 3 API calls 3983->3988 3990 100017a4 3984->3990 3985 10001758 4133 10001559 3985->4133 4113 1000258d 3986->4113 3994 1000178c 3988->3994 4006 100017f9 3990->4006 4144 100023a0 3990->4144 3992->3976 3992->3977 3997 100023da 11 API calls 3994->3997 3996 10001739 3996->3992 3997->3990 4001 10001803 GlobalFree 4001->3969 4003 100017e5 4003->4006 4148 100014e2 wsprintfA 4003->4148 4004 100017de FreeLibrary 4004->4003 4006->3969 4006->4001 4008 40501f 25 API calls 4007->4008 4009 401431 4008->4009 4009->3955 4011 4050dd 4010->4011 4012 40503a 4010->4012 4011->3955 4013 405057 lstrlenA 4012->4013 4014 405d58 18 API calls 4012->4014 4015 405080 4013->4015 4016 405065 lstrlenA 4013->4016 4014->4013 4018 405093 4015->4018 4019 405086 SetWindowTextA 4015->4019 4016->4011 4017 405077 lstrcatA 4016->4017 4017->4015 4018->4011 4020 405099 SendMessageA SendMessageA SendMessageA 4018->4020 4019->4018 4020->4011 4037 405d65 4021->4037 4022 405f88 4023 402a2a 4022->4023 4055 405d36 lstrcpynA 4022->4055 4023->3963 4039 405fa1 4023->4039 4025 405e06 GetVersion 4025->4037 4026 405f5f lstrlenA 4026->4037 4027 405d58 10 API calls 4027->4026 4030 405e7e GetSystemDirectoryA 4030->4037 4032 405e91 GetWindowsDirectoryA 4032->4037 4033 405fa1 5 API calls 4033->4037 4034 405d58 10 API calls 4034->4037 4035 405f08 lstrcatA 4035->4037 4036 405ec5 SHGetSpecialFolderLocation 4036->4037 4038 405edd SHGetPathFromIDListA CoTaskMemFree 4036->4038 4037->4022 4037->4025 4037->4026 4037->4027 4037->4030 4037->4032 4037->4033 4037->4034 4037->4035 4037->4036 4048 405c1d RegOpenKeyExA 4037->4048 4053 405c94 wsprintfA 4037->4053 4054 405d36 lstrcpynA 4037->4054 4038->4037 4045 405fad 4039->4045 4040 406019 CharPrevA 4043 406015 4040->4043 4041 40600a CharNextA 4041->4043 4041->4045 4043->4040 4044 406034 4043->4044 4044->3963 4045->4041 4045->4043 4046 405ff8 CharNextA 4045->4046 4047 406005 CharNextA 4045->4047 4056 4057f1 4045->4056 4046->4045 4047->4041 4049 405c50 RegQueryValueExA 4048->4049 4050 405c8e 4048->4050 4051 405c71 RegCloseKey 4049->4051 4050->4037 4051->4050 4053->4037 4054->4037 4055->4023 4057 4057f7 4056->4057 4058 40580a 4057->4058 4059 4057fd CharNextA 4057->4059 4058->4045 4059->4057 4151 10001215 GlobalAlloc 4060->4151 4062 10001a81 4152 10001215 GlobalAlloc 4062->4152 4064 10001cbb GlobalFree GlobalFree GlobalFree 4065 10001cd8 4064->4065 4084 10001d22 4064->4084 4066 1000201a 4065->4066 4073 10001ced 4065->4073 4065->4084 4068 1000203c GetModuleHandleA 4066->4068 4066->4084 4067 10001b60 GlobalAlloc 4086 10001a8c 4067->4086 4071 10002062 4068->4071 4072 1000204d LoadLibraryA 4068->4072 4069 10001bab lstrcpyA 4074 10001bb5 lstrcpyA 4069->4074 4070 10001bc9 GlobalFree 4070->4086 4159 100015a4 GetProcAddress 4071->4159 4072->4071 4072->4084 4073->4084 4155 10001224 4073->4155 4074->4086 4076 100020b3 4077 100020c0 lstrlenA 4076->4077 4076->4084 4160 100015a4 GetProcAddress 4077->4160 4079 10001f7a 4083 10001fbe lstrcpyA 4079->4083 4079->4084 4080 10002074 4080->4076 4091 1000209d GetProcAddress 4080->4091 4083->4084 4084->3968 4085 100020d9 4085->4084 4086->4064 4086->4067 4086->4069 4086->4070 4086->4074 4086->4079 4086->4084 4087 10001c07 4086->4087 4088 10001e75 GlobalFree 4086->4088 4090 10001224 2 API calls 4086->4090 4158 10001215 GlobalAlloc 4086->4158 4087->4086 4153 10001534 GlobalSize GlobalAlloc 4087->4153 4088->4086 4090->4086 4091->4076 4100 10002212 4092->4100 4094 10002349 GlobalFree 4095 10001712 4094->4095 4094->4100 4095->3978 4095->3979 4095->3992 4096 100022b9 GlobalAlloc MultiByteToWideChar 4099 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4096->4099 4102 10002303 4096->4102 4097 1000230a lstrlenA 4097->4094 4097->4102 4098 10001224 GlobalAlloc lstrcpynA 4098->4100 4099->4094 4100->4094 4100->4096 4100->4097 4100->4098 4162 100012ad 4100->4162 4102->4094 4166 10002521 4102->4166 4106 100027fe 4103->4106 4104 100028a3 SetFilePointer 4105 100028c1 4104->4105 4107 100029b2 GetLastError 4105->4107 4108 100029bd 4105->4108 4106->4104 4107->4108 4108->3992 4110 100021c0 4109->4110 4111 1000170b 4109->4111 4110->4111 4112 100021d2 GlobalAlloc 4110->4112 4111->3971 4112->4110 4117 100025a9 4113->4117 4114 100025fa GlobalAlloc 4118 1000261c 4114->4118 4115 1000260d 4116 10002612 GlobalSize 4115->4116 4115->4118 4116->4118 4117->4114 4117->4115 4118->3996 4121 10002ab2 4119->4121 4120 10002af2 GlobalFree 4121->4120 4169 10001215 GlobalAlloc 4122->4169 4124 10002473 WideCharToMultiByte 4130 100023e6 4124->4130 4125 1000243a lstrcpynA 4125->4130 4126 1000244b StringFromGUID2 WideCharToMultiByte 4126->4130 4127 10002494 wsprintfA 4127->4130 4128 100024b8 GlobalFree 4128->4130 4129 100024f2 GlobalFree 4129->3985 4130->4124 4130->4125 4130->4126 4130->4127 4130->4128 4130->4129 4131 10001266 2 API calls 4130->4131 4170 100012d1 4130->4170 4131->4130 4174 10001215 GlobalAlloc 4133->4174 4135 1000155f 4137 10001586 4135->4137 4138 1000156c lstrcpyA 4135->4138 4139 100015a0 4137->4139 4140 1000158b wsprintfA 4137->4140 4138->4139 4141 10001266 4139->4141 4140->4139 4142 100012a8 GlobalFree 4141->4142 4143 1000126f GlobalAlloc lstrcpynA 4141->4143 4142->3990 4143->4142 4145 100023ae 4144->4145 4147 100017c5 4144->4147 4146 100023c7 GlobalFree 4145->4146 4145->4147 4146->4145 4147->4003 4147->4004 4149 10001266 2 API calls 4148->4149 4150 10001503 4149->4150 4150->4006 4151->4062 4152->4086 4154 10001552 4153->4154 4154->4087 4161 10001215 GlobalAlloc 4155->4161 4157 10001233 lstrcpynA 4157->4084 4158->4086 4159->4080 4160->4085 4161->4157 4163 100012b4 4162->4163 4164 10001224 2 API calls 4163->4164 4165 100012cf 4164->4165 4165->4100 4167 10002585 4166->4167 4168 1000252f VirtualAlloc 4166->4168 4167->4102 4168->4167 4169->4130 4171 100012f9 4170->4171 4172 100012da 4170->4172 4171->4130 4172->4171 4173 100012e0 lstrcpyA 4172->4173 4173->4171 4174->4135 5052 40286d SendMessageA 5053 402887 InvalidateRect 5052->5053 5054 402892 5052->5054 5053->5054 5413 4014f0 SetForegroundWindow 5414 402892 5413->5414 5415 401af0 5416 4029fd 18 API calls 5415->5416 5417 401af7 5416->5417 5418 4029e0 18 API calls 5417->5418 5419 401b00 wsprintfA 5418->5419 5420 402892 5419->5420 5421 4019f1 5422 4029fd 18 API calls 5421->5422 5423 4019fa ExpandEnvironmentStringsA 5422->5423 5424 401a0e 5423->5424 5426 401a21 5423->5426 5425 401a13 lstrcmpA 5424->5425 5424->5426 5425->5426 5427 100015b3 5428 100014bb GlobalFree 5427->5428 5430 100015cb 5428->5430 5429 10001611 GlobalFree 5430->5429 5431 100015e6 5430->5431 5432 100015fd VirtualFree 5430->5432 5431->5429 5432->5429 5055 401c78 5056 4029e0 18 API calls 5055->5056 5057 401c7e IsWindow 5056->5057 5058 4019e1 5057->5058 5059 40477a 5060 4047a6 5059->5060 5061 40478a 5059->5061 5063 4047d9 5060->5063 5064 4047ac SHGetPathFromIDListA 5060->5064 5070 40552e GetDlgItemTextA 5061->5070 5066 4047c3 SendMessageA 5064->5066 5067 4047bc 5064->5067 5065 404797 SendMessageA 5065->5060 5066->5063 5068 40140b 2 API calls 5067->5068 5068->5066 5070->5065 5071 1000103d 5072 1000101b 5 API calls 5071->5072 5073 10001056 5072->5073 5440 4014fe 5441 401506 5440->5441 5443 401519 5440->5443 5442 4029e0 18 API calls 5441->5442 5442->5443 4908 40227f 4909 4029fd 18 API calls 4908->4909 4910 402290 4909->4910 4911 4029fd 18 API calls 4910->4911 4912 402299 4911->4912 4913 4029fd 18 API calls 4912->4913 4914 4022a3 GetPrivateProfileStringA 4913->4914 5074 401000 5075 401037 BeginPaint GetClientRect 5074->5075 5076 40100c DefWindowProcA 5074->5076 5078 4010f3 5075->5078 5079 401179 5076->5079 5080 401073 CreateBrushIndirect FillRect DeleteObject 5078->5080 5081 4010fc 5078->5081 5080->5078 5082 401102 CreateFontIndirectA 5081->5082 5083 401167 EndPaint 5081->5083 5082->5083 5084 401112 6 API calls 5082->5084 5083->5079 5084->5083 5085 404100 lstrcpynA lstrlenA 5086 402602 5087 402892 5086->5087 5088 402609 5086->5088 5089 40260f FindClose 5088->5089 5089->5087 5097 401705 5098 4029fd 18 API calls 5097->5098 5099 40170c SearchPathA 5098->5099 5100 401727 5099->5100 5101 4027bd 5099->5101 5100->5101 5103 405d36 lstrcpynA 5100->5103 5103->5101 5444 100029c7 5445 100029df 5444->5445 5446 10001534 2 API calls 5445->5446 5447 100029fa 5446->5447 5104 40280a 5105 4029e0 18 API calls 5104->5105 5106 402810 5105->5106 5107 402841 5106->5107 5108 40281e 5106->5108 5109 402663 5106->5109 5107->5109 5110 405d58 18 API calls 5107->5110 5108->5109 5112 405c94 wsprintfA 5108->5112 5110->5109 5112->5109 5448 40218a 5449 4029fd 18 API calls 5448->5449 5450 402190 5449->5450 5451 4029fd 18 API calls 5450->5451 5452 402199 5451->5452 5453 4029fd 18 API calls 5452->5453 5454 4021a2 5453->5454 5455 40603a 2 API calls 5454->5455 5456 4021ab 5455->5456 5457 4021bc lstrlenA lstrlenA 5456->5457 5458 4021af 5456->5458 5460 40501f 25 API calls 5457->5460 5459 40501f 25 API calls 5458->5459 5462 4021b7 5458->5462 5459->5462 5461 4021f8 SHFileOperationA 5460->5461 5461->5458 5461->5462 5113 40220c 5114 402213 5113->5114 5116 402226 5113->5116 5115 405d58 18 API calls 5114->5115 5117 402220 5115->5117 5118 40554a MessageBoxIndirectA 5117->5118 5118->5116 5119 406310 5121 406194 5119->5121 5120 406aff 5121->5120 5122 406215 GlobalFree 5121->5122 5123 40621e GlobalAlloc 5121->5123 5124 406295 GlobalAlloc 5121->5124 5125 40628c GlobalFree 5121->5125 5122->5123 5123->5120 5123->5121 5124->5120 5124->5121 5125->5124 5463 401490 5464 40501f 25 API calls 5463->5464 5465 401497 5464->5465 5126 401b11 5127 401b62 5126->5127 5128 401b1e 5126->5128 5129 401b66 5127->5129 5130 401b8b GlobalAlloc 5127->5130 5131 401ba6 5128->5131 5135 401b35 5128->5135 5139 402226 5129->5139 5147 405d36 lstrcpynA 5129->5147 5132 405d58 18 API calls 5130->5132 5133 405d58 18 API calls 5131->5133 5131->5139 5132->5131 5136 402220 5133->5136 5145 405d36 lstrcpynA 5135->5145 5140 40554a MessageBoxIndirectA 5136->5140 5137 401b78 GlobalFree 5137->5139 5140->5139 5141 401b44 5146 405d36 lstrcpynA 5141->5146 5143 401b53 5148 405d36 lstrcpynA 5143->5148 5145->5141 5146->5143 5147->5137 5148->5139 5466 404f93 5467 404fa3 5466->5467 5468 404fb7 5466->5468 5470 405000 5467->5470 5471 404fa9 5467->5471 5469 404fbf IsWindowVisible 5468->5469 5473 404fd6 5468->5473 5469->5470 5472 404fcc 5469->5472 5474 405005 CallWindowProcA 5470->5474 5475 404038 SendMessageA 5471->5475 5479 4048ea SendMessageA 5472->5479 5473->5474 5484 40496a 5473->5484 5477 404fb3 5474->5477 5475->5477 5480 404949 SendMessageA 5479->5480 5481 40490d GetMessagePos ScreenToClient SendMessageA 5479->5481 5482 404941 5480->5482 5481->5482 5483 404946 5481->5483 5482->5473 5483->5480 5493 405d36 lstrcpynA 5484->5493 5486 40497d 5494 405c94 wsprintfA 5486->5494 5488 404987 5489 40140b 2 API calls 5488->5489 5490 404990 5489->5490 5495 405d36 lstrcpynA 5490->5495 5492 404997 5492->5470 5493->5486 5494->5488 5495->5492 4268 401595 4269 4029fd 18 API calls 4268->4269 4270 40159c SetFileAttributesA 4269->4270 4271 4015ae 4270->4271 5496 401c95 5497 4029e0 18 API calls 5496->5497 5498 401c9c 5497->5498 5499 4029e0 18 API calls 5498->5499 5500 401ca4 GetDlgItem 5499->5500 5501 4024cb 5500->5501 4295 403217 #17 SetErrorMode OleInitialize 4370 406061 GetModuleHandleA 4295->4370 4299 403287 GetCommandLineA 4375 405d36 lstrcpynA 4299->4375 4301 403299 GetModuleHandleA 4302 4032b0 4301->4302 4303 4057f1 CharNextA 4302->4303 4304 4032c4 CharNextA 4303->4304 4310 4032d4 4304->4310 4305 40339e 4306 4033b1 GetTempPathA 4305->4306 4376 4031e3 4306->4376 4308 4033c9 4311 403423 DeleteFileA 4308->4311 4312 4033cd GetWindowsDirectoryA lstrcatA 4308->4312 4309 4057f1 CharNextA 4309->4310 4310->4305 4310->4309 4316 4033a0 4310->4316 4384 402c79 GetTickCount GetModuleFileNameA 4311->4384 4313 4031e3 11 API calls 4312->4313 4315 4033e9 4313->4315 4315->4311 4318 4033ed GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4315->4318 4468 405d36 lstrcpynA 4316->4468 4317 403437 4324 4057f1 CharNextA 4317->4324 4353 4034bd 4317->4353 4365 4034cd 4317->4365 4320 4031e3 11 API calls 4318->4320 4322 40341b 4320->4322 4322->4311 4322->4365 4335 403452 4324->4335 4326 4034e6 4494 40554a 4326->4494 4327 4035da 4328 40367d ExitProcess 4327->4328 4334 406061 3 API calls 4327->4334 4330 403498 4469 4058b4 4330->4469 4331 4034fc lstrcatA lstrcmpiA 4337 403518 CreateDirectoryA SetCurrentDirectoryA 4331->4337 4331->4365 4338 4035ed 4334->4338 4335->4330 4335->4331 4340 40353a 4337->4340 4341 40352f 4337->4341 4342 406061 3 API calls 4338->4342 4499 405d36 lstrcpynA 4340->4499 4498 405d36 lstrcpynA 4341->4498 4345 4035f6 4342->4345 4347 406061 3 API calls 4345->4347 4349 4035ff 4347->4349 4348 4034b2 4484 405d36 lstrcpynA 4348->4484 4350 40361d 4349->4350 4356 40360d GetCurrentProcess 4349->4356 4354 406061 3 API calls 4350->4354 4352 405d58 18 API calls 4355 403579 DeleteFileA 4352->4355 4414 403787 4353->4414 4357 403654 4354->4357 4358 403586 CopyFileA 4355->4358 4367 403548 4355->4367 4356->4350 4360 403669 ExitWindowsEx 4357->4360 4361 403676 4357->4361 4358->4367 4359 4035ce 4362 405bea 40 API calls 4359->4362 4360->4328 4360->4361 4505 40140b 4361->4505 4362->4365 4485 403695 4365->4485 4366 405d58 18 API calls 4366->4367 4367->4352 4367->4359 4367->4366 4368 4054e5 2 API calls 4367->4368 4369 4035ba CloseHandle 4367->4369 4500 405bea 4367->4500 4368->4367 4369->4367 4371 406088 GetProcAddress 4370->4371 4372 40607d LoadLibraryA 4370->4372 4373 40325c SHGetFileInfoA 4371->4373 4372->4371 4372->4373 4374 405d36 lstrcpynA 4373->4374 4374->4299 4375->4301 4377 405fa1 5 API calls 4376->4377 4379 4031ef 4377->4379 4378 4031f9 4378->4308 4379->4378 4508 4057c6 lstrlenA CharPrevA 4379->4508 4382 4059f6 2 API calls 4383 403215 4382->4383 4383->4308 4511 4059c7 GetFileAttributesA CreateFileA 4384->4511 4386 402cbc 4413 402cc9 4386->4413 4512 405d36 lstrcpynA 4386->4512 4388 402cdf 4513 40580d lstrlenA 4388->4513 4392 402cf0 GetFileSize 4393 402df1 4392->4393 4411 402d07 4392->4411 4518 402bda 4393->4518 4397 402e34 GlobalAlloc 4401 402e4b 4397->4401 4398 402e8c 4399 402bda 33 API calls 4398->4399 4399->4413 4405 4059f6 2 API calls 4401->4405 4402 402e15 4403 4031b6 ReadFile 4402->4403 4407 402e20 4403->4407 4404 402bda 33 API calls 4404->4411 4406 402e5c CreateFileA 4405->4406 4408 402e96 4406->4408 4406->4413 4407->4397 4407->4413 4533 4031cc SetFilePointer 4408->4533 4410 402ea4 4534 402f1f 4410->4534 4411->4393 4411->4398 4411->4404 4411->4413 4549 4031b6 4411->4549 4413->4317 4415 406061 3 API calls 4414->4415 4416 40379b 4415->4416 4417 4037a1 4416->4417 4418 4037b3 4416->4418 4595 405c94 wsprintfA 4417->4595 4419 405c1d 3 API calls 4418->4419 4420 4037de 4419->4420 4422 4037fc lstrcatA 4420->4422 4424 405c1d 3 API calls 4420->4424 4423 4037b1 4422->4423 4579 403a4c 4423->4579 4424->4422 4427 4058b4 18 API calls 4428 40382e 4427->4428 4429 4038b7 4428->4429 4431 405c1d 3 API calls 4428->4431 4430 4058b4 18 API calls 4429->4430 4432 4038bd 4430->4432 4433 40385a 4431->4433 4434 4038cd LoadImageA 4432->4434 4435 405d58 18 API calls 4432->4435 4433->4429 4439 403876 lstrlenA 4433->4439 4443 4057f1 CharNextA 4433->4443 4436 403973 4434->4436 4437 4038f4 RegisterClassA 4434->4437 4435->4434 4438 40140b 2 API calls 4436->4438 4440 40397d 4437->4440 4441 40392a SystemParametersInfoA CreateWindowExA 4437->4441 4442 403979 4438->4442 4444 403884 lstrcmpiA 4439->4444 4445 4038aa 4439->4445 4440->4365 4441->4436 4442->4440 4450 403a4c 19 API calls 4442->4450 4447 403874 4443->4447 4444->4445 4448 403894 GetFileAttributesA 4444->4448 4446 4057c6 3 API calls 4445->4446 4451 4038b0 4446->4451 4447->4439 4449 4038a0 4448->4449 4449->4445 4452 40580d 2 API calls 4449->4452 4453 40398a 4450->4453 4596 405d36 lstrcpynA 4451->4596 4452->4445 4455 403996 ShowWindow LoadLibraryA 4453->4455 4456 403a19 4453->4456 4458 4039b5 LoadLibraryA 4455->4458 4459 4039bc GetClassInfoA 4455->4459 4588 4050f1 OleInitialize 4456->4588 4458->4459 4461 4039d0 GetClassInfoA RegisterClassA 4459->4461 4462 4039e6 DialogBoxParamA 4459->4462 4460 403a1f 4463 403a23 4460->4463 4464 403a3b 4460->4464 4461->4462 4465 40140b 2 API calls 4462->4465 4463->4440 4467 40140b 2 API calls 4463->4467 4466 40140b 2 API calls 4464->4466 4465->4440 4466->4440 4467->4440 4468->4306 4605 405d36 lstrcpynA 4469->4605 4471 4058c5 4472 40585f 4 API calls 4471->4472 4473 4058cb 4472->4473 4474 4034a3 4473->4474 4475 405fa1 5 API calls 4473->4475 4474->4365 4483 405d36 lstrcpynA 4474->4483 4476 4058db 4475->4476 4476->4474 4477 405906 lstrlenA 4476->4477 4482 40580d 2 API calls 4476->4482 4606 40603a FindFirstFileA 4476->4606 4477->4476 4478 405911 4477->4478 4480 4057c6 3 API calls 4478->4480 4481 405916 GetFileAttributesA 4480->4481 4481->4474 4482->4477 4483->4348 4484->4353 4486 4036b0 4485->4486 4487 4036a6 CloseHandle 4485->4487 4488 4036c4 4486->4488 4489 4036ba CloseHandle 4486->4489 4487->4486 4609 4036f2 4488->4609 4489->4488 4495 40555f 4494->4495 4496 4034f4 ExitProcess 4495->4496 4497 405573 MessageBoxIndirectA 4495->4497 4497->4496 4498->4340 4499->4367 4501 406061 3 API calls 4500->4501 4502 405bf1 4501->4502 4504 405c12 4502->4504 4663 405a6e lstrcpyA 4502->4663 4504->4367 4506 401389 2 API calls 4505->4506 4507 401420 4506->4507 4507->4328 4509 4057e0 lstrcatA 4508->4509 4510 403201 CreateDirectoryA 4508->4510 4509->4510 4510->4382 4511->4386 4512->4388 4514 40581a 4513->4514 4515 402ce5 4514->4515 4516 40581f CharPrevA 4514->4516 4517 405d36 lstrcpynA 4515->4517 4516->4514 4516->4515 4517->4392 4519 402c00 4518->4519 4520 402be8 4518->4520 4522 402c10 GetTickCount 4519->4522 4523 402c08 4519->4523 4521 402bf1 DestroyWindow 4520->4521 4526 402bf8 4520->4526 4521->4526 4524 402c1e 4522->4524 4522->4526 4525 40609a 2 API calls 4523->4525 4527 402c53 CreateDialogParamA ShowWindow 4524->4527 4528 402c26 4524->4528 4525->4526 4526->4397 4526->4413 4552 4031cc SetFilePointer 4526->4552 4527->4526 4528->4526 4553 402bbe 4528->4553 4530 402c34 wsprintfA 4531 40501f 25 API calls 4530->4531 4532 402c51 4531->4532 4532->4526 4533->4410 4535 402f4b 4534->4535 4536 402f2f SetFilePointer 4534->4536 4556 40303a GetTickCount 4535->4556 4536->4535 4541 40303a 43 API calls 4542 402f82 4541->4542 4543 402ffc ReadFile 4542->4543 4545 402ff6 4542->4545 4546 402f92 4542->4546 4543->4545 4545->4413 4546->4545 4547 405a3f ReadFile 4546->4547 4548 402fc5 WriteFile 4546->4548 4547->4546 4548->4545 4548->4546 4550 405a3f ReadFile 4549->4550 4551 4031c9 4550->4551 4551->4411 4552->4402 4554 402bcd 4553->4554 4555 402bcf MulDiv 4553->4555 4554->4555 4555->4530 4557 4031a4 4556->4557 4558 403069 4556->4558 4559 402bda 33 API calls 4557->4559 4571 4031cc SetFilePointer 4558->4571 4566 402f52 4559->4566 4561 403074 SetFilePointer 4565 403099 4561->4565 4562 4031b6 ReadFile 4562->4565 4564 402bda 33 API calls 4564->4565 4565->4562 4565->4564 4565->4566 4567 40312e WriteFile 4565->4567 4568 403185 SetFilePointer 4565->4568 4572 406161 4565->4572 4566->4545 4569 405a3f ReadFile 4566->4569 4567->4565 4567->4566 4568->4557 4570 402f6b 4569->4570 4570->4541 4570->4545 4571->4561 4573 406186 4572->4573 4574 40618e 4572->4574 4573->4565 4574->4573 4575 406215 GlobalFree 4574->4575 4576 40621e GlobalAlloc 4574->4576 4577 406295 GlobalAlloc 4574->4577 4578 40628c GlobalFree 4574->4578 4575->4576 4576->4573 4576->4574 4577->4573 4577->4574 4578->4577 4580 403a60 4579->4580 4597 405c94 wsprintfA 4580->4597 4582 403ad1 4583 405d58 18 API calls 4582->4583 4584 403add SetWindowTextA 4583->4584 4585 40380c 4584->4585 4586 403af9 4584->4586 4585->4427 4586->4585 4587 405d58 18 API calls 4586->4587 4587->4586 4598 404038 4588->4598 4590 404038 SendMessageA 4592 40514d OleUninitialize 4590->4592 4591 405114 4594 40513b 4591->4594 4601 401389 4591->4601 4592->4460 4594->4590 4595->4423 4596->4429 4597->4582 4599 404050 4598->4599 4600 404041 SendMessageA 4598->4600 4599->4591 4600->4599 4602 401390 4601->4602 4603 4013fe 4602->4603 4604 4013cb MulDiv SendMessageA 4602->4604 4603->4591 4604->4602 4605->4471 4607 406050 FindClose 4606->4607 4608 40605b 4606->4608 4607->4608 4608->4476 4610 403700 4609->4610 4611 4036c9 4610->4611 4612 403705 FreeLibrary GlobalFree 4610->4612 4613 4055f6 4611->4613 4612->4611 4612->4612 4614 4058b4 18 API calls 4613->4614 4615 405616 4614->4615 4616 405635 4615->4616 4617 40561e DeleteFileA 4615->4617 4618 405763 4616->4618 4650 405d36 lstrcpynA 4616->4650 4645 4034d6 OleUninitialize 4617->4645 4625 40603a 2 API calls 4618->4625 4618->4645 4620 40565b 4621 405661 lstrcatA 4620->4621 4622 40566e 4620->4622 4623 405674 4621->4623 4624 40580d 2 API calls 4622->4624 4627 405682 lstrcatA 4623->4627 4628 40568d lstrlenA FindFirstFileA 4623->4628 4624->4623 4626 405787 4625->4626 4629 4057c6 3 API calls 4626->4629 4626->4645 4627->4628 4628->4618 4648 4056b1 4628->4648 4630 405791 4629->4630 4632 4055ae 5 API calls 4630->4632 4631 4057f1 CharNextA 4631->4648 4633 40579d 4632->4633 4634 4057b7 4633->4634 4637 4057a1 4633->4637 4638 40501f 25 API calls 4634->4638 4635 405742 FindNextFileA 4639 40575a FindClose 4635->4639 4635->4648 4640 40501f 25 API calls 4637->4640 4637->4645 4638->4645 4639->4618 4641 4057ae 4640->4641 4642 405bea 40 API calls 4641->4642 4642->4645 4644 4055f6 64 API calls 4644->4648 4645->4326 4645->4327 4646 40501f 25 API calls 4646->4635 4647 40501f 25 API calls 4647->4648 4648->4631 4648->4635 4648->4644 4648->4646 4648->4647 4649 405bea 40 API calls 4648->4649 4651 405d36 lstrcpynA 4648->4651 4652 4055ae 4648->4652 4649->4648 4650->4620 4651->4648 4660 4059a2 GetFileAttributesA 4652->4660 4655 4055d1 DeleteFileA 4658 4055d7 4655->4658 4656 4055c9 RemoveDirectoryA 4656->4658 4657 4055db 4657->4648 4658->4657 4659 4055e7 SetFileAttributesA 4658->4659 4659->4657 4661 4055ba 4660->4661 4662 4059b4 SetFileAttributesA 4660->4662 4661->4655 4661->4656 4661->4657 4662->4661 4664 405a97 4663->4664 4665 405abd GetShortPathNameA 4663->4665 4688 4059c7 GetFileAttributesA CreateFileA 4664->4688 4667 405ad2 4665->4667 4668 405be4 4665->4668 4667->4668 4670 405ada wsprintfA 4667->4670 4668->4504 4669 405aa1 CloseHandle GetShortPathNameA 4669->4668 4671 405ab5 4669->4671 4672 405d58 18 API calls 4670->4672 4671->4665 4671->4668 4673 405b02 4672->4673 4689 4059c7 GetFileAttributesA CreateFileA 4673->4689 4675 405b0f 4675->4668 4676 405b1e GetFileSize GlobalAlloc 4675->4676 4677 405b40 4676->4677 4678 405bdd CloseHandle 4676->4678 4679 405a3f ReadFile 4677->4679 4678->4668 4680 405b48 4679->4680 4680->4678 4690 40592c lstrlenA 4680->4690 4683 405b73 4685 40592c 4 API calls 4683->4685 4684 405b5f lstrcpyA 4687 405b81 4684->4687 4685->4687 4686 405bb8 SetFilePointer WriteFile GlobalFree 4686->4678 4687->4686 4688->4669 4689->4675 4691 40596d lstrlenA 4690->4691 4692 405946 lstrcmpiA 4691->4692 4694 405975 4691->4694 4693 405964 CharNextA 4692->4693 4692->4694 4693->4691 4694->4683 4694->4684 5149 10001058 5151 10001074 5149->5151 5150 100010dc 5151->5150 5152 10001091 5151->5152 5153 100014bb GlobalFree 5151->5153 5154 100014bb GlobalFree 5152->5154 5153->5152 5155 100010a1 5154->5155 5156 100010b1 5155->5156 5157 100010a8 GlobalSize 5155->5157 5158 100010b5 GlobalAlloc 5156->5158 5159 100010c6 5156->5159 5157->5156 5160 100014e2 3 API calls 5158->5160 5161 100010d1 GlobalFree 5159->5161 5160->5159 5161->5150 4713 403b19 4714 403b31 4713->4714 4715 403c6c 4713->4715 4714->4715 4716 403b3d 4714->4716 4717 403c7d GetDlgItem GetDlgItem 4715->4717 4731 403cbd 4715->4731 4718 403b48 SetWindowPos 4716->4718 4719 403b5b 4716->4719 4783 403fec 4717->4783 4718->4719 4724 403b60 ShowWindow 4719->4724 4725 403b78 4719->4725 4721 403ca7 KiUserCallbackDispatcher 4726 40140b 2 API calls 4721->4726 4722 403d17 4723 404038 SendMessageA 4722->4723 4730 403c67 4722->4730 4751 403d29 4723->4751 4724->4725 4727 403b80 DestroyWindow 4725->4727 4728 403b9a 4725->4728 4726->4731 4732 403f75 4727->4732 4733 403bb0 4728->4733 4734 403b9f SetWindowLongA 4728->4734 4729 401389 2 API calls 4735 403cef 4729->4735 4731->4722 4731->4729 4732->4730 4744 403fa6 ShowWindow 4732->4744 4737 403c59 4733->4737 4738 403bbc GetDlgItem 4733->4738 4734->4730 4735->4722 4739 403cf3 SendMessageA 4735->4739 4736 403f77 DestroyWindow EndDialog 4736->4732 4792 404053 4737->4792 4741 403bec 4738->4741 4742 403bcf SendMessageA IsWindowEnabled 4738->4742 4739->4730 4740 40140b 2 API calls 4740->4751 4746 403bf9 4741->4746 4748 403c40 SendMessageA 4741->4748 4749 403c0c 4741->4749 4757 403bf1 4741->4757 4742->4730 4742->4741 4744->4730 4745 405d58 18 API calls 4745->4751 4746->4748 4746->4757 4748->4737 4752 403c14 4749->4752 4753 403c29 4749->4753 4750 403c27 4750->4737 4751->4730 4751->4736 4751->4740 4751->4745 4754 403fec 19 API calls 4751->4754 4759 403fec 19 API calls 4751->4759 4774 403eb7 DestroyWindow 4751->4774 4756 40140b 2 API calls 4752->4756 4755 40140b 2 API calls 4753->4755 4754->4751 4758 403c30 4755->4758 4756->4757 4789 403fc5 4757->4789 4758->4737 4758->4757 4760 403da4 GetDlgItem 4759->4760 4761 403dc1 ShowWindow KiUserCallbackDispatcher 4760->4761 4762 403db9 4760->4762 4786 40400e KiUserCallbackDispatcher 4761->4786 4762->4761 4764 403deb EnableWindow 4767 403dff 4764->4767 4765 403e04 GetSystemMenu EnableMenuItem SendMessageA 4766 403e34 SendMessageA 4765->4766 4765->4767 4766->4767 4767->4765 4787 404021 SendMessageA 4767->4787 4788 405d36 lstrcpynA 4767->4788 4770 403e62 lstrlenA 4771 405d58 18 API calls 4770->4771 4772 403e73 SetWindowTextA 4771->4772 4773 401389 2 API calls 4772->4773 4773->4751 4774->4732 4775 403ed1 CreateDialogParamA 4774->4775 4775->4732 4776 403f04 4775->4776 4777 403fec 19 API calls 4776->4777 4778 403f0f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4777->4778 4779 401389 2 API calls 4778->4779 4780 403f55 4779->4780 4780->4730 4781 403f5d ShowWindow 4780->4781 4782 404038 SendMessageA 4781->4782 4782->4732 4784 405d58 18 API calls 4783->4784 4785 403ff7 SetDlgItemTextA 4784->4785 4785->4721 4786->4764 4787->4767 4788->4770 4790 403fd2 SendMessageA 4789->4790 4791 403fcc 4789->4791 4790->4750 4791->4790 4793 40406b GetWindowLongA 4792->4793 4794 4040f4 4792->4794 4793->4794 4795 40407c 4793->4795 4794->4730 4796 40408b GetSysColor 4795->4796 4797 40408e 4795->4797 4796->4797 4798 404094 SetTextColor 4797->4798 4799 40409e SetBkMode 4797->4799 4798->4799 4800 4040b6 GetSysColor 4799->4800 4801 4040bc 4799->4801 4800->4801 4802 4040c3 SetBkColor 4801->4802 4803 4040cd 4801->4803 4802->4803 4803->4794 4804 4040e0 DeleteObject 4803->4804 4805 4040e7 CreateBrushIndirect 4803->4805 4804->4805 4805->4794 4806 402519 4807 4029e0 18 API calls 4806->4807 4811 402523 4807->4811 4808 40258d 4809 405a3f ReadFile 4809->4811 4810 40258f 4815 405c94 wsprintfA 4810->4815 4811->4808 4811->4809 4811->4810 4812 40259f 4811->4812 4812->4808 4814 4025b5 SetFilePointer 4812->4814 4814->4808 4815->4808 4841 40231c 4842 402322 4841->4842 4843 4029fd 18 API calls 4842->4843 4844 402334 4843->4844 4845 4029fd 18 API calls 4844->4845 4846 40233e RegCreateKeyExA 4845->4846 4847 402663 4846->4847 4848 402368 4846->4848 4849 402380 4848->4849 4850 4029fd 18 API calls 4848->4850 4851 40238c 4849->4851 4853 4029e0 18 API calls 4849->4853 4852 402379 lstrlenA 4850->4852 4854 4023a7 RegSetValueExA 4851->4854 4855 402f1f 46 API calls 4851->4855 4852->4849 4853->4851 4856 4023bd RegCloseKey 4854->4856 4855->4854 4856->4847 5169 40261c 5170 402637 5169->5170 5171 40261f 5169->5171 5172 4027bd 5170->5172 5175 405d36 lstrcpynA 5170->5175 5173 40262c FindNextFileA 5171->5173 5173->5170 5175->5172 5502 40499c GetDlgItem GetDlgItem 5503 4049ee 7 API calls 5502->5503 5512 404c06 5502->5512 5504 404a91 DeleteObject 5503->5504 5505 404a84 SendMessageA 5503->5505 5506 404a9a 5504->5506 5505->5504 5507 404ad1 5506->5507 5511 405d58 18 API calls 5506->5511 5509 403fec 19 API calls 5507->5509 5508 404cea 5510 404d96 5508->5510 5521 404d43 SendMessageA 5508->5521 5545 404bf9 5508->5545 5513 404ae5 5509->5513 5515 404da0 SendMessageA 5510->5515 5516 404da8 5510->5516 5517 404ab3 SendMessageA SendMessageA 5511->5517 5512->5508 5514 404c77 5512->5514 5519 4048ea 5 API calls 5512->5519 5520 403fec 19 API calls 5513->5520 5514->5508 5523 404cdc SendMessageA 5514->5523 5515->5516 5518 404dd1 5516->5518 5524 404dc1 5516->5524 5525 404dba ImageList_Destroy 5516->5525 5517->5506 5527 404f40 5518->5527 5544 40496a 4 API calls 5518->5544 5549 404e0c 5518->5549 5519->5514 5526 404af3 5520->5526 5528 404d58 SendMessageA 5521->5528 5521->5545 5522 404053 8 API calls 5529 404f8c 5522->5529 5523->5508 5524->5518 5530 404dca GlobalFree 5524->5530 5525->5524 5531 404bc7 GetWindowLongA SetWindowLongA 5526->5531 5539 404b42 SendMessageA 5526->5539 5541 404bc1 5526->5541 5542 404b7e SendMessageA 5526->5542 5543 404b8f SendMessageA 5526->5543 5533 404f52 ShowWindow GetDlgItem ShowWindow 5527->5533 5527->5545 5536 404d6b 5528->5536 5530->5518 5532 404be0 5531->5532 5534 404be6 ShowWindow 5532->5534 5535 404bfe 5532->5535 5533->5545 5553 404021 SendMessageA 5534->5553 5554 404021 SendMessageA 5535->5554 5540 404d7c SendMessageA 5536->5540 5539->5526 5540->5510 5541->5531 5541->5532 5542->5526 5543->5526 5544->5549 5545->5522 5546 404f16 InvalidateRect 5546->5527 5547 404f2c 5546->5547 5550 4048a5 21 API calls 5547->5550 5548 404e3a SendMessageA 5552 404e50 5548->5552 5549->5548 5549->5552 5550->5527 5551 404ec4 SendMessageA SendMessageA 5551->5552 5552->5546 5552->5551 5553->5545 5554->5512 5555 100010e0 5564 1000110e 5555->5564 5556 100011c4 GlobalFree 5557 100012ad 2 API calls 5557->5564 5558 100011c3 5558->5556 5559 10001155 GlobalAlloc 5559->5564 5560 100011ea GlobalFree 5560->5564 5561 10001266 2 API calls 5562 100011b1 GlobalFree 5561->5562 5562->5564 5563 100012d1 lstrcpyA 5563->5564 5564->5556 5564->5557 5564->5558 5564->5559 5564->5560 5564->5561 5564->5562 5564->5563 5565 4016a1 5566 4029fd 18 API calls 5565->5566 5567 4016a7 GetFullPathNameA 5566->5567 5568 4016df 5567->5568 5569 4016be 5567->5569 5570 402892 5568->5570 5571 4016f3 GetShortPathNameA 5568->5571 5569->5568 5572 40603a 2 API calls 5569->5572 5571->5570 5573 4016cf 5572->5573 5573->5568 5575 405d36 lstrcpynA 5573->5575 5575->5568 5176 10002162 5177 100021c0 5176->5177 5178 100021f6 5176->5178 5177->5178 5179 100021d2 GlobalAlloc 5177->5179 5179->5177 5180 401d26 GetDC GetDeviceCaps 5181 4029e0 18 API calls 5180->5181 5182 401d44 MulDiv ReleaseDC 5181->5182 5183 4029e0 18 API calls 5182->5183 5184 401d63 5183->5184 5185 405d58 18 API calls 5184->5185 5186 401d9c CreateFontIndirectA 5185->5186 5187 4024cb 5186->5187 5188 40442a 5189 404456 5188->5189 5190 404467 5188->5190 5249 40552e GetDlgItemTextA 5189->5249 5192 404473 GetDlgItem 5190->5192 5195 4044d2 5190->5195 5194 404487 5192->5194 5193 404461 5196 405fa1 5 API calls 5193->5196 5198 40449b SetWindowTextA 5194->5198 5203 40585f 4 API calls 5194->5203 5199 405d58 18 API calls 5195->5199 5209 4045b6 5195->5209 5247 40475f 5195->5247 5196->5190 5201 403fec 19 API calls 5198->5201 5204 404546 SHBrowseForFolderA 5199->5204 5200 4045e6 5205 4058b4 18 API calls 5200->5205 5206 4044b7 5201->5206 5202 404053 8 API calls 5207 404773 5202->5207 5208 404491 5203->5208 5204->5209 5210 40455e CoTaskMemFree 5204->5210 5211 4045ec 5205->5211 5212 403fec 19 API calls 5206->5212 5208->5198 5213 4057c6 3 API calls 5208->5213 5209->5247 5251 40552e GetDlgItemTextA 5209->5251 5214 4057c6 3 API calls 5210->5214 5252 405d36 lstrcpynA 5211->5252 5215 4044c5 5212->5215 5213->5198 5216 40456b 5214->5216 5250 404021 SendMessageA 5215->5250 5219 4045a2 SetDlgItemTextA 5216->5219 5224 405d58 18 API calls 5216->5224 5219->5209 5220 4044cb 5222 406061 3 API calls 5220->5222 5221 404603 5223 406061 3 API calls 5221->5223 5222->5195 5231 40460b 5223->5231 5225 40458a lstrcmpiA 5224->5225 5225->5219 5228 40459b lstrcatA 5225->5228 5226 404645 5253 405d36 lstrcpynA 5226->5253 5228->5219 5229 40464e 5230 40585f 4 API calls 5229->5230 5232 404654 GetDiskFreeSpaceA 5230->5232 5231->5226 5234 40580d 2 API calls 5231->5234 5236 40469d 5231->5236 5235 404676 MulDiv 5232->5235 5232->5236 5234->5231 5235->5236 5237 40470e 5236->5237 5254 4048a5 5236->5254 5239 404731 5237->5239 5240 40140b 2 API calls 5237->5240 5265 40400e KiUserCallbackDispatcher 5239->5265 5240->5239 5243 404710 SetDlgItemTextA 5243->5237 5244 404700 5257 4047e0 5244->5257 5245 40474d 5245->5247 5266 4043bf 5245->5266 5247->5202 5249->5193 5250->5220 5251->5200 5252->5221 5253->5229 5255 4047e0 21 API calls 5254->5255 5256 4046fb 5255->5256 5256->5243 5256->5244 5258 4047f6 5257->5258 5259 405d58 18 API calls 5258->5259 5260 40485a 5259->5260 5261 405d58 18 API calls 5260->5261 5262 404865 5261->5262 5263 405d58 18 API calls 5262->5263 5264 40487b lstrlenA wsprintfA SetDlgItemTextA 5263->5264 5264->5237 5265->5245 5267 4043d2 SendMessageA 5266->5267 5268 4043cd 5266->5268 5267->5247 5268->5267 4178 40172c 4179 4029fd 18 API calls 4178->4179 4180 401733 4179->4180 4184 4059f6 4180->4184 4182 40173a 4183 4059f6 2 API calls 4182->4183 4183->4182 4185 405a01 GetTickCount GetTempFileNameA 4184->4185 4186 405a32 4185->4186 4187 405a2e 4185->4187 4186->4182 4187->4185 4187->4186 4188 401dac 4196 4029e0 4188->4196 4190 401db2 4191 4029e0 18 API calls 4190->4191 4192 401dbb 4191->4192 4193 401dc2 ShowWindow 4192->4193 4194 401dcd EnableWindow 4192->4194 4195 402892 4193->4195 4194->4195 4197 405d58 18 API calls 4196->4197 4198 4029f4 4197->4198 4198->4190 5576 401eac 5577 4029fd 18 API calls 5576->5577 5578 401eb3 5577->5578 5579 40603a 2 API calls 5578->5579 5580 401eb9 5579->5580 5582 401ecb 5580->5582 5583 405c94 wsprintfA 5580->5583 5583->5582 5269 40192d 5270 4029fd 18 API calls 5269->5270 5271 401934 lstrlenA 5270->5271 5272 4024cb 5271->5272 5584 4024af 5585 4029fd 18 API calls 5584->5585 5586 4024b6 5585->5586 5589 4059c7 GetFileAttributesA CreateFileA 5586->5589 5588 4024c2 5589->5588 5597 401cb0 5598 4029e0 18 API calls 5597->5598 5599 401cc0 SetWindowLongA 5598->5599 5600 402892 5599->5600 5273 401a31 5274 4029e0 18 API calls 5273->5274 5275 401a37 5274->5275 5276 4029e0 18 API calls 5275->5276 5277 4019e1 5276->5277 4211 401e32 4212 4029fd 18 API calls 4211->4212 4213 401e38 4212->4213 4214 40501f 25 API calls 4213->4214 4215 401e42 4214->4215 4226 4054e5 CreateProcessA 4215->4226 4217 401e9e CloseHandle 4219 402663 4217->4219 4218 401e67 WaitForSingleObject 4220 401e48 4218->4220 4221 401e75 GetExitCodeProcess 4218->4221 4220->4217 4220->4218 4220->4219 4229 40609a 4220->4229 4223 401e90 4221->4223 4224 401e87 4221->4224 4223->4217 4233 405c94 wsprintfA 4224->4233 4227 405524 4226->4227 4228 405518 CloseHandle 4226->4228 4227->4220 4228->4227 4230 4060b7 PeekMessageA 4229->4230 4231 4060c7 4230->4231 4232 4060ad DispatchMessageA 4230->4232 4231->4218 4232->4230 4233->4223 4243 4015b3 4244 4029fd 18 API calls 4243->4244 4245 4015ba 4244->4245 4261 40585f CharNextA CharNextA 4245->4261 4247 40160a 4249 401638 4247->4249 4250 40160f 4247->4250 4248 4057f1 CharNextA 4251 4015d0 CreateDirectoryA 4248->4251 4254 401423 25 API calls 4249->4254 4252 401423 25 API calls 4250->4252 4253 4015e5 GetLastError 4251->4253 4258 4015c2 4251->4258 4255 401616 4252->4255 4257 4015f2 GetFileAttributesA 4253->4257 4253->4258 4260 401630 4254->4260 4267 405d36 lstrcpynA 4255->4267 4257->4258 4258->4247 4258->4248 4259 401621 SetCurrentDirectoryA 4259->4260 4262 40587a 4261->4262 4265 40588a 4261->4265 4264 405885 CharNextA 4262->4264 4262->4265 4263 4058aa 4263->4258 4264->4263 4265->4263 4266 4057f1 CharNextA 4265->4266 4266->4265 4267->4259 5601 4026b3 5621 4059c7 GetFileAttributesA CreateFileA 5601->5621 5603 4026ba 5604 402763 5603->5604 5605 4026c6 GlobalAlloc 5603->5605 5608 40276b DeleteFileA 5604->5608 5609 40277e 5604->5609 5606 40275a CloseHandle 5605->5606 5607 4026df 5605->5607 5606->5604 5622 4031cc SetFilePointer 5607->5622 5608->5609 5611 4026e5 5612 4031b6 ReadFile 5611->5612 5613 4026ee GlobalAlloc 5612->5613 5614 402732 WriteFile GlobalFree 5613->5614 5615 4026fe 5613->5615 5616 402f1f 46 API calls 5614->5616 5617 402f1f 46 API calls 5615->5617 5618 402757 5616->5618 5619 40270b 5617->5619 5618->5606 5620 402729 GlobalFree 5619->5620 5620->5614 5621->5603 5622->5611 5278 404135 5279 40414b 5278->5279 5284 404257 5278->5284 5282 403fec 19 API calls 5279->5282 5280 4042c6 5281 4042d0 GetDlgItem 5280->5281 5285 40439a 5280->5285 5288 4042e6 5281->5288 5289 404358 5281->5289 5283 4041a1 5282->5283 5287 403fec 19 API calls 5283->5287 5284->5280 5284->5285 5290 40429b GetDlgItem SendMessageA 5284->5290 5286 404053 8 API calls 5285->5286 5291 404395 5286->5291 5292 4041ae CheckDlgButton 5287->5292 5288->5289 5293 40430c 6 API calls 5288->5293 5289->5285 5294 40436a 5289->5294 5309 40400e KiUserCallbackDispatcher 5290->5309 5307 40400e KiUserCallbackDispatcher 5292->5307 5293->5289 5297 404370 SendMessageA 5294->5297 5298 404381 5294->5298 5297->5298 5298->5291 5302 404387 SendMessageA 5298->5302 5299 4042c1 5300 4043bf SendMessageA 5299->5300 5300->5280 5301 4041cc GetDlgItem 5308 404021 SendMessageA 5301->5308 5302->5291 5304 4041e2 SendMessageA 5305 404200 GetSysColor 5304->5305 5306 404209 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5304->5306 5305->5306 5306->5291 5307->5301 5308->5304 5309->5299 4272 402036 4273 4029fd 18 API calls 4272->4273 4274 40203d 4273->4274 4275 4029fd 18 API calls 4274->4275 4276 402047 4275->4276 4277 4029fd 18 API calls 4276->4277 4278 402051 4277->4278 4279 4029fd 18 API calls 4278->4279 4280 40205b 4279->4280 4281 4029fd 18 API calls 4280->4281 4282 402064 4281->4282 4283 40207a CoCreateInstance 4282->4283 4284 4029fd 18 API calls 4282->4284 4287 402099 4283->4287 4288 40214d 4283->4288 4284->4283 4285 401423 25 API calls 4286 402181 4285->4286 4287->4288 4289 40212f MultiByteToWideChar 4287->4289 4288->4285 4288->4286 4289->4288 5623 4014b7 5624 4014bd 5623->5624 5625 401389 2 API calls 5624->5625 5626 4014c5 5625->5626 5627 401bb8 5628 4029e0 18 API calls 5627->5628 5629 401bbf 5628->5629 5630 4029e0 18 API calls 5629->5630 5631 401bc9 5630->5631 5632 401bd9 5631->5632 5634 4029fd 18 API calls 5631->5634 5633 401be9 5632->5633 5635 4029fd 18 API calls 5632->5635 5636 401bf4 5633->5636 5637 401c38 5633->5637 5634->5632 5635->5633 5638 4029e0 18 API calls 5636->5638 5639 4029fd 18 API calls 5637->5639 5640 401bf9 5638->5640 5641 401c3d 5639->5641 5642 4029e0 18 API calls 5640->5642 5643 4029fd 18 API calls 5641->5643 5644 401c02 5642->5644 5645 401c46 FindWindowExA 5643->5645 5646 401c28 SendMessageA 5644->5646 5647 401c0a SendMessageTimeoutA 5644->5647 5648 401c64 5645->5648 5646->5648 5647->5648 4816 40243a 4827 402b07 4816->4827 4818 402444 4819 4029e0 18 API calls 4818->4819 4820 40244d 4819->4820 4821 402457 4820->4821 4825 402663 4820->4825 4822 402470 RegEnumValueA 4821->4822 4823 402464 RegEnumKeyA 4821->4823 4824 402489 RegCloseKey 4822->4824 4822->4825 4823->4824 4824->4825 4828 4029fd 18 API calls 4827->4828 4829 402b20 4828->4829 4830 402b2e RegOpenKeyExA 4829->4830 4830->4818 4831 40223b 4832 402243 4831->4832 4833 402249 4831->4833 4834 4029fd 18 API calls 4832->4834 4835 402259 4833->4835 4837 4029fd 18 API calls 4833->4837 4834->4833 4836 402267 4835->4836 4838 4029fd 18 API calls 4835->4838 4839 4029fd 18 API calls 4836->4839 4837->4835 4838->4836 4840 402270 WritePrivateProfileStringA 4839->4840 4915 40173f 4916 4029fd 18 API calls 4915->4916 4917 401746 4916->4917 4918 401764 4917->4918 4919 40176c 4917->4919 4954 405d36 lstrcpynA 4918->4954 4955 405d36 lstrcpynA 4919->4955 4922 401777 4924 4057c6 3 API calls 4922->4924 4923 40176a 4926 405fa1 5 API calls 4923->4926 4925 40177d lstrcatA 4924->4925 4925->4923 4948 401789 4926->4948 4927 40603a 2 API calls 4927->4948 4929 4059a2 2 API calls 4929->4948 4930 4017a0 CompareFileTime 4930->4948 4931 401864 4933 40501f 25 API calls 4931->4933 4932 40183b 4934 40501f 25 API calls 4932->4934 4942 401850 4932->4942 4935 40186e 4933->4935 4934->4942 4936 402f1f 46 API calls 4935->4936 4938 401881 4936->4938 4937 405d36 lstrcpynA 4937->4948 4939 401895 SetFileTime 4938->4939 4941 4018a7 CloseHandle 4938->4941 4939->4941 4940 405d58 18 API calls 4940->4948 4941->4942 4943 4018b8 4941->4943 4944 4018d0 4943->4944 4945 4018bd 4943->4945 4947 405d58 18 API calls 4944->4947 4946 405d58 18 API calls 4945->4946 4949 4018c5 lstrcatA 4946->4949 4950 4018d8 4947->4950 4948->4927 4948->4929 4948->4930 4948->4931 4948->4932 4948->4937 4948->4940 4951 40554a MessageBoxIndirectA 4948->4951 4953 4059c7 GetFileAttributesA CreateFileA 4948->4953 4949->4950 4952 40554a MessageBoxIndirectA 4950->4952 4951->4948 4952->4942 4953->4948 4954->4923 4955->4922 5310 40163f 5311 4029fd 18 API calls 5310->5311 5312 401645 5311->5312 5313 40603a 2 API calls 5312->5313 5314 40164b 5313->5314 5315 40193f 5316 4029e0 18 API calls 5315->5316 5317 401946 5316->5317 5318 4029e0 18 API calls 5317->5318 5319 401950 5318->5319 5320 4029fd 18 API calls 5319->5320 5321 401959 5320->5321 5322 40196c lstrlenA 5321->5322 5323 4019a7 5321->5323 5324 401976 5322->5324 5324->5323 5328 405d36 lstrcpynA 5324->5328 5326 401990 5326->5323 5327 40199d lstrlenA 5326->5327 5327->5323 5328->5326

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 0 403217-4032ae #17 SetErrorMode OleInitialize call 406061 SHGetFileInfoA call 405d36 GetCommandLineA call 405d36 GetModuleHandleA 7 4032b0-4032b5 0->7 8 4032ba-4032cf call 4057f1 CharNextA 0->8 7->8 11 403394-403398 8->11 12 4032d4-4032d7 11->12 13 40339e 11->13 14 4032d9-4032dd 12->14 15 4032df-4032e7 12->15 16 4033b1-4033cb GetTempPathA call 4031e3 13->16 14->14 14->15 17 4032e9-4032ea 15->17 18 4032ef-4032f2 15->18 26 403423-40343d DeleteFileA call 402c79 16->26 27 4033cd-4033eb GetWindowsDirectoryA lstrcatA call 4031e3 16->27 17->18 20 403384-403391 call 4057f1 18->20 21 4032f8-4032fc 18->21 20->11 39 403393 20->39 24 403314-403341 21->24 25 4032fe-403304 21->25 28 403343-403349 24->28 29 403354-403382 24->29 33 403306-403308 25->33 34 40330a 25->34 42 4034d1-4034e0 call 403695 OleUninitialize 26->42 43 403443-403449 26->43 27->26 41 4033ed-40341d GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031e3 27->41 35 40334b-40334d 28->35 36 40334f 28->36 29->20 38 4033a0-4033ac call 405d36 29->38 33->24 33->34 34->24 35->29 35->36 36->29 38->16 39->11 41->26 41->42 55 4034e6-4034f6 call 40554a ExitProcess 42->55 56 4035da-4035e0 42->56 46 4034c1-4034c8 call 403787 43->46 47 40344b-403456 call 4057f1 43->47 53 4034cd 46->53 59 403458-403481 47->59 60 40348c-403496 47->60 53->42 57 4035e6-403603 call 406061 * 3 56->57 58 40367d-403685 56->58 87 403605-403607 57->87 88 40364d-40365b call 406061 57->88 65 403687 58->65 66 40368b-40368f ExitProcess 58->66 68 403483-403485 59->68 62 403498-4034a5 call 4058b4 60->62 63 4034fc-403516 lstrcatA lstrcmpiA 60->63 62->42 77 4034a7-4034bd call 405d36 * 2 62->77 63->42 70 403518-40352d CreateDirectoryA SetCurrentDirectoryA 63->70 65->66 68->60 72 403487-40348a 68->72 74 40353a-403562 call 405d36 70->74 75 40352f-403535 call 405d36 70->75 72->60 72->68 85 403568-403584 call 405d58 DeleteFileA 74->85 75->74 77->46 97 4035c5-4035cc 85->97 98 403586-403596 CopyFileA 85->98 87->88 91 403609-40360b 87->91 100 403669-403674 ExitWindowsEx 88->100 101 40365d-403667 88->101 91->88 95 40360d-40361f GetCurrentProcess 91->95 95->88 108 403621-403643 95->108 97->85 99 4035ce-4035d5 call 405bea 97->99 98->97 102 403598-4035b8 call 405bea call 405d58 call 4054e5 98->102 99->42 100->58 103 403676-403678 call 40140b 100->103 101->100 101->103 102->97 117 4035ba-4035c1 CloseHandle 102->117 103->58 108->88 117->97
                        APIs
                        • #17.COMCTL32 ref: 00403238
                        • SetErrorMode.KERNELBASE(00008001), ref: 00403243
                        • OleInitialize.OLE32(00000000), ref: 0040324A
                          • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                          • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                          • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                        • SHGetFileInfoA.SHELL32(0041ECB8,00000000,?,?,00000000,00000009), ref: 00403272
                          • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                        • GetCommandLineA.KERNEL32(00422F00,NSIS Error), ref: 00403287
                        • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\ORDER.exe",00000000), ref: 0040329A
                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\ORDER.exe",00000020), ref: 004032C5
                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033C2
                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033D3
                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033DF
                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033F3
                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033FB
                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040340C
                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403414
                        • DeleteFileA.KERNELBASE(1033), ref: 00403428
                        • OleUninitialize.OLE32(?), ref: 004034D6
                        • ExitProcess.KERNEL32 ref: 004034F6
                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\ORDER.exe",00000000,?), ref: 00403502
                        • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 0040350E
                        • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040351A
                        • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403521
                        • DeleteFileA.KERNEL32(0041E8B8,0041E8B8,?,00424000,?), ref: 0040357A
                        • CopyFileA.KERNEL32(C:\Users\user\Desktop\ORDER.exe,0041E8B8,?), ref: 0040358E
                        • CloseHandle.KERNEL32(00000000,0041E8B8,0041E8B8,?,0041E8B8,00000000), ref: 004035BB
                        • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 00403614
                        • ExitWindowsEx.USER32(00000002,80040002), ref: 0040366C
                        • ExitProcess.KERNEL32 ref: 0040368F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                        • String ID: "$"C:\Users\user\Desktop\ORDER.exe"$1033$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ORDER.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                        • API String ID: 4107622049-2861759745
                        • Opcode ID: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                        • Instruction ID: 3d26bb40307c87b2cd60c260c775e6d0301d96a10e68b952128d49a18977981a
                        • Opcode Fuzzy Hash: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                        • Instruction Fuzzy Hash: 85B107706082517AE721AF659D8DA2B3EACEB41706F04447FF541BA1E2C77C9E01CB6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 118 40515d-405179 119 405308-40530e 118->119 120 40517f-405246 GetDlgItem * 3 call 404021 call 4048bd GetClientRect GetSystemMetrics SendMessageA * 2 118->120 122 405310-405332 GetDlgItem CreateThread CloseHandle 119->122 123 405338-405344 119->123 138 405264-405267 120->138 139 405248-405262 SendMessageA * 2 120->139 122->123 125 405366-40536c 123->125 126 405346-40534c 123->126 130 4053c1-4053c4 125->130 131 40536e-405374 125->131 128 405387-40538e call 404053 126->128 129 40534e-405361 ShowWindow * 2 call 404021 126->129 142 405393-405397 128->142 129->125 130->128 133 4053c6-4053cc 130->133 135 405376-405382 call 403fc5 131->135 136 40539a-4053aa ShowWindow 131->136 133->128 140 4053ce-4053e1 SendMessageA 133->140 135->128 143 4053ba-4053bc call 403fc5 136->143 144 4053ac-4053b5 call 40501f 136->144 147 405277-40528e call 403fec 138->147 148 405269-405275 SendMessageA 138->148 139->138 149 4053e7-405413 CreatePopupMenu call 405d58 AppendMenuA 140->149 150 4054de-4054e0 140->150 143->130 144->143 157 405290-4052a4 ShowWindow 147->157 158 4052c4-4052e5 GetDlgItem SendMessageA 147->158 148->147 155 405415-405425 GetWindowRect 149->155 156 405428-40543e TrackPopupMenu 149->156 150->142 155->156 156->150 160 405444-40545e 156->160 161 4052b3 157->161 162 4052a6-4052b1 ShowWindow 157->162 158->150 159 4052eb-405303 SendMessageA * 2 158->159 159->150 163 405463-40547e SendMessageA 160->163 164 4052b9-4052bf call 404021 161->164 162->164 163->163 165 405480-4054a0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 163->165 164->158 167 4054a2-4054c2 SendMessageA 165->167 167->167 168 4054c4-4054d8 GlobalUnlock SetClipboardData CloseClipboard 167->168 168->150
                        APIs
                        • GetDlgItem.USER32(?,00000403), ref: 004051BC
                        • GetDlgItem.USER32(?,000003EE), ref: 004051CB
                        • GetClientRect.USER32(?,?), ref: 00405208
                        • GetSystemMetrics.USER32(00000002), ref: 0040520F
                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405230
                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405241
                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405254
                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405262
                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405275
                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405297
                        • ShowWindow.USER32(?,?), ref: 004052AB
                        • GetDlgItem.USER32(?,000003EC), ref: 004052CC
                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004052DC
                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052F5
                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405301
                        • GetDlgItem.USER32(?,000003F8), ref: 004051DA
                          • Part of subcall function 00404021: SendMessageA.USER32(?,?,?,00403E52), ref: 0040402F
                        • GetDlgItem.USER32(?,000003EC), ref: 0040531D
                        • CreateThread.KERNELBASE(00000000,00000000,Function_000050F1,00000000), ref: 0040532B
                        • CloseHandle.KERNELBASE(00000000), ref: 00405332
                        • ShowWindow.USER32(00000000), ref: 00405355
                        • ShowWindow.USER32(?,?), ref: 0040535C
                        • ShowWindow.USER32(?), ref: 004053A2
                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004053D6
                        • CreatePopupMenu.USER32 ref: 004053E7
                        • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004053FC
                        • GetWindowRect.USER32(?,000000FF), ref: 0040541C
                        • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405435
                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405471
                        • OpenClipboard.USER32(00000000), ref: 00405481
                        • EmptyClipboard.USER32 ref: 00405487
                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405490
                        • GlobalLock.KERNEL32(00000000), ref: 0040549A
                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054AE
                        • GlobalUnlock.KERNEL32(00000000), ref: 004054C7
                        • SetClipboardData.USER32(?,00000000), ref: 004054D2
                        • CloseClipboard.USER32 ref: 004054D8
                        Strings
                        • Stvkonsekvenserne115 Setup: Installing, xrefs: 0040544D
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                        • String ID: Stvkonsekvenserne115 Setup: Installing
                        • API String ID: 590372296-147676709
                        • Opcode ID: ddce3f407c61e1ebc3cac1cca45d68d18475e72ad548d40fcbdeb08d48be2a44
                        • Instruction ID: 24acf85f457993e5d1a00f4a74fbc0a00d7f38a893508f9c9f1f5035b4e63235
                        • Opcode Fuzzy Hash: ddce3f407c61e1ebc3cac1cca45d68d18475e72ad548d40fcbdeb08d48be2a44
                        • Instruction Fuzzy Hash: 5FA15BB1900208BFDB219FA0DD89AAE7F79FB08355F10407AFA04B61A0C7B55E51DF69

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 414 405d58-405d63 415 405d65-405d74 414->415 416 405d76-405d8b 414->416 415->416 417 405d91-405d9c 416->417 418 405f7e-405f82 416->418 417->418 421 405da2-405da9 417->421 419 405f88-405f92 418->419 420 405dae-405db8 418->420 423 405f94-405f98 call 405d36 419->423 424 405f9d-405f9e 419->424 420->419 422 405dbe-405dc5 420->422 421->418 425 405f71 422->425 426 405dcb-405e00 422->426 423->424 428 405f73-405f79 425->428 429 405f7b-405f7d 425->429 430 405e06-405e11 GetVersion 426->430 431 405f1b-405f1e 426->431 428->418 429->418 432 405e13-405e17 430->432 433 405e2b 430->433 434 405f20-405f23 431->434 435 405f4e-405f51 431->435 432->433 436 405e19-405e1d 432->436 439 405e32-405e39 433->439 437 405f33-405f3f call 405d36 434->437 438 405f25-405f31 call 405c94 434->438 440 405f53-405f5a call 405d58 435->440 441 405f5f-405f6f lstrlenA 435->441 436->433 443 405e1f-405e23 436->443 452 405f44-405f4a 437->452 438->452 445 405e3b-405e3d 439->445 446 405e3e-405e40 439->446 440->441 441->418 443->433 448 405e25-405e29 443->448 445->446 450 405e42-405e5d call 405c1d 446->450 451 405e79-405e7c 446->451 448->439 460 405e62-405e65 450->460 453 405e8c-405e8f 451->453 454 405e7e-405e8a GetSystemDirectoryA 451->454 452->441 456 405f4c 452->456 458 405e91-405e9f GetWindowsDirectoryA 453->458 459 405ef9-405efb 453->459 457 405efd-405f00 454->457 461 405f13-405f19 call 405fa1 456->461 457->461 462 405f02-405f06 457->462 458->459 459->457 464 405ea1-405eab 459->464 460->462 465 405e6b-405e74 call 405d58 460->465 461->441 462->461 467 405f08-405f0e lstrcatA 462->467 469 405ec5-405edb SHGetSpecialFolderLocation 464->469 470 405ead-405eb0 464->470 465->457 467->461 473 405ef6 469->473 474 405edd-405ef4 SHGetPathFromIDListA CoTaskMemFree 469->474 470->469 472 405eb2-405eb9 470->472 475 405ec1-405ec3 472->475 473->459 474->457 474->473 475->457 475->469
                        APIs
                        • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00405057,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000), ref: 00405E09
                        • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405E84
                        • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405E97
                        • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405ED3
                        • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00405EE1
                        • CoTaskMemFree.OLE32(00000000), ref: 00405EEC
                        • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F0E
                        • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00405057,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000), ref: 00405F60
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                        • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                        • API String ID: 900638850-1732742390
                        • Opcode ID: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                        • Instruction ID: 9c0e267699f90c8e910d98bdf84d4b8f2614ab6024826f89c9d009b20b1e8bc4
                        • Opcode Fuzzy Hash: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                        • Instruction Fuzzy Hash: 10610571A04905ABDF215F64DC84B7B3BA8DB55304F10813BE641B62D1D33C4A42DF9E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 676 4055f6-40561c call 4058b4 679 405635-40563c 676->679 680 40561e-405630 DeleteFileA 676->680 682 40563e-405640 679->682 683 40564f-40565f call 405d36 679->683 681 4057bf-4057c3 680->681 684 405646-405649 682->684 685 40576d-405772 682->685 689 405661-40566c lstrcatA 683->689 690 40566e-40566f call 40580d 683->690 684->683 684->685 685->681 688 405774-405777 685->688 691 405781-405789 call 40603a 688->691 692 405779-40577f 688->692 693 405674-405677 689->693 690->693 691->681 699 40578b-40579f call 4057c6 call 4055ae 691->699 692->681 697 405682-405688 lstrcatA 693->697 698 405679-405680 693->698 700 40568d-4056ab lstrlenA FindFirstFileA 697->700 698->697 698->700 714 4057a1-4057a4 699->714 715 4057b7-4057ba call 40501f 699->715 702 4056b1-4056c8 call 4057f1 700->702 703 405763-405767 700->703 710 4056d3-4056d6 702->710 711 4056ca-4056ce 702->711 703->685 705 405769 703->705 705->685 712 4056d8-4056dd 710->712 713 4056e9-4056f7 call 405d36 710->713 711->710 716 4056d0 711->716 717 405742-405754 FindNextFileA 712->717 718 4056df-4056e1 712->718 726 4056f9-405701 713->726 727 40570e-405719 call 4055ae 713->727 714->692 720 4057a6-4057b5 call 40501f call 405bea 714->720 715->681 716->710 717->702 724 40575a-40575d FindClose 717->724 718->713 722 4056e3-4056e7 718->722 720->681 722->713 722->717 724->703 726->717 729 405703-40570c call 4055f6 726->729 736 40573a-40573d call 40501f 727->736 737 40571b-40571e 727->737 729->717 736->717 739 405720-405730 call 40501f call 405bea 737->739 740 405732-405738 737->740 739->717 740->717
                        APIs
                        • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040561F
                        • lstrcatA.KERNEL32(00420D00,\*.*,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405667
                        • lstrcatA.KERNEL32(?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405688
                        • lstrlenA.KERNEL32(?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040568E
                        • FindFirstFileA.KERNELBASE(00420D00,?,?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040569F
                        • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040574C
                        • FindClose.KERNEL32(00000000), ref: 0040575D
                        Strings
                        • \*.*, xrefs: 00405661
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405604
                        • "C:\Users\user\Desktop\ORDER.exe", xrefs: 004055F6
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                        • String ID: "C:\Users\user\Desktop\ORDER.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                        • API String ID: 2035342205-1083320490
                        • Opcode ID: 82da6914721141c23c952b2a557d454053f92afbcbfffd72d9d73708a50b9132
                        • Instruction ID: a1a18f6d4a87cf364f513f4d5348cf8987bf6841df45d5f239a42b9e89fe31fb
                        • Opcode Fuzzy Hash: 82da6914721141c23c952b2a557d454053f92afbcbfffd72d9d73708a50b9132
                        • Instruction Fuzzy Hash: 8051D230905A04FADB216B618C89BBF7AB8DF42714F54803BF445721D2D73C4942EE6E
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                        • Instruction ID: 49e2905b870d629617cd54a3ad4ea64d750052a334705c7e6b68d35cedeefd19
                        • Opcode Fuzzy Hash: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                        • Instruction Fuzzy Hash: 28F17970D00229CBCF28CFA8C8946ADBBB1FF45305F25856ED856BB281D3785A96CF45
                        APIs
                        • CoCreateInstance.OLE32(00407384,?,?,00407374,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040208B
                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00407374,?,?), ref: 00402143
                        Strings
                        • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 004020CB
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: ByteCharCreateInstanceMultiWide
                        • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                        • API String ID: 123533781-2733731924
                        • Opcode ID: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                        • Instruction ID: 1053df79af30500630abfeafbcf843dcec04d0d4e3091bc204b5fde3a4f6985c
                        • Opcode Fuzzy Hash: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                        • Instruction Fuzzy Hash: 3B416D71A00209BFCB40EFA4CE88E9E7BB5BF48354B2042A9F911FB2D1D6799D41DB54
                        APIs
                        • FindFirstFileA.KERNELBASE(?,00421548,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,004058F7,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406045
                        • FindClose.KERNEL32(00000000), ref: 00406051
                        Strings
                        • C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp, xrefs: 0040603A
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Find$CloseFileFirst
                        • String ID: C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp
                        • API String ID: 2295610775-613565320
                        • Opcode ID: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                        • Instruction ID: ffb9975cce6792308ede9dbdbab0a2e32819aea082b360212a672f9e7c6ece7a
                        • Opcode Fuzzy Hash: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                        • Instruction Fuzzy Hash: 7BD012319490306BC3106B787C0C85B7A599F573317118A33B56AF12F0C7389C7286ED
                        APIs
                        • GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                        • LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                        • GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: AddressHandleLibraryLoadModuleProc
                        • String ID:
                        • API String ID: 310444273-0
                        • Opcode ID: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                        • Instruction ID: 2c1b19e4de550b622e70843c6ca25527790cfa0381149662c4593fbace01eca7
                        • Opcode Fuzzy Hash: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                        • Instruction Fuzzy Hash: 00E0C232A04211ABC321AB749D48D3B73ACAFD8751309493EF50AF6150D734AC21EBBA

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 169 403b19-403b2b 170 403b31-403b37 169->170 171 403c6c-403c7b 169->171 170->171 172 403b3d-403b46 170->172 173 403cca-403cdf 171->173 174 403c7d-403cb8 GetDlgItem * 2 call 403fec KiUserCallbackDispatcher call 40140b 171->174 177 403b48-403b55 SetWindowPos 172->177 178 403b5b-403b5e 172->178 175 403ce1-403ce4 173->175 176 403d1f-403d24 call 404038 173->176 193 403cbd-403cc5 174->193 181 403ce6-403cf1 call 401389 175->181 182 403d17-403d19 175->182 191 403d29-403d44 176->191 177->178 184 403b60-403b72 ShowWindow 178->184 185 403b78-403b7e 178->185 181->182 204 403cf3-403d12 SendMessageA 181->204 182->176 190 403fb9 182->190 184->185 187 403b80-403b95 DestroyWindow 185->187 188 403b9a-403b9d 185->188 194 403f96-403f9c 187->194 195 403bb0-403bb6 188->195 196 403b9f-403bab SetWindowLongA 188->196 192 403fbb-403fc2 190->192 198 403d46-403d48 call 40140b 191->198 199 403d4d-403d53 191->199 193->173 194->190 205 403f9e-403fa4 194->205 202 403c59-403c67 call 404053 195->202 203 403bbc-403bcd GetDlgItem 195->203 196->192 198->199 200 403f77-403f90 DestroyWindow EndDialog 199->200 201 403d59-403d64 199->201 200->194 201->200 207 403d6a-403db7 call 405d58 call 403fec * 3 GetDlgItem 201->207 202->192 208 403bec-403bef 203->208 209 403bcf-403be6 SendMessageA IsWindowEnabled 203->209 204->192 205->190 211 403fa6-403faf ShowWindow 205->211 239 403dc1-403dfd ShowWindow KiUserCallbackDispatcher call 40400e EnableWindow 207->239 240 403db9-403dbe 207->240 213 403bf1-403bf2 208->213 214 403bf4-403bf7 208->214 209->190 209->208 211->190 217 403c22-403c27 call 403fc5 213->217 218 403c05-403c0a 214->218 219 403bf9-403bff 214->219 217->202 222 403c40-403c53 SendMessageA 218->222 224 403c0c-403c12 218->224 219->222 223 403c01-403c03 219->223 222->202 223->217 227 403c14-403c1a call 40140b 224->227 228 403c29-403c32 call 40140b 224->228 235 403c20 227->235 228->202 237 403c34-403c3e 228->237 235->217 237->235 243 403e02 239->243 244 403dff-403e00 239->244 240->239 245 403e04-403e32 GetSystemMenu EnableMenuItem SendMessageA 243->245 244->245 246 403e34-403e45 SendMessageA 245->246 247 403e47 245->247 248 403e4d-403e86 call 404021 call 405d36 lstrlenA call 405d58 SetWindowTextA call 401389 246->248 247->248 248->191 257 403e8c-403e8e 248->257 257->191 258 403e94-403e98 257->258 259 403eb7-403ecb DestroyWindow 258->259 260 403e9a-403ea0 258->260 259->194 261 403ed1-403efe CreateDialogParamA 259->261 260->190 262 403ea6-403eac 260->262 261->194 264 403f04-403f5b call 403fec GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 261->264 262->191 263 403eb2 262->263 263->190 264->190 269 403f5d-403f70 ShowWindow call 404038 264->269 271 403f75 269->271 271->194
                        APIs
                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B55
                        • ShowWindow.USER32(?), ref: 00403B72
                        • DestroyWindow.USER32 ref: 00403B86
                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA2
                        • GetDlgItem.USER32(?,?), ref: 00403BC3
                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BD7
                        • IsWindowEnabled.USER32(00000000), ref: 00403BDE
                        • GetDlgItem.USER32(?,?), ref: 00403C8C
                        • GetDlgItem.USER32(?,00000002), ref: 00403C96
                        • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00403CB0
                        • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403D01
                        • GetDlgItem.USER32(?,00000003), ref: 00403DA7
                        • ShowWindow.USER32(00000000,?), ref: 00403DC8
                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DDA
                        • EnableWindow.USER32(?,?), ref: 00403DF5
                        • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E0B
                        • EnableMenuItem.USER32(00000000), ref: 00403E12
                        • SendMessageA.USER32(?,?,00000000,?), ref: 00403E2A
                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E3D
                        • lstrlenA.KERNEL32(Stvkonsekvenserne115 Setup: Installing,?,Stvkonsekvenserne115 Setup: Installing,00422F00), ref: 00403E66
                        • SetWindowTextA.USER32(?,Stvkonsekvenserne115 Setup: Installing), ref: 00403E75
                        • ShowWindow.USER32(?,0000000A), ref: 00403FA9
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Window$Item$MessageSend$Show$CallbackDispatcherEnableMenuUser$DestroyEnabledLongSystemTextlstrlen
                        • String ID: Stvkonsekvenserne115 Setup: Installing
                        • API String ID: 3906175533-147676709
                        • Opcode ID: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                        • Instruction ID: 1f8690e76de68066656ca8d54ad2d010e53819933bf2384d883f7e4ba9537b83
                        • Opcode Fuzzy Hash: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                        • Instruction Fuzzy Hash: 17C1C071A04205BBDB21AF21ED48D2B7EBCFB44706F40443EF601B11E1C7799942AB6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 272 403787-40379f call 406061 275 4037a1-4037b1 call 405c94 272->275 276 4037b3-4037e4 call 405c1d 272->276 283 403807-403830 call 403a4c call 4058b4 275->283 281 4037e6-4037f7 call 405c1d 276->281 282 4037fc-403802 lstrcatA 276->282 281->282 282->283 290 403836-40383b 283->290 291 4038b7-4038bf call 4058b4 283->291 290->291 292 40383d-403861 call 405c1d 290->292 297 4038c1-4038c8 call 405d58 291->297 298 4038cd-4038f2 LoadImageA 291->298 292->291 299 403863-403865 292->299 297->298 301 403973-40397b call 40140b 298->301 302 4038f4-403924 RegisterClassA 298->302 304 403876-403882 lstrlenA 299->304 305 403867-403874 call 4057f1 299->305 313 403985-403990 call 403a4c 301->313 314 40397d-403980 301->314 306 403a42 302->306 307 40392a-40396e SystemParametersInfoA CreateWindowExA 302->307 311 403884-403892 lstrcmpiA 304->311 312 4038aa-4038b2 call 4057c6 call 405d36 304->312 305->304 309 403a44-403a4b 306->309 307->301 311->312 317 403894-40389e GetFileAttributesA 311->317 312->291 325 403996-4039b3 ShowWindow LoadLibraryA 313->325 326 403a19-403a1a call 4050f1 313->326 314->309 318 4038a0-4038a2 317->318 319 4038a4-4038a5 call 40580d 317->319 318->312 318->319 319->312 328 4039b5-4039ba LoadLibraryA 325->328 329 4039bc-4039ce GetClassInfoA 325->329 330 403a1f-403a21 326->330 328->329 331 4039d0-4039e0 GetClassInfoA RegisterClassA 329->331 332 4039e6-403a09 DialogBoxParamA call 40140b 329->332 333 403a23-403a29 330->333 334 403a3b-403a3d call 40140b 330->334 331->332 338 403a0e-403a17 call 4036d7 332->338 333->314 336 403a2f-403a36 call 40140b 333->336 334->306 336->314 338->309
                        APIs
                          • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                          • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                          • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                        • lstrcatA.KERNEL32(1033,Stvkonsekvenserne115 Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Stvkonsekvenserne115 Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\,75923410,"C:\Users\user\Desktop\ORDER.exe",00000000), ref: 00403802
                        • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,1033,Stvkonsekvenserne115 Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Stvkonsekvenserne115 Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403877
                        • lstrcmpiA.KERNEL32(?,.exe), ref: 0040388A
                        • GetFileAttributesA.KERNEL32(Call), ref: 00403895
                        • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike), ref: 004038DE
                          • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                        • RegisterClassA.USER32(00422EA0), ref: 0040391B
                        • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403933
                        • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403968
                        • ShowWindow.USER32(00000005,00000000), ref: 0040399E
                        • LoadLibraryA.KERNELBASE(RichEd20), ref: 004039AF
                        • LoadLibraryA.KERNEL32(RichEd32), ref: 004039BA
                        • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039CA
                        • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039D7
                        • RegisterClassA.USER32(00422EA0), ref: 004039E0
                        • DialogBoxParamA.USER32(?,00000000,00403B19,00000000), ref: 004039FF
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                        • String ID: "C:\Users\user\Desktop\ORDER.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Stvkonsekvenserne115 Setup: Installing$_Nb
                        • API String ID: 914957316-1434888201
                        • Opcode ID: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                        • Instruction ID: 361ceaa5e45529a70bb989737ed67fdedcb7c759bf8cf29c3cde223c60b7be46
                        • Opcode Fuzzy Hash: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                        • Instruction Fuzzy Hash: E661E6B16442007EE720AF659D45F273E6CEB8475AF40407FF941B22E2D67C9D02DA6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 343 402c79-402cc7 GetTickCount GetModuleFileNameA call 4059c7 346 402cd3-402d01 call 405d36 call 40580d call 405d36 GetFileSize 343->346 347 402cc9-402cce 343->347 355 402df1-402dff call 402bda 346->355 356 402d07-402d1e 346->356 348 402f18-402f1c 347->348 362 402ed0-402ed5 355->362 363 402e05-402e08 355->363 358 402d20 356->358 359 402d22-402d2f call 4031b6 356->359 358->359 367 402d35-402d3b 359->367 368 402e8c-402e94 call 402bda 359->368 362->348 365 402e34-402e80 GlobalAlloc call 406141 call 4059f6 CreateFileA 363->365 366 402e0a-402e22 call 4031cc call 4031b6 363->366 392 402e82-402e87 365->392 393 402e96-402ec6 call 4031cc call 402f1f 365->393 366->362 395 402e28-402e2e 366->395 372 402dbb-402dbf 367->372 373 402d3d-402d55 call 405982 367->373 368->362 376 402dc1-402dc7 call 402bda 372->376 377 402dc8-402dce 372->377 373->377 387 402d57-402d5e 373->387 376->377 382 402dd0-402dde call 4060d3 377->382 383 402de1-402deb 377->383 382->383 383->355 383->356 387->377 394 402d60-402d67 387->394 392->348 403 402ecb-402ece 393->403 394->377 396 402d69-402d70 394->396 395->362 395->365 396->377 398 402d72-402d79 396->398 398->377 400 402d7b-402d9b 398->400 400->362 402 402da1-402da5 400->402 404 402da7-402dab 402->404 405 402dad-402db5 402->405 403->362 406 402ed7-402ee8 403->406 404->355 404->405 405->377 407 402db7-402db9 405->407 408 402ef0-402ef5 406->408 409 402eea 406->409 407->377 410 402ef6-402efc 408->410 409->408 410->410 411 402efe-402f16 call 405982 410->411 411->348
                        APIs
                        • GetTickCount.KERNEL32 ref: 00402C8D
                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ORDER.exe,00000400), ref: 00402CA9
                          • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                          • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                        • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ORDER.exe,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 00402CF2
                        • GlobalAlloc.KERNEL32(?,00409130), ref: 00402E39
                        Strings
                        • C:\Users\user\Desktop\ORDER.exe, xrefs: 00402C93, 00402CA2, 00402CB6, 00402CD3
                        • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E82
                        • Inst, xrefs: 00402D60
                        • Null, xrefs: 00402D72
                        • Error launching installer, xrefs: 00402CC9
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C86, 00402E51
                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402ED0
                        • C:\Users\user\Desktop, xrefs: 00402CD4, 00402CD9, 00402CDF
                        • "C:\Users\user\Desktop\ORDER.exe", xrefs: 00402C79
                        • soft, xrefs: 00402D69
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                        • String ID: "C:\Users\user\Desktop\ORDER.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ORDER.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                        • API String ID: 2803837635-475991146
                        • Opcode ID: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                        • Instruction ID: 2a27acbe37a486d3f9fadad6f2898e15cdcbef103c1943e89973ac3215dbffb0
                        • Opcode Fuzzy Hash: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                        • Instruction Fuzzy Hash: BC61C671A40205ABDF20AF64DE89B9A76B4EF00315F20413BF904B72D1D7BC9E418BAD
                        APIs
                          • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                        • GlobalAlloc.KERNELBASE(?,000014A4), ref: 10001B67
                        • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                        • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                        • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                        • GlobalFree.KERNEL32(?), ref: 10001CC4
                        • GlobalFree.KERNEL32(?), ref: 10001CC9
                        • GlobalFree.KERNEL32(?), ref: 10001CCE
                        • GlobalFree.KERNEL32(00000000), ref: 10001E76
                        • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: Global$Free$lstrcpy$Alloc
                        • String ID:
                        • API String ID: 4227406936-0
                        • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                        • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                        • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                        • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 745 40173f-401762 call 4029fd call 405833 750 401764-40176a call 405d36 745->750 751 40176c-40177e call 405d36 call 4057c6 lstrcatA 745->751 757 401783-401789 call 405fa1 750->757 751->757 761 40178e-401792 757->761 762 401794-40179e call 40603a 761->762 763 4017c5-4017c8 761->763 771 4017b0-4017c2 762->771 772 4017a0-4017ae CompareFileTime 762->772 765 4017d0-4017ec call 4059c7 763->765 766 4017ca-4017cb call 4059a2 763->766 773 401864-40188d call 40501f call 402f1f 765->773 774 4017ee-4017f1 765->774 766->765 771->763 772->771 788 401895-4018a1 SetFileTime 773->788 789 40188f-401893 773->789 775 4017f3-401835 call 405d36 * 2 call 405d58 call 405d36 call 40554a 774->775 776 401846-401850 call 40501f 774->776 775->761 809 40183b-40183c 775->809 786 401859-40185f 776->786 790 40289b 786->790 792 4018a7-4018b2 CloseHandle 788->792 789->788 789->792 793 40289d-4028a1 790->793 795 402892-402895 792->795 796 4018b8-4018bb 792->796 795->790 798 4018d0-4018d3 call 405d58 796->798 799 4018bd-4018ce call 405d58 lstrcatA 796->799 804 4018d8-40222b call 40554a 798->804 799->804 804->793 809->786 811 40183e-40183f 809->811 811->776
                        APIs
                        • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,00000031), ref: 0040177E
                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,00000031), ref: 004017A8
                          • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                          • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                          • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll), ref: 0040508D
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                        • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\nst7AC6.tmp$C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll$Call
                        • API String ID: 1941528284-1684602101
                        • Opcode ID: bbab41b7c65da336fcc9d622b469fe6745b6c4ed629919caf82812cee6b4992a
                        • Instruction ID: 7da2985f373e49f587e0f88560f455237d5d3a700d2e38046b33ad83bb6d7614
                        • Opcode Fuzzy Hash: bbab41b7c65da336fcc9d622b469fe6745b6c4ed629919caf82812cee6b4992a
                        • Instruction Fuzzy Hash: 0341B871910515BACF10BFA5DC46DAF3679DF41369F20823BF511F10E1D63C8A419A6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 812 40501f-405034 813 4050ea-4050ee 812->813 814 40503a-40504c 812->814 815 405057-405063 lstrlenA 814->815 816 40504e-405052 call 405d58 814->816 818 405080-405084 815->818 819 405065-405075 lstrlenA 815->819 816->815 821 405093-405097 818->821 822 405086-40508d SetWindowTextA 818->822 819->813 820 405077-40507b lstrcatA 819->820 820->818 823 405099-4050db SendMessageA * 3 821->823 824 4050dd-4050df 821->824 822->821 823->824 824->813 825 4050e1-4050e4 824->825 825->813
                        APIs
                        • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                        • lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                        • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                        • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll), ref: 0040508D
                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                        • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll
                        • API String ID: 2531174081-1418748480
                        • Opcode ID: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                        • Instruction ID: 2b33129011dff48d1edd85efe61027b37dbb0349f6b457de8e93b882053e083c
                        • Opcode Fuzzy Hash: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                        • Instruction Fuzzy Hash: C2219071900508BBDB119FA5CD84ADFBFB9EF14354F14807AF544B6290C2794E45DFA8

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 826 401f68-401f74 827 401f7a-401f90 call 4029fd * 2 826->827 828 40202f-402031 826->828 837 401f92-401f9d GetModuleHandleA 827->837 838 401f9f-401fad LoadLibraryExA 827->838 829 40217c-402181 call 401423 828->829 836 402892-4028a1 829->836 837->838 841 401faf-401fbc GetProcAddress 837->841 838->841 842 402028-40202a 838->842 843 401ffb-402000 call 40501f 841->843 844 401fbe-401fc4 841->844 842->829 848 402005-402008 843->848 845 401fc6-401fd2 call 401423 844->845 846 401fdd-401ff4 call 100016bd 844->846 845->848 857 401fd4-401fdb 845->857 852 401ff6-401ff9 846->852 848->836 850 40200e-402016 call 403727 848->850 850->836 856 40201c-402023 FreeLibrary 850->856 852->848 856->836 857->848
                        APIs
                        • GetModuleHandleA.KERNELBASE(00000000,?,?), ref: 00401F93
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                          • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                          • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll), ref: 0040508D
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                        • LoadLibraryExA.KERNELBASE(00000000,?,?,?,?), ref: 00401FA3
                        • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040201D
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                        • String ID: (VZ
                        • API String ID: 2987980305-2923465842
                        • Opcode ID: 5319e110b6e8a5b1d5967b6e1ac55a36922c91fdf13baa78a076f75be2177e55
                        • Instruction ID: 23a464ffe6ca8440643a385a127484fd4ee8ad6b227fb7efa4d26ad3fc5b3ac3
                        • Opcode Fuzzy Hash: 5319e110b6e8a5b1d5967b6e1ac55a36922c91fdf13baa78a076f75be2177e55
                        • Instruction Fuzzy Hash: D7210872904211BACF107FA48E49A6E39B0AB44358F60823BF601B62D1D7BC4941AA6E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 859 40231c-402362 call 402af2 call 4029fd * 2 RegCreateKeyExA 866 402892-4028a1 859->866 867 402368-402370 859->867 868 402380-402383 867->868 869 402372-40237f call 4029fd lstrlenA 867->869 873 402393-402396 868->873 874 402385-402392 call 4029e0 868->874 869->868 877 4023a7-4023bb RegSetValueExA 873->877 878 402398-4023a2 call 402f1f 873->878 874->873 880 4023c0-402496 RegCloseKey 877->880 881 4023bd 877->881 878->877 880->866 884 402663-40266a 880->884 881->880 884->866
                        APIs
                        • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nst7AC6.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                        • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nst7AC6.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst7AC6.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CloseCreateValuelstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp
                        • API String ID: 1356686001-1792329331
                        • Opcode ID: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                        • Instruction ID: 937c1904c824b73ffe337d2eacc138a1f8ac1658d2030852d1a46e58dbdf142b
                        • Opcode Fuzzy Hash: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                        • Instruction Fuzzy Hash: D71172B1E00118BFEB10EFA4DE89EAF7678FB50358F10413AF905B61D1D7B85D41A668

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 885 4015b3-4015c6 call 4029fd call 40585f 890 4015c8-4015e3 call 4057f1 CreateDirectoryA 885->890 891 40160a-40160d 885->891 898 401600-401608 890->898 899 4015e5-4015f0 GetLastError 890->899 893 401638-402181 call 401423 891->893 894 40160f-40162a call 401423 call 405d36 SetCurrentDirectoryA 891->894 907 402892-4028a1 893->907 894->907 908 401630-401633 894->908 898->890 898->891 903 4015f2-4015fb GetFileAttributesA 899->903 904 4015fd 899->904 903->898 903->904 904->898 908->907
                        APIs
                          • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040586D
                          • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                          • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                        • CreateDirectoryA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015DB
                        • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                        • GetFileAttributesA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015F3
                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,?), ref: 00401622
                        Strings
                        • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 00401617
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                        • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                        • API String ID: 3751793516-2733731924
                        • Opcode ID: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                        • Instruction ID: decf54c0780f34986dcb1f6dc2400c6331eb5c21fa926316ee50895bb5337331
                        • Opcode Fuzzy Hash: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                        • Instruction Fuzzy Hash: CE11E931908150ABDB217F755D4496F67B4EA62365728473FF891B22D2C23C4D42E62E

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 911 4059f6-405a00 912 405a01-405a2c GetTickCount GetTempFileNameA 911->912 913 405a3b-405a3d 912->913 914 405a2e-405a30 912->914 916 405a35-405a38 913->916 914->912 915 405a32 914->915 915->916
                        APIs
                        • GetTickCount.KERNEL32 ref: 00405A0A
                        • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405A24
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CountFileNameTempTick
                        • String ID: "C:\Users\user\Desktop\ORDER.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                        • API String ID: 1716503409-3904648964
                        • Opcode ID: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                        • Instruction ID: 2f7b9810ed7c5924072585cf2130ed1295747d9915b618abfa336aedeca5813d
                        • Opcode Fuzzy Hash: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                        • Instruction Fuzzy Hash: C1F0E2327482487BDB008F1ADC44B9B7B9CDF91710F00C03BF904AA280D2B0A8008B68

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 917 100016bd-100016f9 call 10001a5d 921 1000180a-1000180c 917->921 922 100016ff-10001703 917->922 923 10001705-1000170b call 100021b0 922->923 924 1000170c-10001719 call 100021fa 922->924 923->924 929 10001749-10001750 924->929 930 1000171b-10001720 924->930 931 10001770-10001774 929->931 932 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 929->932 933 10001722-10001723 930->933 934 1000173b-1000173e 930->934 938 100017b2-100017b8 call 100023da 931->938 939 10001776-100017b0 call 10001559 call 100023da 931->939 955 100017b9-100017bd 932->955 936 10001725-10001726 933->936 937 1000172b-1000172c call 100027ec 933->937 934->929 940 10001740-10001741 call 10002aa7 934->940 943 10001733-10001739 call 1000258d 936->943 944 10001728-10001729 936->944 950 10001731 937->950 938->955 939->955 953 10001746 940->953 954 10001748 943->954 944->929 944->937 950->953 953->954 954->929 959 100017fa-10001801 955->959 960 100017bf-100017cd call 100023a0 955->960 959->921 965 10001803-10001804 GlobalFree 959->965 967 100017e5-100017ec 960->967 968 100017cf-100017d2 960->968 965->921 967->959 970 100017ee-100017f9 call 100014e2 967->970 968->967 969 100017d4-100017dc 968->969 969->967 971 100017de-100017df FreeLibrary 969->971 970->959 971->967
                        APIs
                          • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                          • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                          • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                        • GlobalFree.KERNEL32(00000000), ref: 10001768
                        • FreeLibrary.KERNEL32(?), ref: 100017DF
                        • GlobalFree.KERNEL32(00000000), ref: 10001804
                          • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(?,7D8BEC45), ref: 100021E2
                          • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                          • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,10004010,00000000,10001695,00000000), ref: 10001572
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc$Librarylstrcpy
                        • String ID:
                        • API String ID: 1791698881-3916222277
                        • Opcode ID: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                        • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                        • Opcode Fuzzy Hash: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                        • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60

                        Control-flow Graph

                        • Executed
                        • Not Executed
                        control_flow_graph 974 40303a-403063 GetTickCount 975 4031a4-4031ac call 402bda 974->975 976 403069-403094 call 4031cc SetFilePointer 974->976 981 4031ae-4031b3 975->981 982 403099-4030ab 976->982 983 4030ad 982->983 984 4030af-4030bd call 4031b6 982->984 983->984 987 4030c3-4030cf 984->987 988 403196-403199 984->988 989 4030d5-4030db 987->989 988->981 990 403106-403122 call 406161 989->990 991 4030dd-4030e3 989->991 997 403124-40312c 990->997 998 40319f 990->998 991->990 993 4030e5-403105 call 402bda 991->993 993->990 1000 403160-403166 997->1000 1001 40312e-403144 WriteFile 997->1001 999 4031a1-4031a2 998->999 999->981 1000->998 1004 403168-40316a 1000->1004 1002 403146-40314a 1001->1002 1003 40319b-40319d 1001->1003 1002->1003 1005 40314c-403158 1002->1005 1003->999 1004->998 1006 40316c-40317f 1004->1006 1005->989 1007 40315e 1005->1007 1006->982 1008 403185-403194 SetFilePointer 1006->1008 1007->1006 1008->975
                        APIs
                        • GetTickCount.KERNEL32 ref: 0040304F
                          • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                        • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000), ref: 00403082
                        • WriteFile.KERNELBASE(0040A8A0,0040F4C0,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?), ref: 0040313C
                        • SetFilePointer.KERNELBASE(0011A168,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB), ref: 0040318E
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$Pointer$CountTickWrite
                        • String ID:
                        • API String ID: 2146148272-0
                        • Opcode ID: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                        • Instruction ID: 01a25493adf58fb9a894681412e440a2e883d4234beea4965eba9eb13e735820
                        • Opcode Fuzzy Hash: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                        • Instruction Fuzzy Hash: CC414F725052019FDB10BF29EE849663BFCFB4431A715863BE810BA2E4D7389D52CB5E
                        APIs
                        • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                        • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                        Strings
                        • C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll, xrefs: 004024DD, 00402502
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FileWritelstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll
                        • API String ID: 427699356-2361241071
                        • Opcode ID: 7a3ba9340afd46c78bea2cb4cb31887ebc91b7920a860de9f64b3c7245c284d2
                        • Instruction ID: 4826b5ec7f58a8945af1d05ae4e09a11cd1e532a13e769836b40841c5f4177c7
                        • Opcode Fuzzy Hash: 7a3ba9340afd46c78bea2cb4cb31887ebc91b7920a860de9f64b3c7245c284d2
                        • Instruction Fuzzy Hash: 80F054B2A54244BFDB40ABA19E499EB66A4DB40309F10443FB141F61C2D5BC4941A66A
                        APIs
                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                        • CloseHandle.KERNEL32(?), ref: 0040551B
                        Strings
                        • Error launching installer, xrefs: 004054F8
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CloseCreateHandleProcess
                        • String ID: Error launching installer
                        • API String ID: 3712363035-66219284
                        • Opcode ID: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                        • Instruction ID: 0ae392a05d3974bec86de51aa2f8a5c28ff0ee3cdd976454f3eed0d5dd72dd2a
                        • Opcode Fuzzy Hash: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                        • Instruction Fuzzy Hash: 2BE0BFB4A00209BFEB109FA4ED05F7B76ADEB14745F508561BD11F2160E774A9108A79
                        APIs
                          • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00405FF9
                          • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                          • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040600B
                          • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040601B
                        • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00403204
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Char$Next$CreateDirectoryPrev
                        • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                        • API String ID: 4115351271-2030658151
                        • Opcode ID: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                        • Instruction ID: 89773af62672bbf6302d30782f314b1c1bc42d6855f09756152acd8bf908297a
                        • Opcode Fuzzy Hash: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                        • Instruction Fuzzy Hash: 24D0C71290AD3066D5513B6A7C46FCF050C8F4675DF11807BF904751C58F6C555395EF
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                        • Instruction ID: d3f30c549e8eaa155af2d8805db43d359078549a114e1d1e4cfdde4495a9482f
                        • Opcode Fuzzy Hash: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                        • Instruction Fuzzy Hash: 13A14471E00228CBDF28DFA8C8447ADBBB1FB45305F15816ED816BB281D7785A96DF44
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                        • Instruction ID: 66af66db22d428e7cee4185570621c0262e28a8f97ef0091af547b150b1cef7f
                        • Opcode Fuzzy Hash: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                        • Instruction Fuzzy Hash: 7F912170E00228CBDF28DF98C8947ADBBB1FB45305F15816ED816BB281C7786A96DF44
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                        • Instruction ID: 36158da5dd70985ab85e2c4d41886ca33cae813362c0b87a96f868d92fb05337
                        • Opcode Fuzzy Hash: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                        • Instruction Fuzzy Hash: 65815771D00228CFDF24CFA8C8847ADBBB1FB45305F25816AD816BB281D778A996DF15
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                        • Instruction ID: 1715bfb1c3d5716620224504c503b3d15fe2aa0a2bbcc08a305e6ffc6cb4203b
                        • Opcode Fuzzy Hash: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                        • Instruction Fuzzy Hash: 53817771D00228DBDF24CFA8C8447ADBBB0FB44301F2581AED856BB281D7786A96DF45
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                        • Instruction ID: 032b7c8430df6362c90b97cb5f8c3133674bcd2d0f853081a3cdcc23126a0f5c
                        • Opcode Fuzzy Hash: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                        • Instruction Fuzzy Hash: 87711371D00228CFDF24CF98C8847ADBBB1FB48305F15806AD816BB281D7785996DF45
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                        • Instruction ID: 3e9dbefe820a1d4baf734be7fb741bb2fb66d8e6f9ed59188b506b6c9edb630d
                        • Opcode Fuzzy Hash: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                        • Instruction Fuzzy Hash: AB711371E00228CBDF28CF98C884BADBBB1FB44305F15816ED816BB281D7786996DF45
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID:
                        • String ID:
                        • API String ID:
                        • Opcode ID: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                        • Instruction ID: 1812ff5f5430a706778d8acc512246fd3c212bc7acfdfbe5d0fa3af8c8d1a12f
                        • Opcode Fuzzy Hash: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                        • Instruction Fuzzy Hash: AD712471E00228CBDF28DF98C844BADBBB1FB44305F15806ED856BB291C7786A96DF45
                        APIs
                        • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                        • WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,00000004,00000000,00000000,?,?), ref: 00402FD2
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$PointerWrite
                        • String ID:
                        • API String ID: 539440098-0
                        • Opcode ID: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                        • Instruction ID: 3b6e370e410e3f669d4a968ba26e16673121f6254c39c59cd6eb20204b18cf3c
                        • Opcode Fuzzy Hash: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                        • Instruction Fuzzy Hash: 14313931502259FFDF20DF55DD44A9E3BA8EF04395F20403AF908A61D0D2789A41EBA9
                        APIs
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                          • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                          • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll), ref: 0040508D
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          • Part of subcall function 004054E5: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                          • Part of subcall function 004054E5: CloseHandle.KERNEL32(?), ref: 0040551B
                        • WaitForSingleObject.KERNEL32(?,?,00000000,000000EB,00000000), ref: 00401E6C
                        • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                        • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401EA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                        • String ID:
                        • API String ID: 3521207402-0
                        • Opcode ID: 6d5b4df7f3f042f549e26a8ca851069bd4f569f0361fe87acde780f9e8383ee7
                        • Instruction ID: a57a420adebbec2e463a2757bf84d9d81012cc1a8c5c1569ff173e75ada2264d
                        • Opcode Fuzzy Hash: 6d5b4df7f3f042f549e26a8ca851069bd4f569f0361fe87acde780f9e8383ee7
                        • Instruction Fuzzy Hash: 66014031904114FBDF21AFA1DD859EE7B71EB40345F10857BFA01B51E1C3794A81EBAA
                        APIs
                        • RegOpenKeyExA.KERNELBASE(80000002,00405E62,00000000,00000002,?,00000002,?,?,00405E62,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405C46
                        • RegQueryValueExA.KERNELBASE(?,?,00000000,00405E62,?,00405E62), ref: 00405C67
                        • RegCloseKey.KERNELBASE(?), ref: 00405C88
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CloseOpenQueryValue
                        • String ID:
                        • API String ID: 3677997916-0
                        • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                        • Instruction ID: f8269c4da42e469e915d7b724f411cb256963c2af92f405d5d85614ed9ec7fb6
                        • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                        • Instruction Fuzzy Hash: 8801487114420EEFEB128F64EC44EEB3FACEF15394F00402AF945A6220D235D964DBA5
                        APIs
                          • Part of subcall function 00402B07: RegOpenKeyExA.KERNELBASE(00000000,0000044B,00000000,00000022,00000000,?,?), ref: 00402B2F
                        • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402468
                        • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 0040247B
                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst7AC6.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Enum$CloseOpenValue
                        • String ID:
                        • API String ID: 167947723-0
                        • Opcode ID: 644ba4b7322b66dce4c699ceae064ea5186855f8b21283cab721fd429f29c5cc
                        • Instruction ID: 09a8887cd5e4729410dcfabe5c46d2a670465c21522258ca6cdcbf1033b2090e
                        • Opcode Fuzzy Hash: 644ba4b7322b66dce4c699ceae064ea5186855f8b21283cab721fd429f29c5cc
                        • Instruction Fuzzy Hash: E8F08671904204FFD7119F659D8CEBF7A6CEB40748F10453EF441B62C0D6B95E41966A
                        APIs
                          • Part of subcall function 004059A2: GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                          • Part of subcall function 004059A2: SetFileAttributesA.KERNELBASE(?,00000000), ref: 004059BB
                        • RemoveDirectoryA.KERNEL32(?,?,?,00000000,0040579D), ref: 004055C9
                        • DeleteFileA.KERNELBASE(?,?,?,00000000,0040579D), ref: 004055D1
                        • SetFileAttributesA.KERNEL32(?,00000000), ref: 004055E9
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$Attributes$DeleteDirectoryRemove
                        • String ID:
                        • API String ID: 1655745494-0
                        • Opcode ID: abd038863be241f110d95ccd9fde628896f101e4ff1c11c0b7d20b5ecf2a2518
                        • Instruction ID: 12c6f0b15b18e033ed95b071f1fc2c07b3079c0683f10f414bd997d86f240b92
                        • Opcode Fuzzy Hash: abd038863be241f110d95ccd9fde628896f101e4ff1c11c0b7d20b5ecf2a2518
                        • Instruction Fuzzy Hash: 98E0E532518A5067C21057309D08A5F3ADADFCA324F044936F492F21D4DB7848068ABA
                        APIs
                        • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,?), ref: 00401E1E
                        Strings
                        • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 00401E09
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: ExecuteShell
                        • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                        • API String ID: 587946157-2733731924
                        • Opcode ID: 66519f536f70328b3ce23f8ed94e950144d2fd5449f9bef0e6ae71cafd5ff2e4
                        • Instruction ID: 92cbb6ba42742382510c3a8e41a68a30635fa0dc9ae6a59fa4a75f74f7b170a3
                        • Opcode Fuzzy Hash: 66519f536f70328b3ce23f8ed94e950144d2fd5449f9bef0e6ae71cafd5ff2e4
                        • Instruction Fuzzy Hash: 8DF0F6B3B041047ACB41ABB59E4AE5D2BA4EB41718F240A3BF400F71C2DAFC8841F728
                        APIs
                        • SetFilePointer.KERNELBASE(00000000), ref: 100028AB
                        • GetLastError.KERNEL32 ref: 100029B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: ErrorFileLastPointer
                        • String ID:
                        • API String ID: 2976181284-0
                        • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                        • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                        • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                        • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                        APIs
                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                        • Instruction ID: da56ad7cfcb2a9fecb994a09e4a0bd113f750103611445cd7b28aada07ee45e3
                        • Opcode Fuzzy Hash: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                        • Instruction Fuzzy Hash: 2E012831B24210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                        APIs
                        • ShowWindow.USER32(00000000,00000000,?), ref: 00401DC2
                        • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Window$EnableShow
                        • String ID:
                        • API String ID: 1136574915-0
                        • Opcode ID: 5d4156b77268c72d9e3eaff2de93184d03509ee6b077f4337f4a820dda01516b
                        • Instruction ID: 18ac702c75a7039fec00373c4f699ed09bc4c8ec852dd7b5b9a0ef8cb6e9c66a
                        • Opcode Fuzzy Hash: 5d4156b77268c72d9e3eaff2de93184d03509ee6b077f4337f4a820dda01516b
                        • Instruction Fuzzy Hash: 39E0CD72B04110EBCB10BBB45D4A55E3374DF10359B10443BF501F11C1D2B85C40565D
                        APIs
                        • GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                        • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$AttributesCreate
                        • String ID:
                        • API String ID: 415043291-0
                        • Opcode ID: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                        • Instruction ID: 21e5f81f3e52fa2c8f9e5bc24a994218dd140026ef3a1e453d479de883aad6ce
                        • Opcode Fuzzy Hash: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                        • Instruction Fuzzy Hash: 94D09E31668301AFEF098F20DD16F2E7BA2EB84B00F10562CB682D40E0D6755815DB16
                        APIs
                        • GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                        • SetFileAttributesA.KERNELBASE(?,00000000), ref: 004059BB
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                        • Instruction ID: a98ca5448702c3e829ea1667e49b0be7f6aa4c87fef4348ac0342a167d80fd98
                        • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                        • Instruction Fuzzy Hash: 19D0C9B2918120EBC2102728AD0889BBF69EB542717018B31F865A22B0C7304C52DAA9
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: wsprintf
                        • String ID:
                        • API String ID: 2111968516-0
                        • Opcode ID: 782d5d7a015de57d641f2625727537b2e8a64e8a203226d51b7ee4238bd53e1d
                        • Instruction ID: 80d1f72451bcef36c881c8715d37a41c16cfaf5c23ac720a97db8ffa6bd4d959
                        • Opcode Fuzzy Hash: 782d5d7a015de57d641f2625727537b2e8a64e8a203226d51b7ee4238bd53e1d
                        • Instruction Fuzzy Hash: C121D870D05295BEDF229F644A581EEBBB09B05304F64407FE491BA3C5E1BC9A82CB2D
                        APIs
                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402274
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: PrivateProfileStringWrite
                        • String ID:
                        • API String ID: 390214022-0
                        • Opcode ID: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                        • Instruction ID: 05d4d75dbd01593bae97f630dbecede8c42f44da552b6d0f9ca4defc7305ba5b
                        • Opcode Fuzzy Hash: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                        • Instruction Fuzzy Hash: 2FE04F72B001696ADB903AF18F8DD7F21597B84304F15067EF611B62C2D9BC0D81A2B9
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004025ED
                          • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FilePointerwsprintf
                        • String ID:
                        • API String ID: 327478801-0
                        • Opcode ID: f6b622efafe1ba94147637c824cd162c2e50e451d5b8b7382d4d1d46b47572d6
                        • Instruction ID: 0a8c9e11f48196ea829b02b8213bca88da5b23a5d36cc3de3ae654890f4390ea
                        • Opcode Fuzzy Hash: f6b622efafe1ba94147637c824cd162c2e50e451d5b8b7382d4d1d46b47572d6
                        • Instruction Fuzzy Hash: E4E04FB6A04220BBDB01BBA59E4ADBF6768EB50309B14853BF501F40C1D3BD4802962E
                        APIs
                        • RegOpenKeyExA.KERNELBASE(00000000,0000044B,00000000,00000022,00000000,?,?), ref: 00402B2F
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Open
                        • String ID:
                        • API String ID: 71445658-0
                        • Opcode ID: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                        • Instruction ID: 087740a894708ae54e311fe38564fcb001a0ed9e3d0f4d4a62d19f1d4de25a1d
                        • Opcode Fuzzy Hash: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                        • Instruction Fuzzy Hash: 38E046B6250108AADB40EFA4EE4AF9537ECFB04700F008021BA08E7091CA78E5509B69
                        APIs
                        • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128A0,0040A8A0,004031C9,00409130,00409130,004030BB,004128A0,00004000,?,00000000,?), ref: 00405A53
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FileRead
                        • String ID:
                        • API String ID: 2738559852-0
                        • Opcode ID: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                        • Instruction ID: 55609983f428609d3339a900fe5ea2c3161a13bcf9e808ef2cae39733250456b
                        • Opcode Fuzzy Hash: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                        • Instruction Fuzzy Hash: F7E08C3231025AABDF109EA09C40AEB3B6CEB00760F084432FA14E2040D230E9218FA5
                        APIs
                        • VirtualProtect.KERNELBASE(1000404C,?,?,1000403C), ref: 1000272D
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: ProtectVirtual
                        • String ID:
                        • API String ID: 544645111-0
                        • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                        • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                        • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                        • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                        APIs
                        • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B2
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: PrivateProfileString
                        • String ID:
                        • API String ID: 1096422788-0
                        • Opcode ID: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                        • Instruction ID: 1024819f7f1d2ea578916dba6ac29c28ac22902c13986e1de9ff5d702d2d6265
                        • Opcode Fuzzy Hash: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                        • Instruction Fuzzy Hash: B9E08671A44209BADB406FA08E09EBD3668BF01710F10013AF9507B0D1EBB88442F72D
                        APIs
                        • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015A0
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: AttributesFile
                        • String ID:
                        • API String ID: 3188754299-0
                        • Opcode ID: c66d089d5a2f634c2935052129529c912c52a98a4509ae0e2fc4e9bc41e15f47
                        • Instruction ID: bed2877986d8c12a83e01492d596720214e57a472dec7050afa6ab6fccae40cd
                        • Opcode Fuzzy Hash: c66d089d5a2f634c2935052129529c912c52a98a4509ae0e2fc4e9bc41e15f47
                        • Instruction Fuzzy Hash: 17D01277B08114E7DB00DBB5AE48A9E73A4FB50325F208637D111F11D0D3B98551A629
                        APIs
                        • SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 0040404A
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                        • Instruction ID: af7fd4c3fc1dda8ad1a195a9021ea177fcc43fc0d0bb539f8953ea950d20d41d
                        • Opcode Fuzzy Hash: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                        • Instruction Fuzzy Hash: DFC09B717443007BEA31DB509D49F077758A750B00F5584357320F50D0C6B4F451D62D
                        APIs
                        • SendMessageA.USER32(?,?,?,00403E52), ref: 0040402F
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend
                        • String ID:
                        • API String ID: 3850602802-0
                        • Opcode ID: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                        • Instruction ID: 7b5ccc39adf6f72de5191684d4495c6b43ffe58f78915606d69c4a7e6f44d702
                        • Opcode Fuzzy Hash: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                        • Instruction Fuzzy Hash: F3B092B5684200BAEE224B40DD09F457EA2E7A4702F008024B300240B0C6B200A1DB19
                        APIs
                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FilePointer
                        • String ID:
                        • API String ID: 973152223-0
                        • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                        • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                        • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                        • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                        APIs
                        • KiUserCallbackDispatcher.NTDLL(?,00403DEB), ref: 00404018
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CallbackDispatcherUser
                        • String ID:
                        • API String ID: 2492992576-0
                        • Opcode ID: caaff2729d3fe7bae5ae998927534049a5cfce9e2193b3926e4c56a419af128c
                        • Instruction ID: f87940b9544c4de7e657a104dd6f20edac94ef916c9b89b279468f5034d51d6a
                        • Opcode Fuzzy Hash: caaff2729d3fe7bae5ae998927534049a5cfce9e2193b3926e4c56a419af128c
                        • Instruction Fuzzy Hash: E2A01231404001DBCB014B10DF04C45FF21B7503007018030E50140034C6310420FF09
                        APIs
                        • Sleep.KERNELBASE(00000000), ref: 004014E5
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Sleep
                        • String ID:
                        • API String ID: 3472027048-0
                        • Opcode ID: c9c2d380323125baba7308e94fb33277af884a6ec96610a08fce4469fec28eac
                        • Instruction ID: 4daead48d26ae6742cc4751adb680189456718570d67c7320b978f12710e1ab5
                        • Opcode Fuzzy Hash: c9c2d380323125baba7308e94fb33277af884a6ec96610a08fce4469fec28eac
                        • Instruction Fuzzy Hash: DFD0C7B7B141006BD750E7B86E8545A73E8F75135A7148837D502E1191D17DC9415519
                        APIs
                        • GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: AllocGlobal
                        • String ID:
                        • API String ID: 3761449716-0
                        • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                        • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                        • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                        • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                        APIs
                        • GetDlgItem.USER32(?,000003F9), ref: 004049B4
                        • GetDlgItem.USER32(?,00000408), ref: 004049BF
                        • GlobalAlloc.KERNEL32(?,?), ref: 00404A09
                        • LoadBitmapA.USER32(0000006E), ref: 00404A1C
                        • SetWindowLongA.USER32(?,?,00404F93), ref: 00404A35
                        • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404A49
                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A5B
                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404A71
                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A7D
                        • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404A8F
                        • DeleteObject.GDI32(00000000), ref: 00404A92
                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404ABD
                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404AC9
                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B5E
                        • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B89
                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B9D
                        • GetWindowLongA.USER32(?,?), ref: 00404BCC
                        • SetWindowLongA.USER32(?,?,00000000), ref: 00404BDA
                        • ShowWindow.USER32(?,00000005), ref: 00404BEB
                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CE8
                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D4D
                        • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404D62
                        • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404D86
                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404DA6
                        • ImageList_Destroy.COMCTL32(00000000), ref: 00404DBB
                        • GlobalFree.KERNEL32(00000000), ref: 00404DCB
                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E44
                        • SendMessageA.USER32(?,00001102,?,?), ref: 00404EED
                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404EFC
                        • InvalidateRect.USER32(?,00000000,?), ref: 00404F1C
                        • ShowWindow.USER32(?,00000000), ref: 00404F6A
                        • GetDlgItem.USER32(?,000003FE), ref: 00404F75
                        • ShowWindow.USER32(00000000), ref: 00404F7C
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                        • String ID: $M$N
                        • API String ID: 1638840714-813528018
                        • Opcode ID: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                        • Instruction ID: ec1b41ef9246f4b5ca9c31e675ea93c5522bc938a585a88f05d0904c7564d9ec
                        • Opcode Fuzzy Hash: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                        • Instruction Fuzzy Hash: 7A025FB0900209AFEB10DF94DC85AAE7BB5FB84315F10817AFA10B62E1D7789D42DF58
                        APIs
                        • GetDlgItem.USER32(?,000003FB), ref: 00404479
                        • SetWindowTextA.USER32(00000000,-00424000), ref: 004044A3
                        • SHBrowseForFolderA.SHELL32(?,0041F0D0,?), ref: 00404554
                        • CoTaskMemFree.OLE32(00000000), ref: 0040455F
                        • lstrcmpiA.KERNEL32(Call,Stvkonsekvenserne115 Setup: Installing), ref: 00404591
                        • lstrcatA.KERNEL32(-00424000,Call), ref: 0040459D
                        • SetDlgItemTextA.USER32(?,000003FB,-00424000), ref: 004045AF
                          • Part of subcall function 0040552E: GetDlgItemTextA.USER32(?,?,00000400,004045E6), ref: 00405541
                          • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00405FF9
                          • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                          • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040600B
                          • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040601B
                        • GetDiskFreeSpaceA.KERNEL32(0041ECC8,?,?,0000040F,?,0041ECC8,0041ECC8,-00424000,00000000,0041ECC8,-00424000,-00424000,000003FB,-00424000), ref: 0040466C
                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404687
                          • Part of subcall function 004047E0: lstrlenA.KERNEL32(Stvkonsekvenserne115 Setup: Installing,Stvkonsekvenserne115 Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,004046FB,000000DF,00000000,00000400,-00424000), ref: 0040487E
                          • Part of subcall function 004047E0: wsprintfA.USER32 ref: 00404886
                          • Part of subcall function 004047E0: SetDlgItemTextA.USER32(?,Stvkonsekvenserne115 Setup: Installing), ref: 00404899
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                        • String ID: A$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$Call$Stvkonsekvenserne115 Setup: Installing
                        • API String ID: 2624150263-2541297622
                        • Opcode ID: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                        • Instruction ID: 5a451af96f6c61f8b8aedc9e732e962e3b59a2a539d705b9404eba0a1a8e20eb
                        • Opcode Fuzzy Hash: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                        • Instruction Fuzzy Hash: A6A162B1900208ABDB11AFA6CD45AEFB7B9EF85314F10843BF611B72D1D77C89418B69
                        APIs
                        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FileFindFirst
                        • String ID:
                        • API String ID: 1974802433-0
                        • Opcode ID: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                        • Instruction ID: 2b7524724565807a685c72c68d6b6eabb337ae57375c882a310f3ed35d4a28aa
                        • Opcode Fuzzy Hash: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                        • Instruction Fuzzy Hash: D4F0EC72504110EBD700EBB4994DAEE77B8DF51314F60457BE141F21C1D3B84945E72E
                        APIs
                        • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 004041C0
                        • GetDlgItem.USER32(00000000,000003E8), ref: 004041D4
                        • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004041F2
                        • GetSysColor.USER32(?), ref: 00404203
                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404212
                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404221
                        • lstrlenA.KERNEL32(?), ref: 00404224
                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404233
                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404248
                        • GetDlgItem.USER32(?,0000040A), ref: 004042AA
                        • SendMessageA.USER32(00000000), ref: 004042AD
                        • GetDlgItem.USER32(?,000003E8), ref: 004042D8
                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404318
                        • LoadCursorA.USER32(00000000,00007F02), ref: 00404327
                        • SetCursor.USER32(00000000), ref: 00404330
                        • ShellExecuteA.SHELL32(0000070B,open,004226A0,00000000,00000000,?), ref: 00404343
                        • LoadCursorA.USER32(00000000,00007F00), ref: 00404350
                        • SetCursor.USER32(00000000), ref: 00404353
                        • SendMessageA.USER32(00000111,?,00000000), ref: 0040437F
                        • SendMessageA.USER32(?,00000000,00000000), ref: 00404393
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                        • String ID: Call$N$open
                        • API String ID: 3615053054-2563687911
                        • Opcode ID: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                        • Instruction ID: 47d1c741c4840d0b501b4796cf3fe0e3440e9ec9cd7b0debe1a5eac4f9bfffd7
                        • Opcode Fuzzy Hash: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                        • Instruction Fuzzy Hash: 8F61A0B1A40309BFEB109F61DD45F6A7B69FB84704F108026FB04BB2D1C7B8A951CB99
                        APIs
                        • lstrcpyA.KERNEL32(00421A88,NUL,?,00000000,?,00000000,?,00405C12,?,?,?,004057B5,?,00000000,000000F1,?), ref: 00405A7E
                        • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00405C12,?,?,?,004057B5,?,00000000,000000F1,?), ref: 00405AA2
                        • GetShortPathNameA.KERNEL32(00000000,00421A88,00000400), ref: 00405AAB
                          • Part of subcall function 0040592C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                          • Part of subcall function 0040592C: lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                        • GetShortPathNameA.KERNEL32(?,00421E88,00000400), ref: 00405AC8
                        • wsprintfA.USER32 ref: 00405AE6
                        • GetFileSize.KERNEL32(00000000,00000000,00421E88,C0000000,?,00421E88,?,?,?,?,?), ref: 00405B21
                        • GlobalAlloc.KERNEL32(?,0000000A), ref: 00405B30
                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B68
                        • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421688,00000000,-0000000A,004093A0,00000000,[Rename],00000000,00000000,00000000), ref: 00405BBE
                        • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405BD0
                        • GlobalFree.KERNEL32(00000000), ref: 00405BD7
                        • CloseHandle.KERNEL32(00000000), ref: 00405BDE
                          • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                          • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                        • String ID: %s=%s$NUL$[Rename]
                        • API String ID: 1265525490-4148678300
                        • Opcode ID: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                        • Instruction ID: 2d1e09aab0418ff75005a817fdb93eb8b9645243d234663ae25a64343302d3c0
                        • Opcode Fuzzy Hash: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                        • Instruction Fuzzy Hash: BE41DEB1604A15BFD6206B219C49F6B3A6CDF45718F14053BBE01FA2D2EA7CB8018E7D
                        APIs
                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                        • BeginPaint.USER32(?,?), ref: 00401047
                        • GetClientRect.USER32(?,?), ref: 0040105B
                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                        • DeleteObject.GDI32(?), ref: 004010ED
                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                        • SetBkMode.GDI32(00000000,?), ref: 00401126
                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                        • SelectObject.GDI32(00000000,?), ref: 00401140
                        • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                        • DeleteObject.GDI32(?), ref: 00401165
                        • EndPaint.USER32(?,?), ref: 0040116E
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                        • String ID: F
                        • API String ID: 941294808-1304234792
                        • Opcode ID: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                        • Instruction ID: ce5436bc7dfccdabf5b2378cdbc04c65b8fc1f8d51739f20964cb8902a5fcb59
                        • Opcode Fuzzy Hash: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                        • Instruction Fuzzy Hash: F2419A72804249AFCF058F94CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                        APIs
                        • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 00405FF9
                        • CharNextA.USER32(?,?,?,00000000), ref: 00406006
                        • CharNextA.USER32(?,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040600B
                        • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 0040601B
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Char$Next$Prev
                        • String ID: "C:\Users\user\Desktop\ORDER.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                        • API String ID: 589700163-2284336145
                        • Opcode ID: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                        • Instruction ID: 96a923a8ee4f60b6f191beee89bac6a1f57d38d5d4ddb578b75945660f6dc773
                        • Opcode Fuzzy Hash: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                        • Instruction Fuzzy Hash: 57110451908B9229FB325A284C40B777F99CF5A760F18047FE5C1722C2C67C5C529B6E
                        APIs
                        • GetWindowLongA.USER32(?,000000EB), ref: 00404070
                        • GetSysColor.USER32(00000000), ref: 0040408C
                        • SetTextColor.GDI32(?,00000000), ref: 00404098
                        • SetBkMode.GDI32(?,?), ref: 004040A4
                        • GetSysColor.USER32(?), ref: 004040B7
                        • SetBkColor.GDI32(?,?), ref: 004040C7
                        • DeleteObject.GDI32(?), ref: 004040E1
                        • CreateBrushIndirect.GDI32(?), ref: 004040EB
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                        • String ID:
                        • API String ID: 2320649405-0
                        • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                        • Instruction ID: 47825c477eeffae7bcc1b4b45db8633c52535f80fcd06c8b97140eed864a5805
                        • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                        • Instruction Fuzzy Hash: 0621A4B18047049BCB309F68DD08B4BBBF8AF40714F048639EA95F26E1C738E944CB65
                        APIs
                        • GlobalFree.KERNEL32(00000000), ref: 1000234A
                          • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                        • GlobalAlloc.KERNEL32(?,?), ref: 100022C3
                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                        • GlobalAlloc.KERNEL32(?,?), ref: 100022E7
                        • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                        • GlobalFree.KERNEL32(00000000), ref: 100022FB
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                        • String ID:
                        • API String ID: 3730416702-0
                        • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                        • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                        • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                        • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                        APIs
                          • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                        • GlobalFree.KERNEL32(?), ref: 100024B9
                        • GlobalFree.KERNEL32(00000000), ref: 100024F3
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc
                        • String ID:
                        • API String ID: 1780285237-0
                        • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                        • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                        • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                        • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                        APIs
                          • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                          • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                        • GlobalAlloc.KERNEL32(?,?), ref: 004026D7
                        • CloseHandle.KERNEL32(?), ref: 0040275D
                          • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                        • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004026F3
                        • GlobalFree.KERNEL32(?), ref: 0040272C
                        • WriteFile.KERNEL32(?,00000000,?,?), ref: 0040273E
                        • GlobalFree.KERNEL32(00000000), ref: 00402745
                          • Part of subcall function 00402F1F: SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                          • Part of subcall function 00402F1F: WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,00000004,00000000,00000000,?,?), ref: 00402FD2
                        • DeleteFileA.KERNEL32(?), ref: 00402771
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: File$Global$AllocFreePointerWrite$AttributesCloseCreateDeleteHandle
                        • String ID:
                        • API String ID: 64603807-0
                        • Opcode ID: 886bff04a04abf0191cccc6423df3f8a629c61cd78b255a0e1cb1f67b1668c44
                        • Instruction ID: 6bd6e99ca2686c51998a376200e97ca61e834f49c4b1b8850f9bef3558c81133
                        • Opcode Fuzzy Hash: 886bff04a04abf0191cccc6423df3f8a629c61cd78b255a0e1cb1f67b1668c44
                        • Instruction Fuzzy Hash: 49218CB1C00118BFCF116FA4CD88CAEBE79EF08364B10423AF520772E0C6795D419BA8
                        APIs
                        • DestroyWindow.USER32(00000000,00000000), ref: 00402BF2
                        • GetTickCount.KERNEL32 ref: 00402C10
                        • wsprintfA.USER32 ref: 00402C3E
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                          • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                          • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                          • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst7AC6.tmp\System.dll), ref: 0040508D
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                          • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                        • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C62
                        • ShowWindow.USER32(00000000,00000005), ref: 00402C70
                          • Part of subcall function 00402BBE: MulDiv.KERNEL32(00041C71,?,00043A73), ref: 00402BD3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                        • String ID: ... %d%%
                        • API String ID: 722711167-2449383134
                        • Opcode ID: 4774796197fe5164bdbc165248605a4c2f395ef1972e6126fe3027443e66bd13
                        • Instruction ID: 53b2eec8c243fd5a5b591a6d8e7090b5e500d3da6e0592f5c5af2241ed808ea0
                        • Opcode Fuzzy Hash: 4774796197fe5164bdbc165248605a4c2f395ef1972e6126fe3027443e66bd13
                        • Instruction Fuzzy Hash: AB0188B0949614ABDB216F64AE4DE9F7B7CFB017057148037FA01B11E1C6B8D541CBAE
                        APIs
                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404905
                        • GetMessagePos.USER32 ref: 0040490D
                        • ScreenToClient.USER32(?,?), ref: 00404927
                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404939
                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040495F
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Message$Send$ClientScreen
                        • String ID: f
                        • API String ID: 41195575-1993550816
                        • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                        • Instruction ID: 7baaa9b85802c8a5173365c44ed2834cc31749f5d024e9fb4d2ec5e64c2f69ce
                        • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                        • Instruction Fuzzy Hash: E40140B1D00218BADB01DBA4DC85FFFBBBCAB95721F10412BBA10B61D0C7B469018BA5
                        APIs
                        • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402B5D
                        • wsprintfA.USER32 ref: 00402B91
                        • SetWindowTextA.USER32(?,?), ref: 00402BA1
                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Text$ItemTimerWindowwsprintf
                        • String ID: unpacking data: %d%%$verifying installer: %d%%
                        • API String ID: 1451636040-1158693248
                        • Opcode ID: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                        • Instruction ID: 4b4d840d1cf11f9656568dd8641bec75cd76f4f3bd4f461a87d93eb2d0bf3f96
                        • Opcode Fuzzy Hash: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                        • Instruction Fuzzy Hash: F7F01D70900208BBEF215F61DD4ABEE3779EB00345F00803AFA06B51D0D7F8AA558B9A
                        APIs
                        • lstrlenA.KERNEL32(Stvkonsekvenserne115 Setup: Installing,Stvkonsekvenserne115 Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,004046FB,000000DF,00000000,00000400,-00424000), ref: 0040487E
                        • wsprintfA.USER32 ref: 00404886
                        • SetDlgItemTextA.USER32(?,Stvkonsekvenserne115 Setup: Installing), ref: 00404899
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: ItemTextlstrlenwsprintf
                        • String ID: %u.%u%s%s$Stvkonsekvenserne115 Setup: Installing
                        • API String ID: 3540041739-1393985702
                        • Opcode ID: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                        • Instruction ID: 8631c14a921e8479d2aaee063571767324bc63c1cfe9171b6f21c1c007081b9c
                        • Opcode Fuzzy Hash: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                        • Instruction Fuzzy Hash: 90112433A441283BDB0065AD9C49EAF328CDF81334F244637FA25F61D1E9788C1292E8
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: FreeGlobal
                        • String ID:
                        • API String ID: 2979337801-0
                        • Opcode ID: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                        • Instruction ID: 97b6efd1b10b48d7ee9b7c7fbc92de58723c24235f199e6d6d25645bb0e8c5d4
                        • Opcode Fuzzy Hash: 0c473814e0966ac58776859a9061c1e440c53011a0554eaa903a9fb75293bb16
                        • Instruction Fuzzy Hash: DC512532D04159AEFB55DFB488A4AEEBBF6EF453C0F12416AE841B315DCA306E4087D2
                        APIs
                        • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                        • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                        • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Close$DeleteEnumOpen
                        • String ID:
                        • API String ID: 1912718029-0
                        • Opcode ID: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                        • Instruction ID: 1cfc72d501241f28ff1c9237e437913a5e8660848d06dce24e2e83bd327c9a1b
                        • Opcode Fuzzy Hash: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                        • Instruction Fuzzy Hash: EA114F71A00108FFDF219F90DE48EAA3B7DEB44349B104076FA05B11A0DBB49E559F69
                        APIs
                        • GetDlgItem.USER32(?), ref: 00401CD0
                        • GetClientRect.USER32(00000000,?), ref: 00401CDD
                        • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                        • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                        • DeleteObject.GDI32(00000000), ref: 00401D1B
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                        • String ID:
                        • API String ID: 1849352358-0
                        • Opcode ID: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                        • Instruction ID: 68903ef9478fc0d920f95a79cd5396482650d24808bb52901199de5d2149753e
                        • Opcode Fuzzy Hash: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                        • Instruction Fuzzy Hash: 06F062B2A05114BFD701DBA4EE88CAF77BCEB44301B008576F501F2091C7389D019B79
                        APIs
                        • GetDC.USER32(?), ref: 00401D29
                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                        • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                        • ReleaseDC.USER32(?,00000000), ref: 00401D56
                        • CreateFontIndirectA.GDI32(0040A7D0), ref: 00401DA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CapsCreateDeviceFontIndirectRelease
                        • String ID:
                        • API String ID: 3808545654-0
                        • Opcode ID: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                        • Instruction ID: b452d76144ce78c1ea2c31cbd89393ff29a213aa8dcca448cc35c7c7cb6754f7
                        • Opcode Fuzzy Hash: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                        • Instruction Fuzzy Hash: F8011271948340AFE701DBB0AE0EB9A7F74EB19705F108535F141B72E2C6B954159B2F
                        APIs
                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: MessageSend$Timeout
                        • String ID: !
                        • API String ID: 1777923405-2657877971
                        • Opcode ID: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                        • Instruction ID: c8505a4ed1fbcfe48898eca751f608fe424cacc25c72cee6cab93c7adb8e4515
                        • Opcode Fuzzy Hash: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                        • Instruction Fuzzy Hash: 742190B1A44208BFEF41AFB4CD4AAAE7BB5EF40344F14453EF541B61D1D6B89A40E728
                        APIs
                        • SetWindowTextA.USER32(00000000,00422F00), ref: 00403AE4
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: TextWindow
                        • String ID: "C:\Users\user\Desktop\ORDER.exe"$1033$Stvkonsekvenserne115 Setup: Installing
                        • API String ID: 530164218-1565147467
                        • Opcode ID: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                        • Instruction ID: 694a286dd4981efc18ef326c294584d4bec2a1602357d8abc11fec8a6f834ca0
                        • Opcode Fuzzy Hash: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                        • Instruction Fuzzy Hash: EC11D4B1B046109BCB24DF15DC809337BBDEB8471A329813BE941A73A1C73D9E029A98
                        APIs
                        • FreeLibrary.KERNEL32(10000000,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,004036C9,75923410,004034D6,?), ref: 0040370C
                        • GlobalFree.KERNEL32(005A2468), ref: 00403713
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Free$GlobalLibrary
                        • String ID: C:\Users\user\AppData\Local\Temp\$h$Z
                        • API String ID: 1100898210-1121893004
                        • Opcode ID: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                        • Instruction ID: 0fe4964e98027e88380181352afc78dea88c0f551701ba437740c6db36bc47f5
                        • Opcode Fuzzy Hash: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                        • Instruction Fuzzy Hash: 0EE0EC7390512097C6215F96AD04B5ABB686B89B62F06842AED407B3A18B746C418BD9
                        APIs
                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 004057CC
                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923410,004033C9), ref: 004057D5
                        • lstrcatA.KERNEL32(?,00409014), ref: 004057E6
                        Strings
                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004057C6
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CharPrevlstrcatlstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\
                        • API String ID: 2659869361-823278215
                        • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                        • Instruction ID: c144259923a6e848a034fe90771ae4f3275bad2fdba58d127270a3e6eafdfb33
                        • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                        • Instruction Fuzzy Hash: 00D0A962606A306BD20222168C09E8F6A08CF06300B044033F204B62B2C63C0D418FFE
                        APIs
                        • GlobalFree.KERNEL32(005A5628), ref: 00401B80
                        • GlobalAlloc.KERNEL32(?,00000404), ref: 00401B92
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Global$AllocFree
                        • String ID: (VZ$Call
                        • API String ID: 3394109436-3675817806
                        • Opcode ID: 18ce383e7496548239e61a876cd1621fb13a91c8cdd195502931e4b9b56164df
                        • Instruction ID: f4ea3dfc62e5d1cff0d3b4274299d05e9f4495bdac059fa06bbe17ad9de4a94b
                        • Opcode Fuzzy Hash: 18ce383e7496548239e61a876cd1621fb13a91c8cdd195502931e4b9b56164df
                        • Instruction Fuzzy Hash: 1721C072A00211ABC720EBA4CE8895E73B9EB54714724C53BF505B32D0D77CE8119F2E
                        APIs
                        • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                        • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                        • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                        • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                          • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                        • String ID:
                        • API String ID: 1404258612-0
                        • Opcode ID: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                        • Instruction ID: 9791f4c70c1528f8983e13c97e2cb0ced061aec02aec85b9ff59acd402aedfa8
                        • Opcode Fuzzy Hash: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                        • Instruction Fuzzy Hash: A0117071901209BEDF01EFA5DD85DAEBBB9EF04344B20807AF505F61A1D7388E55DB28
                        APIs
                        • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040586D
                        • CharNextA.USER32(00000000), ref: 00405872
                        • CharNextA.USER32(00000000), ref: 00405886
                        Strings
                        • C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp, xrefs: 00405860
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CharNext
                        • String ID: C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp
                        • API String ID: 3213498283-613565320
                        • Opcode ID: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                        • Instruction ID: 725a23b4e930c3b6c27a7d0cd0e333612dd42f6c53d199a680129a9385ae8045
                        • Opcode Fuzzy Hash: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                        • Instruction Fuzzy Hash: 74F06253914F516AFB3276645C44B7B5A8CCF56361F188477EE40A62C2C2BC4C618F9A
                        APIs
                        • IsWindowVisible.USER32(?), ref: 00404FC2
                        • CallWindowProcA.USER32(?,?,?,?), ref: 00405013
                          • Part of subcall function 00404038: SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 0040404A
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: Window$CallMessageProcSendVisible
                        • String ID:
                        • API String ID: 3748168415-3916222277
                        • Opcode ID: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                        • Instruction ID: 01da3f5901ddaf9404fa7d81b8fd4ad62d8e53e58d7af57a61279808ed2d7cb1
                        • Opcode Fuzzy Hash: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                        • Instruction Fuzzy Hash: EA018F7110020DABDF209F11DC85E9F3B6AF784758F208037FA04752D1D77A8C92AAAE
                        APIs
                          • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                          • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 0040586D
                          • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                          • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0,00000000), ref: 00405907
                        • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp,?,?,75922EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00405917
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                        • String ID: C:\Users\user\AppData\Local\Temp\nsk7F1E.tmp
                        • API String ID: 3248276644-613565320
                        • Opcode ID: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                        • Instruction ID: cee4b60d78671bb78a10d3fddc0396ac835ea714c96625339261d657e7680c9f
                        • Opcode Fuzzy Hash: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                        • Instruction Fuzzy Hash: 0AF02823105D6026C63233391C09AAF1B95CE86368B24853FFC51B22D1DB3C8863DE7E
                        APIs
                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ORDER.exe,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 00405813
                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ORDER.exe,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 00405821
                        Strings
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: CharPrevlstrlen
                        • String ID: C:\Users\user\Desktop
                        • API String ID: 2709904686-1246513382
                        • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                        • Instruction ID: ba052d51ab232c33a65bcd29671eceb75c11827358d6bb1c4ef4a0a5cf44e1aa
                        • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                        • Instruction Fuzzy Hash: 94D0A77341AD701EE30372109C04B8F6A48CF16300F098462E440B61A0C2780C414BED
                        APIs
                        Memory Dump Source
                        • Source File: 00000000.00000002.4483513551.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                        • Associated: 00000000.00000002.4483489671.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483535957.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                        • Associated: 00000000.00000002.4483558022.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                        Similarity
                        • API ID: Global$Free$Alloc
                        • String ID:
                        • API String ID: 1780285237-0
                        • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                        • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                        • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                        • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                        APIs
                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                        • lstrcmpiA.KERNEL32(00405B5B,00000000), ref: 00405954
                        • CharNextA.USER32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 00405965
                        • lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                        Memory Dump Source
                        • Source File: 00000000.00000002.4481629863.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                        • Associated: 00000000.00000002.4481606772.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481651791.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481668395.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                        • Associated: 00000000.00000002.4481803084.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                        Joe Sandbox IDA Plugin
                        • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                        Similarity
                        • API ID: lstrlen$CharNextlstrcmpi
                        • String ID:
                        • API String ID: 190613189-0
                        • Opcode ID: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                        • Instruction ID: 6acf3bc3cda9f3bfd2525b0ac34aa546eab038af588102683640af0afc927a81
                        • Opcode Fuzzy Hash: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                        • Instruction Fuzzy Hash: 27F0C232604518FFC7129BA4DD40D9FBBA8EF06360B2500AAE800F7250D274EE019FAA