Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522729
MD5:d059de04a3a3332380335593782c6623
SHA1:0986639f0dda7184b816dfecf738c7064f399d48
SHA256:77090d1dc1644653d318a6de50c7d614113e58b8e0b320bc94d0edddcc067432
Tags:exeuser-jstrosch
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to query locales information (e.g. system language)
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains executable resources (Code or Archives)
PE file overlay found
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 7780 cmdline: "C:\Users\user\Desktop\file.exe" MD5: D059DE04A3A3332380335593782C6623)
    • Youbak_MSN_PARTNER2036.exe (PID: 7844 cmdline: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe /VERYSILENT /SP- /NORESTART MD5: D88681C275FD71F42CCAEE06E5901FC9)
      • Youbak_MSN_PARTNER2036.tmp (PID: 7860 cmdline: "C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp" /SL5="$20468,737659,54272,C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTART MD5: 29BB632F057F068130E8A7877781A05D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeReversingLabs: Detection: 30%
Source: file.exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 84.9% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004053D0 DeleteFileA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_004053D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405DDF FindFirstFileA,FindClose,0_2_00405DDF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402684 FindFirstFileA,0_2_00402684
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00451C48 FindFirstFileA,GetLastError,3_2_00451C48
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00462C34 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_00462C34
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004630B0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_004630B0
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004616A8 FindFirstFileA,FindNextFileA,FindClose,3_2_004616A8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004737F4 FindFirstFileA,FindNextFileA,FindClose,3_2_004737F4
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00495D6C FindFirstFileA,6D1682A0,FindNextFileA,FindClose,3_2_00495D6C
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dllJump to behavior
Source: Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410581975.0000000001F61000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410461810.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1414237770.0000000001F61000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413320314.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413350798.000000000221C000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413025183.0000000002214000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413288845.0000000002204000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1412703141.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413084543.0000000002218000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1412630705.0000000003100000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://msn.youbak.com
Source: Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410461810.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1412630705.0000000003100000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://msn.youbak.com#
Source: Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410581975.0000000001F61000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1414237770.0000000001F61000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://msn.youbak.com2
Source: file.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: file.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: Youbak_MSN_PARTNER2036.tmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000000.1411540739.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Youbak_MSN_PARTNER2036.tmp.2.drString found in binary or memory: http://www.innosetup.com/
Source: Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1411073569.0000000001F68000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410907677.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000000.1411540739.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Youbak_MSN_PARTNER2036.tmp.2.drString found in binary or memory: http://www.remobjects.com/ps
Source: Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1411073569.0000000001F68000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410907677.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000000.1411540739.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Youbak_MSN_PARTNER2036.tmp.2.drString found in binary or memory: http://www.remobjects.com/psU
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404F66 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404F66
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00423AF4 NtdllDefWindowProc_A,3_2_00423AF4
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00456060 PostMessageA,PostMessageA,SetForegroundWindow,NtdllDefWindowProc_A,3_2_00456060
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00412548 NtdllDefWindowProc_A,3_2_00412548
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00476D78 NtdllDefWindowProc_A,3_2_00476D78
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0042F000 NtdllDefWindowProc_A,3_2_0042F000
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0042E6A0: 6D1674B0,DeviceIoControl,GetLastError,CloseHandle,SetLastError,3_2_0042E6A0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403121 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403121
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_004093A8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_004093A8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00454680 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_00454680
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004047470_2_00404747
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004060FD0_2_004060FD
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_0040836C2_2_0040836C
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0047E6EB3_2_0047E6EB
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0048B8903_2_0048B890
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0045E0383_2_0045E038
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0045A0E03_2_0045A0E0
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004662DC3_2_004662DC
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004683543_2_00468354
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004846543_2_00484654
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004446283_2_00444628
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004347883_2_00434788
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004309C83_2_004309C8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00444A343_2_00444A34
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00450BA43_2_00450BA4
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0046F1283_2_0046F128
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0043D2103_2_0043D210
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004855883_2_00485588
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004439883_2_00443988
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00433A843_2_00433A84
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0042FE3C3_2_0042FE3C
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00443F303_2_00443F30
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_RegDLL.tmp 4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00405964 appears 106 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00406A2C appears 38 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 0043399C appears 32 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 004567E0 appears 95 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00403400 appears 59 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00445564 appears 59 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 0045252C appears 90 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 0040785C appears 43 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00408B74 appears 45 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00403494 appears 83 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 004569EC appears 70 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00403684 appears 215 times
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: String function: 00445294 appears 45 times
Source: Youbak_MSN_PARTNER2036.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: Youbak_MSN_PARTNER2036.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) x86-64, for MS Windows
Source: Youbak_MSN_PARTNER2036.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (console) Intel Itanium, for MS Windows
Source: Youbak_MSN_PARTNER2036.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
Source: Youbak_MSN_PARTNER2036.tmp.2.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
Source: Youbak_MSN_PARTNER2036.tmp.2.drStatic PE information: Resource name: RT_VERSION type: 370 sysV pure executable not stripped
Source: SelfDel.dll.0.drStatic PE information: Data appended to the last section found
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: _RegDLL.tmp.3.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SelfDel.dll.0.drStatic PE information: Section: .reloc ZLIB complexity 1.0891089108910892
Source: classification engineClassification label: mal72.winEXE@5/6@0/0
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_004093A8 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,2_2_004093A8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00454680 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,3_2_00454680
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00404232 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,GetDiskFreeSpaceA,MulDiv,0_2_00404232
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402067 CoCreateInstance,MultiByteToWideChar,0_2_00402067
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00409B0C FindResourceA,SizeofResource,LoadResource,LockResource,2_2_00409B0C
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\nsy299C.tmpJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOrganizationJump to behavior
Source: file.exeReversingLabs: Detection: 68%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe /VERYSILENT /SP- /NORESTART
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeProcess created: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp "C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp" /SL5="$20468,737659,54272,C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTART
Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe /VERYSILENT /SP- /NORESTARTJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeProcess created: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp "C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp" /SL5="$20468,737659,54272,C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTARTJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: acgenral.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion RegisteredOwnerJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405E06 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E06
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00406518 push 00406555h; ret 2_2_0040654D
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00408064 push ecx; mov dword ptr [esp], eax2_2_00408069
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_004040B5 push eax; ret 2_2_004040F1
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00404185 push 00404391h; ret 2_2_00404389
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00404206 push 00404391h; ret 2_2_00404389
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_0040C218 push eax; ret 2_2_0040C219
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_004042E8 push 00404391h; ret 2_2_00404389
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00404283 push 00404391h; ret 2_2_00404389
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00408E98 push 00408ECBh; ret 2_2_00408EC3
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004098B4 push 004098F1h; ret 3_2_004098E9
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004062CC push ecx; mov dword ptr [esp], eax3_2_004062CD
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004582F4 push 00458338h; ret 3_2_00458330
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00410640 push ecx; mov dword ptr [esp], edx3_2_00410645
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0040A6C8 push esp; retf 3_2_0040A6D1
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00492898 push ecx; mov dword ptr [esp], ecx3_2_0049289D
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00412898 push 004128FBh; ret 3_2_004128F3
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00442900 push ecx; mov dword ptr [esp], ecx3_2_00442904
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004509E0 push 00450A13h; ret 3_2_00450A0B
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00456A88 push 00456AC0h; ret 3_2_00456AB8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00450BA4 push ecx; mov dword ptr [esp], eax3_2_00450BA9
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0045EC90 push ecx; mov dword ptr [esp], ecx3_2_0045EC94
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00482EFC push ecx; mov dword ptr [esp], ecx3_2_00482F01
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0040CF98 push ecx; mov dword ptr [esp], edx3_2_0040CF9A
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0040546D push eax; ret 3_2_004054A9
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0040F4F8 push ecx; mov dword ptr [esp], edx3_2_0040F4FA
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0040553D push 00405749h; ret 3_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004055BE push 00405749h; ret 3_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0040563B push 00405749h; ret 3_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004056A0 push 00405749h; ret 3_2_00405741
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004818A8 push 00481986h; ret 3_2_0048197E
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00419B98 push ecx; mov dword ptr [esp], ecx3_2_00419B9D
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpFile created: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpFile created: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpFile created: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeFile created: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,3_2_00423B7C
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00423B7C IsIconic,PostMessageA,PostMessageA,PostMessageA,SendMessageA,IsWindowEnabled,IsWindowEnabled,IsWindowVisible,GetFocus,SetFocus,SetFocus,IsIconic,GetFocus,SetFocus,3_2_00423B7C
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0042414C IsIconic,SetActiveWindow,SetFocus,3_2_0042414C
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00424104 IsIconic,SetActiveWindow,3_2_00424104
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004182F4 IsIconic,GetWindowPlacement,GetWindowRect,GetWindowLongA,GetWindowLongA,ScreenToClient,ScreenToClient,3_2_004182F4
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004227CC SendMessageA,ShowWindow,ShowWindow,CallWindowProcA,SendMessageA,ShowWindow,SetWindowPos,GetActiveWindow,IsIconic,SetWindowPos,SetActiveWindow,ShowWindow,3_2_004227CC
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00481264 IsIconic,GetWindowLongA,ShowWindow,ShowWindow,3_2_00481264
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00417508 IsIconic,GetCapture,3_2_00417508
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00417C40 IsIconic,SetWindowPos,GetWindowPlacement,SetWindowPlacement,3_2_00417C40
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00417C3E IsIconic,SetWindowPos,3_2_00417C3E
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_shfoldr.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_RegDLL.tmpJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_setup64.tmpJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dllJump to dropped file
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeEvasive API call chain: GetSystemTime,DecisionNodesgraph_2-5936
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpAPI coverage: 9.1 %
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004053D0 DeleteFileA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_004053D0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405DDF FindFirstFileA,FindClose,0_2_00405DDF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402684 FindFirstFileA,0_2_00402684
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00451C48 FindFirstFileA,GetLastError,3_2_00451C48
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00462C34 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_00462C34
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004630B0 SetErrorMode,FindFirstFileA,FindNextFileA,FindClose,SetErrorMode,3_2_004630B0
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004616A8 FindFirstFileA,FindNextFileA,FindClose,3_2_004616A8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004737F4 FindFirstFileA,FindNextFileA,FindClose,3_2_004737F4
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00495D6C FindFirstFileA,6D1682A0,FindNextFileA,FindClose,3_2_00495D6C
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_00409A50 GetSystemInfo,VirtualQuery,VirtualProtect,VirtualProtect,VirtualQuery,2_2_00409A50
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeAPI call chain: ExitProcess graph end nodegraph_0-3290
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405E06 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405E06
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004767BC ShellExecuteEx,GetLastError,MsgWaitForMultipleObjects,GetExitCodeProcess,CloseHandle,3_2_004767BC
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_0045BB2C GetVersion,GetModuleHandleA,6D166DE0,6D166DE0,6D166DE0,AllocateAndInitializeSid,GetLastError,LocalFree,3_2_0045BB2C
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: GetLocaleInfoA,2_2_0040515C
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: GetLocaleInfoA,2_2_004051A8
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: GetLocaleInfoA,3_2_004084D0
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: GetLocaleInfoA,3_2_0040851C
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_004575EC GetTickCount,QueryPerformanceCounter,GetSystemTimeAsFileTime,GetCurrentProcessId,CreateNamedPipeA,GetLastError,6D1674B0,SetNamedPipeHandleState,CreateProcessA,CloseHandle,CloseHandle,3_2_004575EC
Source: C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exeCode function: 2_2_004026C4 GetSystemTime,2_2_004026C4
Source: C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmpCode function: 3_2_00454638 GetUserNameA,3_2_00454638
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00405AEE GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,0_2_00405AEE
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Access Token Manipulation
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
Access Token Manipulation
2
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop Protocol1
Clipboard Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
Process Injection
1
Deobfuscate/Decode Files or Information
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
2
Obfuscated Files or Information
NTDS1
Account Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Software Packing
LSA Secrets3
System Owner/User Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials3
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync15
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe68%ReversingLabsWin32.Trojan.Generic
file.exe100%AviraTR/Drop.NSIS.ux.1
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe30%ReversingLabsWin32.PUA.Creprote
C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_RegDLL.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_setup64.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_shfoldr.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp5%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.innosetup.com/0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://www.remobjects.com/ps0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.innosetup.com/Youbak_MSN_PARTNER2036.tmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000000.1411540739.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Youbak_MSN_PARTNER2036.tmp.2.drfalse
  • URL Reputation: safe
unknown
http://nsis.sf.net/NSIS_Errorfile.exefalse
    unknown
    http://www.remobjects.com/psUYoubak_MSN_PARTNER2036.exe, 00000002.00000003.1411073569.0000000001F68000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410907677.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000000.1411540739.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Youbak_MSN_PARTNER2036.tmp.2.drfalse
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorfile.exefalse
      • URL Reputation: safe
      unknown
      http://www.remobjects.com/psYoubak_MSN_PARTNER2036.exe, 00000002.00000003.1411073569.0000000001F68000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410907677.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000000.1411540739.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Youbak_MSN_PARTNER2036.tmp.2.drfalse
      • URL Reputation: safe
      unknown
      http://msn.youbak.com2Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410581975.0000000001F61000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1414237770.0000000001F61000.00000004.00001000.00020000.00000000.sdmpfalse
        unknown
        http://msn.youbak.com#Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410461810.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1412630705.0000000003100000.00000004.00001000.00020000.00000000.sdmpfalse
          unknown
          http://msn.youbak.comYoubak_MSN_PARTNER2036.exe, 00000002.00000003.1410581975.0000000001F61000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1410461810.00000000021D0000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.exe, 00000002.00000003.1414237770.0000000001F61000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413320314.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413350798.000000000221C000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413025183.0000000002214000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413288845.0000000002204000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1412703141.00000000021E8000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1413084543.0000000002218000.00000004.00001000.00020000.00000000.sdmp, Youbak_MSN_PARTNER2036.tmp, 00000003.00000003.1412630705.0000000003100000.00000004.00001000.00020000.00000000.sdmpfalse
            unknown
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1522729
            Start date and time:2024-09-30 16:09:37 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 3m 19s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:4
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:file.exe
            Detection:MAL
            Classification:mal72.winEXE@5/6@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 95%
            • Number of executed functions: 113
            • Number of non-executed functions: 210
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Stop behavior analysis, all processes terminated
            • Exclude process from analysis (whitelisted): dllhost.exe
            • VT rate limit hit for: file.exe
            No simulations
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\is-3T87F.tmp\_isetup\_RegDLL.tmpnoode.exeGet hashmaliciousSocks5SystemzBrowse
              file.exeGet hashmaliciousLummaC, Clipboard Hijacker, Cryptbot, LummaC Stealer, Neoreklami, PrivateLoader, Socks5SystemzBrowse
                AX3-GUI-45.exeGet hashmaliciousUnknownBrowse
                  file.exeGet hashmaliciousHTMLPhisherBrowse
                    AX3-GUI-45.exeGet hashmaliciousUnknownBrowse
                      qgdf1HLJno.exeGet hashmaliciousSocks5SystemzBrowse
                        file.exeGet hashmaliciousSocks5SystemzBrowse
                          file.exeGet hashmaliciousSocks5SystemzBrowse
                            install.exeGet hashmaliciousSocks5SystemzBrowse
                              install.exeGet hashmaliciousSocks5SystemzBrowse
                                Process:C:\Users\user\Desktop\file.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):1013672
                                Entropy (8bit):7.979782969395591
                                Encrypted:false
                                SSDEEP:24576:620b+HGfS428aNS656djjsIJybodIpp6nOJXo3mJvU2C6/UIhW0j:62xGfS6uS65wj7skdIHBomJvBC6/5j
                                MD5:D88681C275FD71F42CCAEE06E5901FC9
                                SHA1:3F051192A4EA9722D139CEA2E7D7AEF860880253
                                SHA-256:980E63C8F1C312D3DDA44B1FC79CC937357A36C585FCDA7C51A433E36F1600A5
                                SHA-512:F096DE74E29554D8960803F272D5C8CD37304D5FCC55D54287D0BD24901C6BF6CF9CA0B33F4D3EE96CDCE5FAB50248ABE9332E5EB47066EB32EE5102737D2D86
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 30%
                                Reputation:low
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................<......`.............@..........................@.......-...........@..............................P........&..........._..............................................................................................CODE................................ ..`DATA....L...........................@...BSS.....T................................idata..P...........................@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....,.......,..................@..P.............@......................@..P........................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):4096
                                Entropy (8bit):4.026670007889822
                                Encrypted:false
                                SSDEEP:48:ivuz1hEU3FR/pmqBl8/QMCBaquEMx5BC+SS4k+bkguj0KHc:bz1eEFNcqBC/Qrex5iSKDkc
                                MD5:0EE914C6F0BB93996C75941E1AD629C6
                                SHA1:12E2CB05506EE3E82046C41510F39A258A5E5549
                                SHA-256:4DC09BAC0613590F1FAC8771D18AF5BE25A1E1CB8FDBF4031AA364F3057E74A2
                                SHA-512:A899519E78125C69DC40F7E371310516CF8FAA69E3B3FF747E0DDF461F34E50A9FF331AB53B4D07BB45465039E8EBA2EE4684B3EE56987977AE8C7721751F5F9
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: noode.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: AX3-GUI-45.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: AX3-GUI-45.exe, Detection: malicious, Browse
                                • Filename: qgdf1HLJno.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: file.exe, Detection: malicious, Browse
                                • Filename: install.exe, Detection: malicious, Browse
                                • Filename: install.exe, Detection: malicious, Browse
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................H................|.......|.......|......Rich............PE..L....M;J..................................... ....@..........................@..............................................l ..P....0..@............................................................................ ..D............................text............................... ..`.rdata....... ......................@..@.rsrc...@....0......................@..@................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp
                                File Type:PE32+ executable (console) x86-64, for MS Windows
                                Category:dropped
                                Size (bytes):6144
                                Entropy (8bit):4.215994423157539
                                Encrypted:false
                                SSDEEP:96:sfkcXegaJ/ZAYNzcld1xaX12pS5SKvkc:sfJEVYlvxaX12EF
                                MD5:4FF75F505FDDCC6A9AE62216446205D9
                                SHA1:EFE32D504CE72F32E92DCF01AA2752B04D81A342
                                SHA-256:A4C86FC4836AC728D7BD96E7915090FD59521A9E74F1D06EF8E5A47C8695FD81
                                SHA-512:BA0469851438212D19906D6DA8C4AE95FF1C0711A095D9F21F13530A6B8B21C3ACBB0FF55EDB8A35B41C1A9A342F5D3421C00BA395BC13BB1EF5902B979CE824
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......^...............l...............=\......=\......=\......Rich............................PE..d...XW:J..........#............................@.............................`..............................................................<!.......P..@....@..0.................................................................... ...............................text............................... ..`.rdata..|.... ......................@..@.data...,....0......................@....pdata..0....@......................@..@.rsrc...@....P......................@..@................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp
                                File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                Category:dropped
                                Size (bytes):23312
                                Entropy (8bit):4.596242908851566
                                Encrypted:false
                                SSDEEP:384:+Vm08QoKkiWZ76UJuP71W55iWHHoSHigH2euwsHTGHVb+VHHmnH+aHjHqLHxmoq1:2m08QotiCjJuPGw4
                                MD5:92DC6EF532FBB4A5C3201469A5B5EB63
                                SHA1:3E89FF837147C16B4E41C30D6C796374E0B8E62C
                                SHA-256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
                                SHA-512:9908E573921D5DBC3454A1C0A6C969AB8A81CC2E8B5385391D46B1A738FB06A76AA3282E0E58D0D2FFA6F27C85668CD5178E1500B8A39B1BBAE04366AE6A86D3
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:high, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......IzJ^..$...$...$...%.".$.T87...$.[."...$...$...$.Rich..$.........................PE..L.....\;...........#..... ...4.......'.......0.....q....................................................................k...l)..<....@.../...................p..T....................................................................................text...{........ .................. ..`.data...\....0.......&..............@....rsrc..../...@...0...(..............@..@.reloc.......p.......X..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):711168
                                Entropy (8bit):6.4824409777908265
                                Encrypted:false
                                SSDEEP:12288:ruA/arACiIrPe37lzH6A64EGYHuXsr5aER+gjrNAFR9FXsvy8ddXEx9O:rN/arRiIrPe37lzH6A604cs1aEcdFXGH
                                MD5:29BB632F057F068130E8A7877781A05D
                                SHA1:10060581EB95E61D6AC8176F692A2AE251149B32
                                SHA-256:13065EC81BFDF70D1074F8FB90F6EAECAE531B76E71BA1542F3CEFC41A9E29C1
                                SHA-512:0B66548EA8690D755566054F42A3886AC983F8402AFD8FF27923F092A71C8404E16ADD8393D314EA056698F51AB0F3260C882C1447B35F73B1830458E70FD405
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 5%
                                Reputation:low
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.................\...z......(h.......p....@..............................................@...............................%......,:..........................................................................................................CODE....`Z.......\.................. ..`DATA.........p.......`..............@...BSS..................r...................idata...%.......&...r..............@....tls.....................................rdata..............................@..P.reloc..............................@..P.rsrc....@.......@..................@..P.....................d..............@..P........................................................................................................................................
                                Process:C:\Users\user\Desktop\file.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3685
                                Entropy (8bit):3.714680021364841
                                Encrypted:false
                                SSDEEP:48:qgvd++4+SbkYisPkqipl8KWPvPeMfkR0CXB7AQmJTGIO:T++4+S4YLPFir7WPvPeOkmaZmTE
                                MD5:A65AC18F3C745C333818BA4C142639AB
                                SHA1:A1737E61EB67FB3BAB5A11CB4CEFFAB8BF2A7EBB
                                SHA-256:0C4DF5E0FE04106829C80865D075E992F0A212878C4AFF947FAB9236C991A611
                                SHA-512:75275DC1F0324A53634356E2A1F8DBC8800EE8DD3151721B8B95FFA360869831D45037C4FC6DBDF25DF4176453A4DC244FD7C83C7B776651920758081B0C120D
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......i.j.-...-...-...-...;...O.......r...,......,...Rich-...........................PE..L......C...........!................)........ ...............................P......................................p"..B...\ ..(............................@..X.................................................... ..\............................text.../........................... ..`.rdata....... ......................@..@.data...0....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):7.98633319316565
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 92.16%
                                • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:file.exe
                                File size:1'043'948 bytes
                                MD5:d059de04a3a3332380335593782c6623
                                SHA1:0986639f0dda7184b816dfecf738c7064f399d48
                                SHA256:77090d1dc1644653d318a6de50c7d614113e58b8e0b320bc94d0edddcc067432
                                SHA512:dd73df3b1613d02e518c2698bd13b4d7f4cabfba3a3fc11242a8ff17c28a3574b9b59a4d8fc83215de1e7e4cf7809f780d96c64e7e5fe1b117c15e10245bdf6b
                                SSDEEP:24576:jM41a59Lh+PQkqyfIy5JrtqMf8PKM0B/B6QDAAuggo4zqIthbx:oBbYPQZyfIy5JhXfwKMA6Q7uggo4zqo
                                TLSH:9C25332A51C0C863EA6951F1A070F639C342FDAE15EC2B4BA7719FCB1C3644E95E60DE
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1H..u)..u)..u)...&..w)..u)...)...&..d)...6...).../..t)..Richu)..........PE..L.....:J.................\..........!1.......p....@
                                Icon Hash:0771ccf8d84d2907
                                Entrypoint:0x403121
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                Time Stamp:0x4A3AB2A3 [Thu Jun 18 21:33:23 2009 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:7fa974366048f9c551ef45714595665e
                                Instruction
                                sub esp, 00000180h
                                push ebx
                                push ebp
                                push esi
                                xor ebx, ebx
                                push edi
                                mov dword ptr [esp+18h], ebx
                                mov dword ptr [esp+10h], 0040915Ch
                                xor esi, esi
                                mov byte ptr [esp+14h], 00000020h
                                call dword ptr [00407030h]
                                push 00008001h
                                call dword ptr [004070B0h]
                                push ebx
                                call dword ptr [0040727Ch]
                                push 00000008h
                                mov dword ptr [00423F18h], eax
                                call 00007F8FA483E0A7h
                                mov dword ptr [00423E64h], eax
                                push ebx
                                lea eax, dword ptr [esp+34h]
                                push 00000160h
                                push eax
                                push ebx
                                push 0041F424h
                                call dword ptr [00407158h]
                                push 00409150h
                                push 00423660h
                                call 00007F8FA483DD30h
                                call dword ptr [004070ACh]
                                mov edi, 00429000h
                                push eax
                                push edi
                                call 00007F8FA483DD1Eh
                                push ebx
                                call dword ptr [0040710Ch]
                                cmp byte ptr [00429000h], 00000022h
                                mov dword ptr [00423E60h], eax
                                mov eax, edi
                                jne 00007F8FA483B40Ch
                                mov byte ptr [esp+14h], 00000022h
                                mov eax, 00429001h
                                push dword ptr [esp+14h]
                                push eax
                                call 00007F8FA483D807h
                                push eax
                                call dword ptr [0040721Ch]
                                mov dword ptr [esp+1Ch], eax
                                mov cl, byte ptr [eax]
                                cmp cl, bl
                                je 00007F8FA483B478h
                                cmp cl, 00000020h
                                jne 00007F8FA483B408h
                                inc eax
                                cmp byte ptr [eax], 00000020h
                                je 00007F8FA483B3FCh
                                Programming Language:
                                • [ C ] VS98 (6.0) build 8168
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x3b28.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x5a380x5c00092e164daa50385128d3c5b319373035False0.659561820652174data6.403453617755814IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x70000x11900x12004e7f519777030dd2f0ea0d2092babed3False0.4453125data5.179614628422092IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x90000x1af580x400f6d93c048bf148a2daee8a6b0505e38bFalse0.548828125data4.617894309842985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x240000x80000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x2c0000x3b280x3c002f4b4cedcb97ecfcfeb35b10d8fd2983False0.6352864583333333data5.87475845713189IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x2c2680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                                RT_ICON0x2d3100xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                                RT_ICON0x2e1b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                                RT_ICON0x2ea600x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                                RT_ICON0x2efc80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                                RT_ICON0x2f4300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                                RT_ICON0x2f7180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                                RT_DIALOG0x2f8400x100dataEnglishUnited States0.5234375
                                RT_DIALOG0x2f9400x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0x2fa600x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0x2fac00x68dataEnglishUnited States0.6634615384615384
                                DLLImport
                                KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                No network behavior found

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:10:10:31
                                Start date:30/09/2024
                                Path:C:\Users\user\Desktop\file.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\file.exe"
                                Imagebase:0x400000
                                File size:1'043'948 bytes
                                MD5 hash:D059DE04A3A3332380335593782C6623
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:10:10:31
                                Start date:30/09/2024
                                Path:C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe /VERYSILENT /SP- /NORESTART
                                Imagebase:0x400000
                                File size:1'013'672 bytes
                                MD5 hash:D88681C275FD71F42CCAEE06E5901FC9
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 30%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:10:10:32
                                Start date:30/09/2024
                                Path:C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\is-K5V3G.tmp\Youbak_MSN_PARTNER2036.tmp" /SL5="$20468,737659,54272,C:\Users\user\AppData\Local\Temp\Youbak_MSN_PARTNER2036.exe" /VERYSILENT /SP- /NORESTART
                                Imagebase:0x400000
                                File size:711'168 bytes
                                MD5 hash:29BB632F057F068130E8A7877781A05D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 5%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:14.7%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:21.3%
                                  Total number of Nodes:1298
                                  Total number of Limit Nodes:23
                                  execution_graph 3512 401b41 3513 401b95 3512->3513 3519 401b4e 3512->3519 3514 401b99 3513->3514 3515 401bbe GlobalAlloc 3513->3515 3525 401bd9 3514->3525 3533 405aba lstrcpynA 3514->3533 3517 405aee 18 API calls 3515->3517 3516 40223f 3518 405aee 18 API calls 3516->3518 3517->3525 3521 40224c 3518->3521 3519->3516 3522 401b68 3519->3522 3526 40535f MessageBoxIndirectA 3521->3526 3531 405aba lstrcpynA 3522->3531 3523 401bab GlobalFree 3523->3525 3526->3525 3527 401b77 3532 405aba lstrcpynA 3527->3532 3529 401b86 3534 405aba lstrcpynA 3529->3534 3531->3527 3532->3529 3533->3523 3534->3525 3535 4026c2 3536 402a3c 18 API calls 3535->3536 3538 4026d0 3536->3538 3537 4026e6 3539 405770 2 API calls 3537->3539 3538->3537 3540 402a3c 18 API calls 3538->3540 3541 4026ec 3539->3541 3540->3537 3561 40578f GetFileAttributesA CreateFileA 3541->3561 3543 4026f9 3544 4027a2 3543->3544 3545 402705 GlobalAlloc 3543->3545 3548 4027aa DeleteFileA 3544->3548 3549 4027bd 3544->3549 3546 402799 CloseHandle 3545->3546 3547 40271e 3545->3547 3546->3544 3562 4030d6 SetFilePointer 3547->3562 3548->3549 3551 402724 3552 4030a4 ReadFile 3551->3552 3553 40272d GlobalAlloc 3552->3553 3554 402771 WriteFile GlobalFree 3553->3554 3555 40273d 3553->3555 3556 402eb2 34 API calls 3554->3556 3557 402eb2 34 API calls 3555->3557 3558 402796 3556->3558 3559 40274a 3557->3559 3558->3546 3560 402768 GlobalFree 3559->3560 3560->3554 3561->3543 3562->3551 3563 4027c3 3577 402a1f 3563->3577 3565 4027c9 3566 402804 3565->3566 3567 4027ed 3565->3567 3574 4026a2 3565->3574 3568 40281a 3566->3568 3569 40280e 3566->3569 3570 402801 3567->3570 3571 4027f2 3567->3571 3573 405aee 18 API calls 3568->3573 3572 402a1f 18 API calls 3569->3572 3570->3574 3581 405a17 wsprintfA 3570->3581 3580 405aba lstrcpynA 3571->3580 3572->3570 3573->3570 3578 405aee 18 API calls 3577->3578 3579 402a33 3578->3579 3579->3565 3580->3574 3581->3574 3582 404747 GetDlgItem GetDlgItem 3583 404797 7 API calls 3582->3583 3587 4049c0 3582->3587 3584 404832 SendMessageA 3583->3584 3585 40483e DeleteObject 3583->3585 3584->3585 3586 40484f 3585->3586 3588 404889 3586->3588 3592 405aee 18 API calls 3586->3592 3594 404a9e 3587->3594 3614 404a27 3587->3614 3639 4046c7 SendMessageA 3587->3639 3632 403df3 3588->3632 3589 404b58 3590 404b62 SendMessageA 3589->3590 3591 404b6c 3589->3591 3590->3591 3601 404b85 3591->3601 3602 404b7e ImageList_Destroy 3591->3602 3609 404b95 3591->3609 3596 404867 SendMessageA SendMessageA 3592->3596 3594->3589 3600 404b00 SendMessageA 3594->3600 3626 4049b3 3594->3626 3595 404a8f SendMessageA 3595->3594 3596->3586 3605 404b17 SendMessageA 3600->3605 3600->3626 3607 404b8e GlobalFree 3601->3607 3601->3609 3602->3601 3603 403df3 19 API calls 3613 4048ae 3603->3613 3606 404b2b 3605->3606 3615 404b3d SendMessageA 3606->3615 3607->3609 3608 404c43 3612 404c51 ShowWindow GetDlgItem ShowWindow 3608->3612 3608->3626 3609->3608 3619 401430 2 API calls 3609->3619 3628 404bcc 3609->3628 3610 404981 GetWindowLongA SetWindowLongA 3611 40499a 3610->3611 3616 4049a0 ShowWindow 3611->3616 3617 4049b8 3611->3617 3612->3626 3613->3610 3618 4048fc SendMessageA 3613->3618 3621 40497b 3613->3621 3624 404938 SendMessageA 3613->3624 3625 404949 SendMessageA 3613->3625 3614->3594 3614->3595 3615->3589 3637 403e28 SendMessageA 3616->3637 3638 403e28 SendMessageA 3617->3638 3618->3613 3619->3628 3620 404c10 3644 404c92 3620->3644 3621->3610 3621->3611 3624->3613 3625->3613 3661 403e5a 3626->3661 3628->3620 3629 404bfb SendMessageA 3628->3629 3629->3620 3630 404c25 3630->3608 3649 4045e1 3630->3649 3633 405aee 18 API calls 3632->3633 3634 403dfe 3633->3634 3675 40532e SetDlgItemTextA 3634->3675 3636 403e12 3636->3603 3637->3626 3638->3587 3640 404726 SendMessageA 3639->3640 3641 4046ea GetMessagePos ScreenToClient SendMessageA 3639->3641 3642 40471e 3640->3642 3641->3642 3643 404723 3641->3643 3642->3614 3643->3640 3645 404d62 InvalidateRect 3644->3645 3647 404cb5 3644->3647 3645->3630 3646 404d60 3646->3645 3647->3646 3648 404d09 SendMessageA SendMessageA 3647->3648 3648->3647 3650 4045fb 3649->3650 3651 405aee 18 API calls 3650->3651 3652 404630 3651->3652 3653 405aee 18 API calls 3652->3653 3654 40463b 3653->3654 3655 405aee 18 API calls 3654->3655 3656 40466c 3655->3656 3676 405ad0 lstrlenA 3656->3676 3658 404674 wsprintfA 3677 40532e SetDlgItemTextA 3658->3677 3660 40468f 3660->3608 3662 403e72 GetWindowLongA 3661->3662 3672 403efb 3661->3672 3663 403e83 3662->3663 3662->3672 3664 403e92 GetSysColor 3663->3664 3665 403e95 3663->3665 3664->3665 3666 403ea5 SetBkMode 3665->3666 3667 403e9b SetTextColor 3665->3667 3668 403ec3 3666->3668 3669 403ebd GetSysColor 3666->3669 3667->3666 3670 403eca SetBkColor 3668->3670 3671 403ed4 3668->3671 3669->3668 3670->3671 3671->3672 3673 403ee7 DeleteObject 3671->3673 3674 403eee CreateBrushIndirect 3671->3674 3673->3674 3674->3672 3675->3636 3676->3658 3677->3660 3678 402347 3679 40234d 3678->3679 3680 402a3c 18 API calls 3679->3680 3681 40235f 3680->3681 3682 402a3c 18 API calls 3681->3682 3683 402369 RegCreateKeyExA 3682->3683 3684 4028d1 3683->3684 3685 402393 3683->3685 3686 4023aa 3685->3686 3687 402a3c 18 API calls 3685->3687 3688 4023b7 3686->3688 3691 402a1f 18 API calls 3686->3691 3690 4023a4 3687->3690 3689 4023d2 RegSetValueExA 3688->3689 3692 402eb2 34 API calls 3688->3692 3693 4023e8 RegCloseKey 3689->3693 3696 405ad0 lstrlenA 3690->3696 3691->3688 3692->3689 3693->3684 3696->3686 3697 402849 3698 402a1f 18 API calls 3697->3698 3699 40284f 3698->3699 3700 402880 3699->3700 3701 4026a2 3699->3701 3703 40285d 3699->3703 3700->3701 3702 405aee 18 API calls 3700->3702 3702->3701 3703->3701 3705 405a17 wsprintfA 3703->3705 3705->3701 3706 40254a 3707 402a1f 18 API calls 3706->3707 3710 402554 3707->3710 3708 4025ca 3709 402588 ReadFile 3709->3708 3709->3710 3710->3708 3710->3709 3711 4025cc 3710->3711 3712 4025dc 3710->3712 3715 405a17 wsprintfA 3711->3715 3712->3708 3714 4025f2 SetFilePointer 3712->3714 3714->3708 3715->3708 3716 401cce 3717 402a1f 18 API calls 3716->3717 3718 401cd5 3717->3718 3719 402a1f 18 API calls 3718->3719 3720 401cdd GetDlgItem 3719->3720 3721 4024fc 3720->3721 3386 401752 3392 402a3c 3386->3392 3389 4057be 2 API calls 3390 401760 3389->3390 3391 4057be 2 API calls 3390->3391 3391->3390 3393 402a48 3392->3393 3394 405aee 18 API calls 3393->3394 3396 402a69 3394->3396 3395 401759 3395->3389 3396->3395 3397 405d46 5 API calls 3396->3397 3397->3395 3729 4014d7 3730 4014dd 3729->3730 3731 4013ac 2 API calls 3730->3731 3732 4014e5 3731->3732 3733 402659 3734 402660 3733->3734 3736 401744 3733->3736 3735 40266d FindNextFileA 3734->3735 3735->3736 3737 40267c 3735->3737 3739 405aba lstrcpynA 3737->3739 3739->3736 3740 401dd9 3741 402a1f 18 API calls 3740->3741 3742 401ddf 3741->3742 3743 402a1f 18 API calls 3742->3743 3744 401de8 3743->3744 3745 401dfa EnableWindow 3744->3745 3746 401def ShowWindow 3744->3746 3747 4028d1 3745->3747 3746->3747 3472 4015db 3473 402a3c 18 API calls 3472->3473 3474 4015e2 3473->3474 3475 405637 4 API calls 3474->3475 3482 4015ea 3475->3482 3476 401632 3477 401655 3476->3477 3478 401637 3476->3478 3485 401448 22 API calls 3477->3485 3480 401448 22 API calls 3478->3480 3479 4055ce CharNextA 3481 4015f8 CreateDirectoryA 3479->3481 3484 40163e 3480->3484 3481->3482 3483 40160d GetLastError 3481->3483 3482->3476 3482->3479 3483->3482 3486 40161a GetFileAttributesA 3483->3486 3490 405aba lstrcpynA 3484->3490 3489 4021ad 3485->3489 3486->3482 3488 401649 SetCurrentDirectoryA 3488->3489 3490->3488 3748 40165c 3749 402a3c 18 API calls 3748->3749 3750 401662 3749->3750 3751 405ddf 2 API calls 3750->3751 3752 401668 3751->3752 3753 401edc 3754 402a3c 18 API calls 3753->3754 3755 401ee3 3754->3755 3756 405ddf 2 API calls 3755->3756 3757 401ee9 3756->3757 3759 401efb 3757->3759 3760 405a17 wsprintfA 3757->3760 3760->3759 3761 40195d 3762 402a3c 18 API calls 3761->3762 3763 401964 3762->3763 3766 405ad0 lstrlenA 3763->3766 3765 40196a 3766->3765 3495 401e5f 3496 402a3c 18 API calls 3495->3496 3497 401e65 3496->3497 3498 404e23 22 API calls 3497->3498 3499 401e6f 3498->3499 3500 4052ef 2 API calls 3499->3500 3504 401e75 3500->3504 3501 401ece CloseHandle 3505 4026a2 3501->3505 3502 401e8e WaitForSingleObject 3503 401ea5 GetExitCodeProcess 3502->3503 3502->3504 3507 401ec2 3503->3507 3508 401eb7 3503->3508 3504->3501 3504->3502 3504->3505 3506 405e3f 2 API calls 3504->3506 3506->3504 3507->3501 3509 401ec0 3507->3509 3511 405a17 wsprintfA 3508->3511 3509->3501 3511->3509 3767 401d5f GetDC GetDeviceCaps 3768 402a1f 18 API calls 3767->3768 3769 401d7b MulDiv 3768->3769 3770 402a1f 18 API calls 3769->3770 3771 401d90 3770->3771 3772 405aee 18 API calls 3771->3772 3773 401dc9 CreateFontIndirectA 3772->3773 3774 4024fc 3773->3774 3775 4024e0 3776 402a3c 18 API calls 3775->3776 3777 4024e7 3776->3777 3780 40578f GetFileAttributesA CreateFileA 3777->3780 3779 4024f3 3780->3779 3781 401a61 3782 402a1f 18 API calls 3781->3782 3783 401a67 3782->3783 3784 402a1f 18 API calls 3783->3784 3785 401a11 3784->3785 3398 401765 3399 402a3c 18 API calls 3398->3399 3400 40176c 3399->3400 3401 401792 3400->3401 3402 401785 3400->3402 3442 405aba lstrcpynA 3401->3442 3441 405aba lstrcpynA 3402->3441 3405 401790 3409 405d46 5 API calls 3405->3409 3406 4017a2 3407 4055a3 3 API calls 3406->3407 3408 4017a8 3407->3408 3443 405add lstrcatA 3408->3443 3425 4017b4 3409->3425 3411 405ddf 2 API calls 3411->3425 3412 405770 2 API calls 3412->3425 3414 4017cb CompareFileTime 3414->3425 3415 401894 3416 404e23 22 API calls 3415->3416 3418 40189e 3416->3418 3417 401876 3419 404e23 22 API calls 3417->3419 3420 402eb2 34 API calls 3418->3420 3426 401871 3419->3426 3421 4018b1 3420->3421 3422 4018c5 SetFileTime 3421->3422 3424 4018d7 CloseHandle 3421->3424 3422->3424 3423 405aee 18 API calls 3423->3425 3424->3426 3427 4018e8 3424->3427 3425->3411 3425->3412 3425->3414 3425->3415 3425->3417 3425->3423 3428 405aba lstrcpynA 3425->3428 3434 40535f MessageBoxIndirectA 3425->3434 3438 401866 3425->3438 3440 40578f GetFileAttributesA CreateFileA 3425->3440 3429 401900 3427->3429 3430 4018ed 3427->3430 3428->3425 3431 405aee 18 API calls 3429->3431 3432 405aee 18 API calls 3430->3432 3433 4018fe 3431->3433 3435 4018f5 3432->3435 3437 40535f MessageBoxIndirectA 3433->3437 3434->3425 3444 405add lstrcatA 3435->3444 3437->3426 3438->3426 3439 404e23 22 API calls 3438->3439 3439->3426 3440->3425 3441->3405 3442->3406 3443->3405 3444->3433 3786 404f66 3787 405112 3786->3787 3788 404f85 GetDlgItem GetDlgItem GetDlgItem 3786->3788 3790 405145 3787->3790 3791 40511d GetDlgItem CreateThread CloseHandle 3787->3791 3832 403e28 SendMessageA 3788->3832 3793 405170 3790->3793 3794 405192 3790->3794 3795 40515c ShowWindow ShowWindow 3790->3795 3791->3790 3792 404ff8 3800 404fff GetClientRect GetSystemMetrics SendMessageA SendMessageA 3792->3800 3796 4051ce 3793->3796 3797 405181 3793->3797 3798 4051a7 ShowWindow 3793->3798 3799 403e5a 8 API calls 3794->3799 3834 403e28 SendMessageA 3795->3834 3796->3794 3807 4051d9 SendMessageA 3796->3807 3835 403dcc 3797->3835 3803 4051c7 3798->3803 3804 4051b9 3798->3804 3813 4051a0 3799->3813 3805 405052 SendMessageA SendMessageA 3800->3805 3806 40506e 3800->3806 3809 403dcc SendMessageA 3803->3809 3808 404e23 22 API calls 3804->3808 3805->3806 3810 405081 3806->3810 3811 405073 SendMessageA 3806->3811 3812 4051f2 CreatePopupMenu 3807->3812 3807->3813 3808->3803 3809->3796 3815 403df3 19 API calls 3810->3815 3811->3810 3814 405aee 18 API calls 3812->3814 3817 405202 AppendMenuA 3814->3817 3816 405091 3815->3816 3820 40509a ShowWindow 3816->3820 3821 4050ce GetDlgItem SendMessageA 3816->3821 3818 405215 GetWindowRect 3817->3818 3819 405228 3817->3819 3822 405231 TrackPopupMenu 3818->3822 3819->3822 3823 4050b0 ShowWindow 3820->3823 3824 4050bd 3820->3824 3821->3813 3825 4050f5 SendMessageA SendMessageA 3821->3825 3822->3813 3826 40524f 3822->3826 3823->3824 3833 403e28 SendMessageA 3824->3833 3825->3813 3827 40526c SendMessageA 3826->3827 3827->3827 3829 40528b OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3827->3829 3830 4052ad SendMessageA 3829->3830 3830->3830 3831 4052ce GlobalUnlock SetClipboardData CloseClipboard 3830->3831 3831->3813 3832->3792 3833->3821 3834->3793 3836 403dd3 3835->3836 3837 403dd9 SendMessageA 3835->3837 3836->3837 3837->3794 3838 402067 3839 402a3c 18 API calls 3838->3839 3840 40206e 3839->3840 3841 402a3c 18 API calls 3840->3841 3842 402078 3841->3842 3843 402a3c 18 API calls 3842->3843 3844 402081 3843->3844 3845 402a3c 18 API calls 3844->3845 3846 40208b 3845->3846 3847 402a3c 18 API calls 3846->3847 3848 402095 3847->3848 3849 4020a9 CoCreateInstance 3848->3849 3850 402a3c 18 API calls 3848->3850 3853 4020c8 3849->3853 3854 40217b 3849->3854 3850->3849 3851 401448 22 API calls 3852 4021ad 3851->3852 3853->3854 3855 40215a MultiByteToWideChar 3853->3855 3854->3851 3854->3852 3855->3854 3856 402267 3857 402275 3856->3857 3858 40226f 3856->3858 3859 402285 3857->3859 3861 402a3c 18 API calls 3857->3861 3860 402a3c 18 API calls 3858->3860 3862 402a3c 18 API calls 3859->3862 3864 402293 3859->3864 3860->3857 3861->3859 3862->3864 3863 402a3c 18 API calls 3865 40229c WritePrivateProfileStringA 3863->3865 3864->3863 3866 401ce9 3867 402a1f 18 API calls 3866->3867 3868 401cf9 SetWindowLongA 3867->3868 3869 4028d1 3868->3869 3870 4014ea 3871 404e23 22 API calls 3870->3871 3872 4014f1 3871->3872 3873 40246b 3883 402b52 3873->3883 3875 402475 3876 402a1f 18 API calls 3875->3876 3877 40247e 3876->3877 3878 4024a1 RegEnumValueA 3877->3878 3879 402495 RegEnumKeyA 3877->3879 3881 4026a2 3877->3881 3880 4024ba RegCloseKey 3878->3880 3878->3881 3879->3880 3880->3881 3884 402a3c 18 API calls 3883->3884 3885 402b6b 3884->3885 3886 402b79 RegOpenKeyExA 3885->3886 3886->3875 3887 4041eb 3888 404221 3887->3888 3889 4041fb 3887->3889 3891 403e5a 8 API calls 3888->3891 3890 403df3 19 API calls 3889->3890 3892 404208 3890->3892 3893 40422d 3891->3893 3895 40532e SetDlgItemTextA 3892->3895 3895->3888 3896 401beb 3897 402a1f 18 API calls 3896->3897 3898 401bf2 3897->3898 3899 402a1f 18 API calls 3898->3899 3900 401bfc 3899->3900 3901 401c0c 3900->3901 3902 402a3c 18 API calls 3900->3902 3903 401c1c 3901->3903 3904 402a3c 18 API calls 3901->3904 3902->3901 3905 401c71 3903->3905 3906 401c27 3903->3906 3904->3903 3907 402a3c 18 API calls 3905->3907 3908 402a1f 18 API calls 3906->3908 3909 401c76 3907->3909 3910 401c2c 3908->3910 3911 402a3c 18 API calls 3909->3911 3912 402a1f 18 API calls 3910->3912 3913 401c7f FindWindowExA 3911->3913 3914 401c35 3912->3914 3917 401c9d 3913->3917 3915 401c40 SendMessageTimeoutA 3914->3915 3916 401c61 SendMessageA 3914->3916 3915->3917 3916->3917 3918 4022eb 3919 4022f0 3918->3919 3920 40231b 3918->3920 3922 402b52 19 API calls 3919->3922 3921 402a3c 18 API calls 3920->3921 3923 402322 3921->3923 3924 4022f7 3922->3924 3929 402a7c RegOpenKeyExA 3923->3929 3925 402a3c 18 API calls 3924->3925 3928 402338 3924->3928 3927 402308 RegDeleteValueA RegCloseKey 3925->3927 3927->3928 3930 402aa7 3929->3930 3937 402af4 3929->3937 3931 402abe RegEnumKeyA 3930->3931 3932 402afe RegCloseKey 3930->3932 3933 402aeb RegCloseKey 3930->3933 3935 402a7c 3 API calls 3930->3935 3931->3930 3931->3932 3934 405e06 3 API calls 3932->3934 3933->3937 3936 402b0e 3934->3936 3935->3930 3936->3937 3938 402b2b RegDeleteKeyA 3936->3938 3937->3928 3938->3937 3939 40166d 3940 402a3c 18 API calls 3939->3940 3941 401674 3940->3941 3942 402a3c 18 API calls 3941->3942 3943 40167d 3942->3943 3944 402a3c 18 API calls 3943->3944 3945 401686 MoveFileA 3944->3945 3946 401692 3945->3946 3947 401699 3945->3947 3949 401448 22 API calls 3946->3949 3948 405ddf 2 API calls 3947->3948 3951 4021ad 3947->3951 3950 4016a8 3948->3950 3949->3951 3950->3951 3952 405807 36 API calls 3950->3952 3952->3946 3953 40196f 3954 402a1f 18 API calls 3953->3954 3955 401976 3954->3955 3956 402a1f 18 API calls 3955->3956 3957 401980 3956->3957 3958 402a3c 18 API calls 3957->3958 3959 401989 3958->3959 3960 4019d3 3959->3960 3966 405ad0 lstrlenA 3959->3966 3962 4019a2 3962->3960 3967 405aba lstrcpynA 3962->3967 3964 4019c0 3964->3960 3968 405ad0 lstrlenA 3964->3968 3966->3962 3967->3964 3968->3960 3969 4019f0 3970 402a3c 18 API calls 3969->3970 3971 4019f7 3970->3971 3972 402a3c 18 API calls 3971->3972 3973 401a00 3972->3973 3974 401a07 lstrcmpiA 3973->3974 3975 401a19 lstrcmpA 3973->3975 3976 401a0d 3974->3976 3975->3976 3977 404d73 3978 404d81 3977->3978 3979 404d98 3977->3979 3980 404d87 3978->3980 3995 404e01 3978->3995 3981 404da6 IsWindowVisible 3979->3981 3987 404dbd 3979->3987 3982 403e3f SendMessageA 3980->3982 3984 404db3 3981->3984 3981->3995 3985 404d91 3982->3985 3983 404e07 CallWindowProcA 3983->3985 3986 4046c7 5 API calls 3984->3986 3986->3987 3987->3983 3996 405aba lstrcpynA 3987->3996 3989 404dec 3997 405a17 wsprintfA 3989->3997 3991 404df3 3992 401430 2 API calls 3991->3992 3993 404dfa 3992->3993 3998 405aba lstrcpynA 3993->3998 3995->3983 3996->3989 3997->3991 3998->3995 3999 4023f3 4000 402b52 19 API calls 3999->4000 4001 4023fd 4000->4001 4002 402a3c 18 API calls 4001->4002 4003 402406 4002->4003 4004 402410 RegQueryValueExA 4003->4004 4007 4026a2 4003->4007 4005 402430 4004->4005 4006 402436 RegCloseKey 4004->4006 4005->4006 4010 405a17 wsprintfA 4005->4010 4006->4007 4010->4006 4011 4014f6 4012 402a1f 18 API calls 4011->4012 4013 4014fc Sleep 4012->4013 4015 4028d1 4013->4015 4016 404579 4017 4045a5 4016->4017 4018 404589 4016->4018 4019 4045da 4017->4019 4020 4045ab SHGetPathFromIDListA 4017->4020 4027 405343 GetDlgItemTextA 4018->4027 4022 4045c2 SendMessageA 4020->4022 4023 4045bb 4020->4023 4022->4019 4025 401430 2 API calls 4023->4025 4024 404596 SendMessageA 4024->4017 4025->4022 4027->4024 4035 4060fd 4039 405f47 4035->4039 4036 406029 4037 405fe8 GlobalAlloc 4037->4036 4037->4039 4038 405fdf GlobalFree 4038->4037 4039->4036 4039->4037 4039->4038 4040 406074 GlobalAlloc 4039->4040 4041 40606b GlobalFree 4039->4041 4040->4036 4040->4039 4041->4040 4042 401000 4043 401037 BeginPaint GetClientRect 4042->4043 4044 40100c DefWindowProcA 4042->4044 4046 401112 4043->4046 4047 401077 CreateBrushIndirect FillRect DeleteObject 4043->4047 4048 40118f 4044->4048 4049 401118 CreateFontIndirectA 4046->4049 4050 40117d EndPaint 4046->4050 4047->4046 4047->4047 4049->4050 4051 401128 6 API calls 4049->4051 4050->4048 4051->4050 4052 402502 4053 402507 4052->4053 4054 402518 4052->4054 4056 402a1f 18 API calls 4053->4056 4055 402a3c 18 API calls 4054->4055 4057 40251f 4055->4057 4059 40250e 4056->4059 4062 405ad0 lstrlenA 4057->4062 4060 40253e WriteFile 4059->4060 4061 4026a2 4059->4061 4060->4061 4062->4059 4063 402684 4064 402a3c 18 API calls 4063->4064 4065 40268b FindFirstFileA 4064->4065 4066 4026ae 4065->4066 4067 40269e 4065->4067 4071 405a17 wsprintfA 4066->4071 4069 4026b5 4072 405aba lstrcpynA 4069->4072 4071->4069 4072->4067 4073 401d05 GetDlgItem GetClientRect 4074 402a3c 18 API calls 4073->4074 4075 401d35 LoadImageA SendMessageA 4074->4075 4076 4028d1 4075->4076 4077 401d53 DeleteObject 4075->4077 4077->4076 4078 401e05 4079 402a3c 18 API calls 4078->4079 4080 401e0b 4079->4080 4081 402a3c 18 API calls 4080->4081 4082 401e14 4081->4082 4083 402a3c 18 API calls 4082->4083 4084 401e1d 4083->4084 4085 402a3c 18 API calls 4084->4085 4086 401e26 4085->4086 4087 401448 22 API calls 4086->4087 4088 401e2d ShellExecuteA 4087->4088 4089 401e5a 4088->4089 4090 403f07 lstrcpynA 4093 405ad0 lstrlenA 4090->4093 4092 403f2a 4093->4092 4101 401f0c 4102 402a3c 18 API calls 4101->4102 4103 401f13 GetFileVersionInfoSizeA 4102->4103 4104 401f36 GlobalAlloc 4103->4104 4111 401f8c 4103->4111 4105 401f4a GetFileVersionInfoA 4104->4105 4104->4111 4106 401f5b VerQueryValueA 4105->4106 4105->4111 4107 401f74 4106->4107 4106->4111 4112 405a17 wsprintfA 4107->4112 4109 401f80 4113 405a17 wsprintfA 4109->4113 4112->4109 4113->4111 4114 402b8d 4115 402bb5 4114->4115 4116 402b9c SetTimer 4114->4116 4117 402c0a 4115->4117 4118 402bcf MulDiv wsprintfA SetWindowTextA 4115->4118 4116->4115 4120 40532e SetDlgItemTextA 4118->4120 4120->4117 4121 40678d 4122 406029 4121->4122 4123 405f47 4121->4123 4123->4122 4124 405fe8 GlobalAlloc 4123->4124 4125 405fdf GlobalFree 4123->4125 4126 406074 GlobalAlloc 4123->4126 4127 40606b GlobalFree 4123->4127 4124->4122 4124->4123 4125->4124 4126->4122 4126->4123 4127->4126 4128 401510 SetForegroundWindow 4129 4028d1 4128->4129 4130 402610 4131 40287e 4130->4131 4132 402617 4130->4132 4133 402a1f 18 API calls 4132->4133 4134 402622 4133->4134 4135 402629 SetFilePointer 4134->4135 4135->4131 4136 402639 4135->4136 4138 405a17 wsprintfA 4136->4138 4138->4131 4139 401913 4140 40194a 4139->4140 4141 402a3c 18 API calls 4140->4141 4142 40194f 4141->4142 4143 4053d0 56 API calls 4142->4143 4144 401958 4143->4144 4150 401916 4151 402a3c 18 API calls 4150->4151 4152 40191d 4151->4152 4153 40535f MessageBoxIndirectA 4152->4153 4154 401926 4153->4154 3451 401f98 3452 402059 3451->3452 3453 401faa 3451->3453 3456 401448 22 API calls 3452->3456 3454 402a3c 18 API calls 3453->3454 3455 401fb1 3454->3455 3457 402a3c 18 API calls 3455->3457 3458 4021ad 3456->3458 3459 401fba 3457->3459 3460 401fc2 GetModuleHandleA 3459->3460 3461 401fcf LoadLibraryExA 3459->3461 3460->3461 3462 401fdf GetProcAddress 3460->3462 3461->3452 3461->3462 3463 40202c 3462->3463 3464 401fef 3462->3464 3465 404e23 22 API calls 3463->3465 3467 401fff 3464->3467 3469 401448 3464->3469 3465->3467 3467->3458 3468 40204d FreeLibrary 3467->3468 3468->3458 3470 404e23 22 API calls 3469->3470 3471 401456 3470->3471 3471->3467 4155 40151e 4156 401523 4155->4156 4158 401539 4155->4158 4157 402a1f 18 API calls 4156->4157 4157->4158 2914 4034a0 2915 4034b8 2914->2915 2916 4034aa CloseHandle 2914->2916 2921 4034e5 2915->2921 2916->2915 2922 4034f3 2921->2922 2923 4034f8 FreeLibrary GlobalFree 2922->2923 2924 4034bd 2922->2924 2923->2923 2923->2924 2925 4053d0 2924->2925 2969 405686 2925->2969 2928 405404 2931 40553e 2928->2931 2983 405aba lstrcpynA 2928->2983 2929 4053ed DeleteFileA 2930 4034c9 2929->2930 2931->2930 2993 405ddf FindFirstFileA 2931->2993 2933 40542e 2934 405432 2933->2934 2935 40543f 2933->2935 3002 405add lstrcatA 2934->3002 3003 4055ea 2935->3003 2940 40543d 2941 40545e 2940->2941 3008 405add lstrcatA 2940->3008 2984 405ad0 lstrlenA 2941->2984 2946 405464 FindFirstFileA 2946->2931 2964 405482 2946->2964 2947 405770 2 API calls 2948 405573 RemoveDirectoryA 2947->2948 2949 405595 2948->2949 2950 40557e 2948->2950 2953 404e23 22 API calls 2949->2953 2950->2930 2952 405584 2950->2952 2954 404e23 22 API calls 2952->2954 2953->2930 2955 40558c 2954->2955 2957 405807 36 API calls 2955->2957 2960 405593 2957->2960 2958 40551d FindNextFileA 2959 405535 FindClose 2958->2959 2958->2964 2959->2931 2960->2930 2962 4053d0 50 API calls 2962->2964 2964->2958 2964->2962 2965 404e23 22 API calls 2964->2965 2968 4054fb 2964->2968 2985 4055ce 2964->2985 2989 405aba lstrcpynA 2964->2989 2990 405770 GetFileAttributesA 2964->2990 2965->2958 2968->2958 3009 404e23 2968->3009 3023 405807 2968->3023 3049 405aba lstrcpynA 2969->3049 2971 405697 3050 405637 CharNextA CharNextA 2971->3050 2974 4053e4 2974->2928 2974->2929 2977 4056e3 2979 4055a3 3 API calls 2977->2979 2978 405ddf 2 API calls 2982 4056ad 2978->2982 2980 4056e8 GetFileAttributesA 2979->2980 2980->2974 2981 4055ea 2 API calls 2981->2982 2982->2974 2982->2977 2982->2978 2982->2981 3065 405ad0 lstrlenA 2982->3065 2983->2933 2984->2946 2986 4055d2 2985->2986 2987 4055e7 2986->2987 2988 4055de CharNextA 2986->2988 2987->2964 2988->2986 2989->2964 2991 4054ea DeleteFileA 2990->2991 2992 40577f SetFileAttributesA 2990->2992 2991->2964 2992->2991 2994 405563 2993->2994 2995 405df5 FindClose 2993->2995 2994->2930 2996 4055a3 2994->2996 2995->2994 3066 405ad0 lstrlenA 2996->3066 2998 4055ae CharPrevA 2999 40556d 2998->2999 3000 4055bd 2998->3000 2999->2947 3067 405add lstrcatA 3000->3067 3002->2940 3068 405ad0 lstrlenA 3003->3068 3005 4055f5 3006 405608 3005->3006 3007 4055fc CharPrevA 3005->3007 3006->2940 3007->3005 3007->3006 3008->2941 3010 404e3e 3009->3010 3021 404ee1 3009->3021 3011 404e5b 3010->3011 3069 405aee 3010->3069 3088 405ad0 lstrlenA 3011->3088 3014 404e61 3015 404e84 3014->3015 3089 405ad0 lstrlenA 3014->3089 3016 404e97 3015->3016 3017 404e8a SetWindowTextA 3015->3017 3019 404e9d SendMessageA SendMessageA SendMessageA 3016->3019 3016->3021 3017->3016 3019->3021 3020 404e71 3020->3021 3090 405add lstrcatA 3020->3090 3021->2968 3101 405e06 GetModuleHandleA 3023->3101 3026 40586f GetShortPathNameA 3028 405884 3026->3028 3029 405964 3026->3029 3028->3029 3031 40588c wsprintfA 3028->3031 3029->2968 3030 405853 CloseHandle GetShortPathNameA 3030->3029 3032 405867 3030->3032 3033 405aee 18 API calls 3031->3033 3032->3026 3032->3029 3034 4058b4 3033->3034 3106 40578f GetFileAttributesA CreateFileA 3034->3106 3036 4058c1 3036->3029 3037 4058d0 GetFileSize GlobalAlloc 3036->3037 3038 40595d CloseHandle 3037->3038 3039 4058ee ReadFile 3037->3039 3038->3029 3039->3038 3040 405902 3039->3040 3040->3038 3107 4056fe 3040->3107 3043 405971 3045 4056fe 3 API calls 3043->3045 3044 405917 3114 405aba lstrcpynA 3044->3114 3047 405925 3045->3047 3048 405938 SetFilePointer WriteFile GlobalFree 3047->3048 3048->3038 3049->2971 3051 405651 3050->3051 3055 40565d 3050->3055 3052 405658 CharNextA 3051->3052 3051->3055 3053 40567c 3052->3053 3053->2974 3056 405d46 3053->3056 3054 4055ce CharNextA 3054->3055 3055->3053 3055->3054 3063 405d52 3056->3063 3057 405dba 3058 405dbe CharPrevA 3057->3058 3060 405dd9 3057->3060 3058->3057 3059 405daf CharNextA 3059->3057 3059->3063 3060->2982 3061 4055ce CharNextA 3061->3063 3062 405d9d CharNextA 3062->3063 3063->3057 3063->3059 3063->3061 3063->3062 3064 405daa CharNextA 3063->3064 3064->3059 3065->2982 3066->2998 3067->2999 3068->3005 3073 405afb 3069->3073 3070 405d2d 3071 405d42 3070->3071 3100 405aba lstrcpynA 3070->3100 3071->3011 3073->3070 3074 405b9c GetVersion 3073->3074 3078 405aee 12 API calls 3073->3078 3082 405d46 5 API calls 3073->3082 3097 405a17 wsprintfA 3073->3097 3098 405aba lstrcpynA 3073->3098 3099 405ad0 lstrlenA 3073->3099 3085 405bac 3074->3085 3078->3073 3080 405c11 GetSystemDirectoryA 3080->3085 3081 405c24 GetWindowsDirectoryA 3081->3085 3082->3073 3083 405aee 12 API calls 3083->3085 3084 405c5e SHGetSpecialFolderLocation 3084->3085 3086 405c74 SHGetPathFromIDListA CoTaskMemFree 3084->3086 3085->3073 3085->3080 3085->3081 3085->3083 3085->3084 3091 4059a0 RegOpenKeyExA 3085->3091 3096 405add lstrcatA 3085->3096 3086->3085 3088->3014 3089->3020 3090->3015 3092 405a11 3091->3092 3093 4059d3 RegQueryValueExA 3091->3093 3092->3085 3094 4059f4 RegCloseKey 3093->3094 3094->3092 3096->3073 3097->3073 3098->3073 3099->3073 3100->3071 3102 405e22 LoadLibraryA 3101->3102 3103 405e2d GetProcAddress 3101->3103 3102->3103 3104 405812 3102->3104 3103->3104 3104->3026 3104->3029 3105 40578f GetFileAttributesA CreateFileA 3104->3105 3105->3030 3106->3036 3115 405ad0 lstrlenA 3107->3115 3109 40570a 3111 40573e 3109->3111 3112 40571a lstrcmpiA 3109->3112 3116 405ad0 lstrlenA 3109->3116 3111->3043 3111->3044 3112->3111 3113 405733 CharNextA 3112->3113 3113->3109 3114->3047 3115->3109 3116->3109 4159 403920 4160 403a73 4159->4160 4161 403938 4159->4161 4163 403ac4 4160->4163 4164 403a84 GetDlgItem GetDlgItem 4160->4164 4161->4160 4162 403944 4161->4162 4166 403962 4162->4166 4167 40394f SetWindowPos 4162->4167 4165 403b1e 4163->4165 4176 4013ac 2 API calls 4163->4176 4168 403df3 19 API calls 4164->4168 4170 403e3f SendMessageA 4165->4170 4177 403a6e 4165->4177 4171 403967 ShowWindow 4166->4171 4172 40397f 4166->4172 4167->4166 4169 403aae SetClassLongA 4168->4169 4173 401430 2 API calls 4169->4173 4197 403b30 4170->4197 4171->4172 4174 4039a1 4172->4174 4175 403987 DestroyWindow 4172->4175 4173->4163 4179 4039a6 SetWindowLongA 4174->4179 4180 4039b7 4174->4180 4178 403d7c 4175->4178 4181 403af6 4176->4181 4178->4177 4187 403dad ShowWindow 4178->4187 4179->4177 4183 403a2e 4180->4183 4184 4039c3 GetDlgItem 4180->4184 4181->4165 4185 403afa SendMessageA 4181->4185 4182 403d7e DestroyWindow EndDialog 4182->4178 4190 403e5a 8 API calls 4183->4190 4188 4039f3 4184->4188 4189 4039d6 SendMessageA IsWindowEnabled 4184->4189 4185->4177 4186 401430 2 API calls 4186->4197 4187->4177 4192 403a00 4188->4192 4195 403a47 SendMessageA 4188->4195 4196 403a13 4188->4196 4202 4039f8 4188->4202 4189->4177 4189->4188 4190->4177 4191 405aee 18 API calls 4191->4197 4192->4195 4192->4202 4193 403dcc SendMessageA 4193->4183 4194 403df3 19 API calls 4194->4197 4195->4183 4198 403a30 4196->4198 4199 403a1b 4196->4199 4197->4177 4197->4182 4197->4186 4197->4191 4197->4194 4203 403df3 19 API calls 4197->4203 4218 403cbe DestroyWindow 4197->4218 4200 401430 2 API calls 4198->4200 4201 401430 2 API calls 4199->4201 4200->4202 4201->4202 4202->4183 4202->4193 4204 403bab GetDlgItem 4203->4204 4205 403bc0 4204->4205 4206 403bc8 ShowWindow EnableWindow 4204->4206 4205->4206 4227 403e15 EnableWindow 4206->4227 4208 403bf2 EnableWindow 4213 403c06 4208->4213 4209 403c0b GetSystemMenu EnableMenuItem SendMessageA 4210 403c3b SendMessageA 4209->4210 4209->4213 4210->4213 4213->4209 4215 405aee 18 API calls 4213->4215 4228 403e28 SendMessageA 4213->4228 4229 405aba lstrcpynA 4213->4229 4230 405ad0 lstrlenA 4213->4230 4216 403c7a SetWindowTextA 4215->4216 4217 4013ac 2 API calls 4216->4217 4217->4197 4218->4178 4219 403cd8 CreateDialogParamA 4218->4219 4219->4178 4220 403d0b 4219->4220 4221 403df3 19 API calls 4220->4221 4222 403d16 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4221->4222 4223 4013ac 2 API calls 4222->4223 4224 403d5c 4223->4224 4224->4177 4225 403d64 ShowWindow 4224->4225 4226 403e3f SendMessageA 4225->4226 4226->4178 4227->4208 4228->4213 4229->4213 4230->4213 4231 401b20 4232 402a3c 18 API calls 4231->4232 4233 401b27 4232->4233 4234 402a1f 18 API calls 4233->4234 4235 401b30 wsprintfA 4234->4235 4236 4028d1 4235->4236 3117 403121 #17 SetErrorMode OleInitialize 3118 405e06 3 API calls 3117->3118 3119 403164 SHGetFileInfoA 3118->3119 3190 405aba lstrcpynA 3119->3190 3121 40318f GetCommandLineA 3191 405aba lstrcpynA 3121->3191 3123 4031a1 GetModuleHandleA 3124 4031b8 3123->3124 3125 4055ce CharNextA 3124->3125 3126 4031cc CharNextA 3125->3126 3133 4031d7 3126->3133 3127 403253 GetTempPathA 3192 4030ed 3127->3192 3129 403269 3130 40328d DeleteFileA 3129->3130 3131 40326d GetWindowsDirectoryA 3129->3131 3200 402c74 GetTickCount GetModuleFileNameA 3130->3200 3286 405add lstrcatA 3131->3286 3132 4055ce CharNextA 3132->3133 3133->3127 3133->3132 3138 403242 3133->3138 3136 40329e 3139 40330b ExitProcess CoUninitialize 3136->3139 3141 4032f7 3136->3141 3148 4055ce CharNextA 3136->3148 3137 403284 3140 4030ed 11 API calls 3137->3140 3285 405aba lstrcpynA 3138->3285 3143 403320 3139->3143 3144 403405 3139->3144 3145 403289 3140->3145 3228 40357e 3141->3228 3289 40535f 3143->3289 3147 403488 ExitProcess 3144->3147 3151 405e06 3 API calls 3144->3151 3145->3130 3145->3139 3152 4032b5 3148->3152 3155 403414 3151->3155 3158 4032d2 3152->3158 3159 403336 3152->3159 3156 405e06 3 API calls 3155->3156 3157 40341d 3156->3157 3160 405e06 3 API calls 3157->3160 3162 405686 16 API calls 3158->3162 3293 405add lstrcatA 3159->3293 3163 403426 3160->3163 3165 4032dd 3162->3165 3166 403474 ExitWindowsEx 3163->3166 3173 403434 GetCurrentProcess 3163->3173 3164 403341 lstrcmpiA 3164->3139 3167 403352 CreateDirectoryA SetCurrentDirectoryA 3164->3167 3165->3139 3287 405aba lstrcpynA 3165->3287 3166->3147 3168 403481 3166->3168 3169 403374 3167->3169 3170 403369 3167->3170 3299 401430 3168->3299 3295 405aba lstrcpynA 3169->3295 3294 405aba lstrcpynA 3170->3294 3178 403444 3173->3178 3175 4032ec 3288 405aba lstrcpynA 3175->3288 3178->3166 3179 405aee 18 API calls 3180 4033a4 DeleteFileA 3179->3180 3181 4033b1 CopyFileA 3180->3181 3187 403382 3180->3187 3181->3187 3182 4033f9 3184 405807 36 API calls 3182->3184 3183 405807 36 API calls 3183->3187 3185 403400 3184->3185 3185->3139 3186 405aee 18 API calls 3186->3187 3187->3179 3187->3182 3187->3183 3187->3186 3189 4033e5 CloseHandle 3187->3189 3296 4052ef CreateProcessA 3187->3296 3189->3187 3190->3121 3191->3123 3193 405d46 5 API calls 3192->3193 3195 4030f9 3193->3195 3194 403103 3194->3129 3195->3194 3196 4055a3 3 API calls 3195->3196 3197 40310b CreateDirectoryA 3196->3197 3302 4057be 3197->3302 3306 40578f GetFileAttributesA CreateFileA 3200->3306 3202 402cb4 3221 402cc4 3202->3221 3307 405aba lstrcpynA 3202->3307 3204 402cda 3205 4055ea 2 API calls 3204->3205 3206 402ce0 3205->3206 3308 405aba lstrcpynA 3206->3308 3208 402ceb GetFileSize 3209 402de7 3208->3209 3214 402d02 3208->3214 3311 402c10 3209->3311 3211 402df0 3213 402e20 GlobalAlloc 3211->3213 3211->3221 3345 4030d6 SetFilePointer 3211->3345 3322 4030d6 SetFilePointer 3213->3322 3214->3209 3216 402e53 3214->3216 3214->3221 3225 402c10 6 API calls 3214->3225 3309 4030a4 ReadFile 3214->3309 3218 402c10 6 API calls 3216->3218 3218->3221 3219 402e09 3222 4030a4 ReadFile 3219->3222 3220 402e3b 3323 402eb2 3220->3323 3221->3136 3224 402e14 3222->3224 3224->3213 3224->3221 3225->3214 3227 402e88 SetFilePointer 3227->3221 3229 405e06 3 API calls 3228->3229 3230 403592 3229->3230 3231 403598 3230->3231 3232 4035aa 3230->3232 3367 405a17 wsprintfA 3231->3367 3233 4059a0 3 API calls 3232->3233 3234 4035cb 3233->3234 3235 4035e9 3234->3235 3237 4059a0 3 API calls 3234->3237 3368 405add lstrcatA 3235->3368 3237->3235 3239 4035a8 3358 403847 3239->3358 3242 405686 16 API calls 3243 40361b 3242->3243 3244 4036a4 3243->3244 3246 4059a0 3 API calls 3243->3246 3245 405686 16 API calls 3244->3245 3247 4036aa 3245->3247 3249 403647 3246->3249 3248 4036ba LoadImageA 3247->3248 3250 405aee 18 API calls 3247->3250 3251 4036e5 RegisterClassA 3248->3251 3252 40376e 3248->3252 3249->3244 3256 403661 3249->3256 3259 4055ce CharNextA 3249->3259 3250->3248 3253 403721 SystemParametersInfoA CreateWindowExA 3251->3253 3254 403307 3251->3254 3255 401430 2 API calls 3252->3255 3253->3252 3254->3139 3258 403774 3255->3258 3369 405ad0 lstrlenA 3256->3369 3258->3254 3263 403847 19 API calls 3258->3263 3259->3256 3260 403669 3261 403671 lstrcmpiA 3260->3261 3262 403697 3260->3262 3261->3262 3264 403681 GetFileAttributesA 3261->3264 3265 4055a3 3 API calls 3262->3265 3266 403785 3263->3266 3267 40368d 3264->3267 3268 40369d 3265->3268 3269 403791 ShowWindow LoadLibraryA 3266->3269 3270 403814 3266->3270 3267->3262 3272 4055ea 2 API calls 3267->3272 3370 405aba lstrcpynA 3268->3370 3274 4037b0 LoadLibraryA 3269->3274 3275 4037b7 GetClassInfoA 3269->3275 3371 404ef5 OleInitialize 3270->3371 3272->3262 3274->3275 3277 4037e1 DialogBoxParamA 3275->3277 3278 4037cb GetClassInfoA RegisterClassA 3275->3278 3276 40381a 3280 403836 3276->3280 3281 40381e 3276->3281 3279 401430 2 API calls 3277->3279 3278->3277 3282 403809 3279->3282 3283 401430 2 API calls 3280->3283 3281->3254 3284 401430 2 API calls 3281->3284 3282->3254 3283->3254 3284->3254 3285->3127 3286->3137 3287->3175 3288->3141 3292 405371 3289->3292 3290 40332e ExitProcess 3291 405391 MessageBoxIndirectA 3291->3290 3292->3290 3292->3291 3293->3164 3294->3169 3295->3187 3297 40532a 3296->3297 3298 40531e CloseHandle 3296->3298 3297->3187 3298->3297 3300 4013ac 2 API calls 3299->3300 3301 401445 3300->3301 3301->3147 3303 4057c9 GetTickCount GetTempFileNameA 3302->3303 3304 4057f4 3303->3304 3305 40311f 3303->3305 3304->3303 3304->3305 3305->3129 3306->3202 3307->3204 3308->3208 3310 4030c5 3309->3310 3310->3214 3312 402c31 3311->3312 3313 402c19 3311->3313 3316 402c41 GetTickCount 3312->3316 3317 402c39 3312->3317 3314 402c22 DestroyWindow 3313->3314 3315 402c29 3313->3315 3314->3315 3315->3211 3319 402c72 3316->3319 3320 402c4f CreateDialogParamA ShowWindow 3316->3320 3346 405e3f 3317->3346 3319->3211 3320->3319 3322->3220 3325 402ec8 3323->3325 3324 402ef3 3327 4030a4 ReadFile 3324->3327 3325->3324 3357 4030d6 SetFilePointer 3325->3357 3328 402efe 3327->3328 3329 402f10 GetTickCount 3328->3329 3330 403038 3328->3330 3338 402e47 3328->3338 3342 402f23 3329->3342 3331 40307f 3330->3331 3334 40303c 3330->3334 3332 4030a4 ReadFile 3331->3332 3332->3338 3333 4030a4 ReadFile 3333->3334 3334->3333 3336 40305d WriteFile 3334->3336 3334->3338 3335 4030a4 ReadFile 3335->3342 3337 403072 3336->3337 3336->3338 3337->3334 3337->3338 3338->3221 3338->3227 3340 402f89 GetTickCount 3340->3342 3341 402fb2 MulDiv wsprintfA 3343 404e23 22 API calls 3341->3343 3342->3335 3342->3338 3342->3340 3342->3341 3344 402ff0 WriteFile 3342->3344 3350 405f14 3342->3350 3343->3342 3344->3338 3344->3342 3345->3219 3347 405e5a PeekMessageA 3346->3347 3348 405e60 DispatchMessageA 3347->3348 3349 402c3f 3347->3349 3348->3347 3349->3211 3351 405f39 3350->3351 3352 405f41 3350->3352 3351->3342 3352->3351 3353 405fe8 GlobalAlloc 3352->3353 3354 405fdf GlobalFree 3352->3354 3355 406074 GlobalAlloc 3352->3355 3356 40606b GlobalFree 3352->3356 3353->3351 3353->3352 3354->3353 3355->3351 3355->3352 3356->3355 3357->3324 3359 40385b 3358->3359 3378 405a17 wsprintfA 3359->3378 3361 4038d1 3362 405aee 18 API calls 3361->3362 3363 4038dd SetWindowTextA 3362->3363 3364 4035f9 3363->3364 3365 4038fc 3363->3365 3364->3242 3365->3364 3366 405aee 18 API calls 3365->3366 3366->3365 3367->3239 3368->3239 3369->3260 3370->3244 3379 403e3f 3371->3379 3373 404f18 3377 404f44 3373->3377 3382 4013ac 3373->3382 3374 403e3f SendMessageA 3375 404f56 OleUninitialize 3374->3375 3375->3276 3377->3374 3378->3361 3380 403e57 3379->3380 3381 403e48 SendMessageA 3379->3381 3380->3373 3381->3380 3384 4013b1 3382->3384 3383 401423 3383->3373 3384->3383 3385 4013f2 MulDiv SendMessageA 3384->3385 3385->3384 4237 401a21 4238 402a3c 18 API calls 4237->4238 4239 401a2a ExpandEnvironmentStringsA 4238->4239 4240 401a3e 4239->4240 4242 401a51 4239->4242 4241 401a43 lstrcmpA 4240->4241 4240->4242 4241->4242 4243 401722 4244 402a3c 18 API calls 4243->4244 4245 401729 SearchPathA 4244->4245 4246 401744 4245->4246 4254 4022ab 4255 402a3c 18 API calls 4254->4255 4256 4022b9 4255->4256 4257 402a3c 18 API calls 4256->4257 4258 4022c2 4257->4258 4259 402a3c 18 API calls 4258->4259 4260 4022cc GetPrivateProfileStringA 4259->4260 3491 4013ac 3493 4013b1 3491->3493 3492 401423 3493->3492 3494 4013f2 MulDiv SendMessageA 3493->3494 3494->3493 4261 4028ac SendMessageA 4262 4028d1 4261->4262 4263 4028c6 InvalidateRect 4261->4263 4263->4262 4264 401cb1 4265 402a1f 18 API calls 4264->4265 4266 401cb7 IsWindow 4265->4266 4267 401a11 4266->4267 4268 404232 4269 404270 4268->4269 4270 404263 4268->4270 4272 404279 GetDlgItem 4269->4272 4275 4042dc 4269->4275 4332 405343 GetDlgItemTextA 4270->4332 4274 40428d 4272->4274 4273 40426a 4276 405d46 5 API calls 4273->4276 4278 4042a1 SetWindowTextA 4274->4278 4282 405637 4 API calls 4274->4282 4279 405aee 18 API calls 4275->4279 4305 4043be 4275->4305 4330 40455e 4275->4330 4276->4269 4280 403df3 19 API calls 4278->4280 4284 404352 SHBrowseForFolderA 4279->4284 4285 4042bf 4280->4285 4281 4043ec 4286 405686 16 API calls 4281->4286 4287 404297 4282->4287 4283 403e5a 8 API calls 4288 404572 4283->4288 4289 40436a CoTaskMemFree 4284->4289 4284->4305 4290 403df3 19 API calls 4285->4290 4294 4043f2 4286->4294 4287->4278 4291 4055a3 3 API calls 4287->4291 4292 4055a3 3 API calls 4289->4292 4293 4042cd 4290->4293 4291->4278 4295 404377 4292->4295 4333 403e28 SendMessageA 4293->4333 4337 405aba lstrcpynA 4294->4337 4298 4043ae 4295->4298 4304 405aee 18 API calls 4295->4304 4335 40532e SetDlgItemTextA 4298->4335 4299 4042d5 4301 405e06 3 API calls 4299->4301 4300 404409 4302 405e06 3 API calls 4300->4302 4301->4275 4312 404411 4302->4312 4306 404396 lstrcmpiA 4304->4306 4305->4330 4336 405343 GetDlgItemTextA 4305->4336 4306->4298 4309 4043a7 4306->4309 4307 40444b 4338 405aba lstrcpynA 4307->4338 4334 405add lstrcatA 4309->4334 4310 404454 4313 405637 4 API calls 4310->4313 4312->4307 4316 4055ea 2 API calls 4312->4316 4318 40449e 4312->4318 4314 40445a GetDiskFreeSpaceA 4313->4314 4317 40447c MulDiv 4314->4317 4314->4318 4316->4312 4317->4318 4319 40450d 4318->4319 4321 4045e1 20 API calls 4318->4321 4320 404530 4319->4320 4322 401430 2 API calls 4319->4322 4340 403e15 EnableWindow 4320->4340 4323 4044ff 4321->4323 4322->4320 4325 404504 4323->4325 4326 40450f 4323->4326 4328 4045e1 20 API calls 4325->4328 4339 40532e SetDlgItemTextA 4326->4339 4327 40454c 4327->4330 4341 4041c7 4327->4341 4328->4319 4330->4283 4332->4273 4333->4299 4334->4298 4335->4305 4336->4281 4337->4300 4338->4310 4339->4319 4340->4327 4342 4041d5 4341->4342 4343 4041da SendMessageA 4341->4343 4342->4343 4343->4330 4344 4014b5 4345 40186c 4344->4345 4346 404e23 22 API calls 4345->4346 4347 401871 4346->4347 4348 4021b6 4349 402a3c 18 API calls 4348->4349 4350 4021bc 4349->4350 4351 402a3c 18 API calls 4350->4351 4352 4021c5 4351->4352 4353 402a3c 18 API calls 4352->4353 4354 4021ce 4353->4354 4355 405ddf 2 API calls 4354->4355 4356 4021d7 4355->4356 4365 4021db 4356->4365 4366 405ad0 lstrlenA 4356->4366 4357 404e23 22 API calls 4359 4021e3 4357->4359 4360 4021fb 4367 405ad0 lstrlenA 4360->4367 4362 402205 4363 404e23 22 API calls 4362->4363 4364 402224 SHFileOperationA 4363->4364 4364->4359 4364->4365 4365->4357 4365->4359 4366->4360 4367->4362 4368 402238 4369 40223f 4368->4369 4373 402252 4368->4373 4370 405aee 18 API calls 4369->4370 4371 40224c 4370->4371 4372 40535f MessageBoxIndirectA 4371->4372 4372->4373 4374 40353a 4375 403545 4374->4375 4376 40354e GlobalAlloc 4375->4376 4377 403549 4375->4377 4376->4377 4378 403f3b 4379 403f51 4378->4379 4386 40405e 4378->4386 4383 403df3 19 API calls 4379->4383 4380 4040ce 4381 4041a2 4380->4381 4382 4040d8 GetDlgItem 4380->4382 4388 403e5a 8 API calls 4381->4388 4384 404160 4382->4384 4385 4040ee 4382->4385 4387 403fa7 4383->4387 4384->4381 4392 404172 4384->4392 4385->4384 4391 404114 6 API calls 4385->4391 4386->4380 4386->4381 4389 4040a3 GetDlgItem SendMessageA 4386->4389 4390 403df3 19 API calls 4387->4390 4400 40419d 4388->4400 4412 403e15 EnableWindow 4389->4412 4394 403fb4 CheckDlgButton 4390->4394 4391->4384 4396 404178 SendMessageA 4392->4396 4397 404189 4392->4397 4409 403e15 EnableWindow 4394->4409 4396->4397 4397->4400 4401 40418f SendMessageA 4397->4401 4398 4040c9 4402 4041c7 SendMessageA 4398->4402 4399 403fd2 GetDlgItem 4410 403e28 SendMessageA 4399->4410 4401->4400 4402->4380 4404 403fe8 SendMessageA 4405 404006 GetSysColor 4404->4405 4406 40400f SendMessageA SendMessageA 4404->4406 4405->4406 4411 405ad0 lstrlenA 4406->4411 4408 404036 SendMessageA SendMessageA 4408->4400 4409->4399 4410->4404 4411->4408 4412->4398 4413 4015bd 4414 402a3c 18 API calls 4413->4414 4415 4015c4 SetFileAttributesA 4414->4415 4416 4015d6 4415->4416 4424 4016be 4425 402a3c 18 API calls 4424->4425 4426 4016c4 GetFullPathNameA 4425->4426 4427 4016db 4426->4427 4433 4016fc 4426->4433 4430 405ddf 2 API calls 4427->4430 4427->4433 4428 401710 GetShortPathNameA 4429 4028d1 4428->4429 4431 4016ec 4430->4431 4431->4433 4434 405aba lstrcpynA 4431->4434 4433->4428 4433->4429 4434->4433 4435 40263f 4436 4028d1 4435->4436 4437 402646 4435->4437 4438 40264c FindClose 4437->4438 4438->4436

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 403121-4031b6 #17 SetErrorMode OleInitialize call 405e06 SHGetFileInfoA call 405aba GetCommandLineA call 405aba GetModuleHandleA 7 4031c2-4031d3 call 4055ce CharNextA 0->7 8 4031b8-4031bd 0->8 11 4031d7-4031db 7->11 8->7 12 403253-40326b GetTempPathA call 4030ed 11->12 13 4031dd-4031e0 11->13 22 40328d-4032a4 DeleteFileA call 402c74 12->22 23 40326d-40328b GetWindowsDirectoryA call 405add call 4030ed 12->23 14 4031e2-4031e6 13->14 15 4031e8-4031f0 13->15 14->14 14->15 17 4031f2-4031f3 15->17 18 4031f8-4031fb 15->18 17->18 20 403230-40323d call 4055ce 18->20 21 4031fd-403201 18->21 20->11 38 40323f-403240 20->38 25 403211-403217 21->25 26 403203-40320c 21->26 36 4032a6-4032ac 22->36 37 40330b-40331a ExitProcess CoUninitialize 22->37 23->22 23->37 33 403227-40322e 25->33 34 403219-403222 25->34 26->25 31 40320e 26->31 31->25 33->20 35 403242-40324e call 405aba 33->35 34->33 40 403224 34->40 35->12 41 4032fb-403302 call 40357e 36->41 42 4032ae-4032b5 call 4055ce 36->42 44 403320-403330 call 40535f ExitProcess 37->44 45 403405-40340b 37->45 38->11 40->33 52 403307 41->52 59 4032b7-4032b9 42->59 48 403488-403490 45->48 49 40340d-40342a call 405e06 * 3 45->49 55 403492 48->55 56 403496-40349a ExitProcess 48->56 73 403474-40347f ExitWindowsEx 49->73 74 40342c-40342e 49->74 52->37 55->56 61 4032c6-4032d0 59->61 62 4032bb-4032c1 59->62 65 4032d2-4032df call 405686 61->65 66 403336-403350 call 405add lstrcmpiA 61->66 62->61 64 4032c3-4032c4 62->64 64->59 65->37 76 4032e1-4032f7 call 405aba * 2 65->76 66->37 75 403352-403367 CreateDirectoryA SetCurrentDirectoryA 66->75 73->48 77 403481-403483 call 401430 73->77 74->73 78 403430-403432 74->78 79 403374-40338e call 405aba 75->79 80 403369-40336f call 405aba 75->80 76->41 77->48 78->73 83 403434-403446 GetCurrentProcess 78->83 90 403393-4033af call 405aee DeleteFileA 79->90 80->79 83->73 93 403448-40346a 83->93 96 4033f0-4033f7 90->96 97 4033b1-4033c1 CopyFileA 90->97 93->73 96->90 99 4033f9-403400 call 405807 96->99 97->96 98 4033c3-4033e3 call 405807 call 405aee call 4052ef 97->98 98->96 108 4033e5-4033ec CloseHandle 98->108 99->37 108->96
                                  APIs
                                  • #17.COMCTL32 ref: 00403140
                                  • SetErrorMode.KERNELBASE(00008001), ref: 0040314B
                                  • OleInitialize.OLE32(00000000), ref: 00403152
                                    • Part of subcall function 00405E06: GetModuleHandleA.KERNEL32(?,?,00000000,00403164,00000008), ref: 00405E18
                                    • Part of subcall function 00405E06: LoadLibraryA.KERNELBASE(?,?,00000000,00403164,00000008), ref: 00405E23
                                    • Part of subcall function 00405E06: GetProcAddress.KERNEL32(00000000,?), ref: 00405E34
                                  • SHGetFileInfoA.SHELL32(0041F424,00000000,?,00000160,00000000,00000008), ref: 0040317A
                                    • Part of subcall function 00405ABA: lstrcpynA.KERNEL32(?,?,00000400,0040318F,00423660,NSIS Error), ref: 00405AC7
                                  • GetCommandLineA.KERNEL32(00423660,NSIS Error), ref: 0040318F
                                  • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\file.exe",00000000), ref: 004031A2
                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\file.exe",00000020), ref: 004031CD
                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 0040325E
                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403273
                                  • DeleteFileA.KERNELBASE(1033), ref: 00403292
                                    • Part of subcall function 0040357E: lstrcmpiA.KERNEL32(?,.exe), ref: 00403677
                                    • Part of subcall function 0040357E: GetFileAttributesA.KERNEL32(del), ref: 00403682
                                    • Part of subcall function 0040357E: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp), ref: 004036CB
                                  • ExitProcess.KERNEL32(00000000), ref: 0040330B
                                    • Part of subcall function 004034A0: CloseHandle.KERNEL32(FFFFFFFF,00403310,00000000), ref: 004034AB
                                  • CoUninitialize.COMBASE(00000000), ref: 00403310
                                  • ExitProcess.KERNEL32 ref: 00403330
                                  • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 0040343B
                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403477
                                  • ExitProcess.KERNEL32 ref: 0040349A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: ExitProcess$FileHandle$LoadModuleWindows$AddressAttributesCharCloseCommandCurrentDeleteDirectoryErrorImageInfoInitializeLibraryLineModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                  • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\file.exe"$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\file.exe$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                  • API String ID: 1695990901-886356036
                                  • Opcode ID: f7a709ca0742978694a3c97eb0af91e4fe8893b2c71dc1a8bd703039c1ec1ec3
                                  • Instruction ID: b53188263471dee12f5d149d4766336b7fe55d69321b50a177ee119c3ff264de
                                  • Opcode Fuzzy Hash: f7a709ca0742978694a3c97eb0af91e4fe8893b2c71dc1a8bd703039c1ec1ec3
                                  • Instruction Fuzzy Hash: D091BF30A08340AFE7216F619D49B2B7EACEB01306F44057EF541B62D2C77C9E058B6E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 250 4053d0-4053eb call 405686 253 405404-40540e 250->253 254 4053ed-4053ff DeleteFileA 250->254 256 405410-405412 253->256 257 405422-405430 call 405aba 253->257 255 40559d-4055a0 254->255 258 405548-40554e 256->258 259 405418-40541c 256->259 265 405432-40543d call 405add 257->265 266 40543f-405440 call 4055ea 257->266 258->255 261 405550-405553 258->261 259->257 259->258 263 405555-40555b 261->263 264 40555d-405565 call 405ddf 261->264 263->255 264->255 273 405567-40557c call 4055a3 call 405770 RemoveDirectoryA 264->273 272 405445-405448 265->272 266->272 274 405453-405459 call 405add 272->274 275 40544a-405451 272->275 286 405595-405598 call 404e23 273->286 287 40557e-405582 273->287 276 40545e-40547c call 405ad0 FindFirstFileA 274->276 275->274 275->276 284 405482-405499 call 4055ce 276->284 285 40553e-405542 276->285 294 4054a4-4054a8 284->294 295 40549b-40549f 284->295 285->258 288 405544 285->288 286->255 287->263 290 405584-405593 call 404e23 call 405807 287->290 288->258 290->255 298 4054aa-4054ae 294->298 299 4054bf-4054cd call 405aba 294->299 295->294 297 4054a1 295->297 297->294 302 4054b0-4054b2 298->302 303 40551d-40552f FindNextFileA 298->303 308 4054e4-4054f3 call 405770 DeleteFileA 299->308 309 4054cf-4054d7 299->309 302->299 307 4054b4-4054b7 302->307 303->284 305 405535-405538 FindClose 303->305 305->285 307->299 310 4054b9-4054bd 307->310 316 405515-405518 call 404e23 308->316 317 4054f5-4054f9 308->317 309->303 311 4054d9-4054e2 call 4053d0 309->311 310->299 310->303 311->303 316->303 319 4054fb-40550b call 404e23 call 405807 317->319 320 40550d-405513 317->320 319->303 320->303
                                  APIs
                                  • DeleteFileA.KERNELBASE(?,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 004053EE
                                  • FindFirstFileA.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\*.*,?,?,?,00409010,?,C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\*.*,?,00000000,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 00405470
                                  • FindNextFileA.KERNELBASE(?,00000010,000000F2,?), ref: 00405527
                                  • FindClose.KERNEL32(?), ref: 00405538
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: FileFind$CloseDeleteFirstNext
                                  • String ID: "C:\Users\user\Desktop\file.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\*.*$\*.*
                                  • API String ID: 3592162902-3685466282
                                  • Opcode ID: f3c58b3c0ce27e4308d84dedcafb8235b4d8ccf19d0099df7c7845b38bed8bcc
                                  • Instruction ID: 74d340b71f8017ed308278dbc42343805d1fc446d82f36b4b8d67d3053e41216
                                  • Opcode Fuzzy Hash: f3c58b3c0ce27e4308d84dedcafb8235b4d8ccf19d0099df7c7845b38bed8bcc
                                  • Instruction Fuzzy Hash: 97510F30404A447ADB226B218C49BFF3A79DF82719F54807BF905B11D6D77C4A82CE6E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 525 4060fd-406102 526 406173-406194 525->526 527 406104-406133 525->527 530 4067c6-4067d8 526->530 528 406135-406138 527->528 529 40613a-40613e 527->529 531 40614a-40614d 528->531 532 406140-406144 529->532 533 406146 529->533 534 4067f2-406808 530->534 535 4067da-4067f0 530->535 536 40616b-40616e 531->536 537 40614f-406158 531->537 532->531 533->531 538 40680b-406812 534->538 535->538 543 406338-406356 536->543 539 40615a 537->539 540 40615d-406169 537->540 541 406814-406818 538->541 542 406839-406845 538->542 539->540 546 4061e1-40620f 540->546 547 40699a-4069a4 541->547 548 40681e-406836 541->548 549 405f47-405f50 542->549 550 4068a7-4068ba 542->550 544 406358-40636c 543->544 545 40636e-406380 543->545 554 406383-40638d 544->554 545->554 551 406211-406229 546->551 552 40622b-406245 546->552 547->550 556 4069a9 547->556 548->542 555 405f56 549->555 549->556 553 4069ac-4069b0 550->553 557 406248-406252 551->557 552->557 558 406330-406336 554->558 559 40638f 554->559 560 406023-406027 555->560 561 4060d4-4060f8 555->561 562 405f5d-405f61 555->562 563 40609e-4060a2 555->563 556->553 567 406258 557->567 568 4061c9-4061cf 557->568 558->543 566 406394-406397 558->566 575 406315-40632d 559->575 576 406306-406310 559->576 570 406038-406051 560->570 571 406029-406033 560->571 561->530 562->550 572 405f67-405f74 562->572 564 4060b3-4060c7 563->564 565 4060a4-4060ae 563->565 577 4060ca-4060d2 564->577 565->550 579 40639a-40639e 566->579 589 4061ae-4061c6 567->589 590 40619f-4061a9 567->590 573 4061d5-4061db 568->573 574 40628d-406293 568->574 580 406054-406058 570->580 571->550 572->556 581 405f7a-405fd7 572->581 573->546 584 4062f1-4062fb 573->584 574->584 585 406295-4062b3 574->585 575->558 576->550 577->561 577->563 586 406964-40696e 579->586 587 4063a4-4064f5 579->587 580->560 588 40605a-406060 580->588 582 405fd9-405fdd 581->582 583 405fff-406004 581->583 591 405fe8-405ff6 GlobalAlloc 582->591 592 405fdf-405fe2 GlobalFree 582->592 593 406006-40600c 583->593 594 406019-406021 583->594 584->579 595 4062b5-4062c9 585->595 596 4062cb-4062dd 585->596 586->550 586->553 587->530 587->549 598 406062-406069 588->598 599 40608a-40609c 588->599 589->568 590->550 591->556 600 405ffc 591->600 592->591 601 40600d-406017 593->601 594->580 602 4062e0-4062ea 595->602 596->602 603 406074-406084 GlobalAlloc 598->603 604 40606b-40606e GlobalFree 598->604 599->577 600->583 601->594 601->601 602->574 605 4062ec 602->605 603->556 603->599 604->603 607 406272-40628a 605->607 608 406263-40626d 605->608 607->574 608->550
                                  APIs
                                  • GlobalFree.KERNELBASE(00000000), ref: 00405FE2
                                  • GlobalAlloc.KERNELBASE(00000040,?,0040B01C,00004000,00000000), ref: 00405FEB
                                  • GlobalFree.KERNELBASE(00000000), ref: 0040606E
                                  • GlobalAlloc.KERNELBASE(00000040,00000000,0040B01C,00004000,00000000), ref: 00406079
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree
                                  • String ID:
                                  • API String ID: 3394109436-0
                                  • Opcode ID: bf58099490c7d3e9217101c12ed11adb7d2dc2cefc16823325d4d14cf14102e6
                                  • Instruction ID: 83e4b107c8805b2cf880e51a4f34143165cb8725b81d252219494a40d3d09cfb
                                  • Opcode Fuzzy Hash: bf58099490c7d3e9217101c12ed11adb7d2dc2cefc16823325d4d14cf14102e6
                                  • Instruction Fuzzy Hash: 2FF16371D00229CBDF28CFA8C8946ADBBB0FF44305F25816ED856BB281D7785A86CF44

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 620 405ddf-405df3 FindFirstFileA 621 405e00 620->621 622 405df5-405dfe FindClose 620->622 623 405e02-405e03 621->623 622->623
                                  APIs
                                  • FindFirstFileA.KERNELBASE(?,004224B0,C:\,004056D2,C:\,C:\,00000000,C:\,C:\,?,?,00000000,004053E4,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 00405DEA
                                  • FindClose.KERNEL32(00000000), ref: 00405DF6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID: C:\
                                  • API String ID: 2295610775-3404278061
                                  • Opcode ID: ad41643e803a1296b19ed9780854f03a1804f5503948aa46b41731e22b38ac44
                                  • Instruction ID: d997c3b4654e9e49067653d6df9cd6aacba9a2a5bd06b8acd2ab0c350c2db626
                                  • Opcode Fuzzy Hash: ad41643e803a1296b19ed9780854f03a1804f5503948aa46b41731e22b38ac44
                                  • Instruction Fuzzy Hash: B0D012759095206BC3005778ED0C94B7A59EB053317609A32F565F22E0C378AD918AED
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,00000000,00403164,00000008), ref: 00405E18
                                  • LoadLibraryA.KERNELBASE(?,?,00000000,00403164,00000008), ref: 00405E23
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00405E34
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: AddressHandleLibraryLoadModuleProc
                                  • String ID:
                                  • API String ID: 310444273-0
                                  • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                  • Instruction ID: 4b64482bd895928f148cc5a686a3b2c9a2ee41c2cea76cb4406aa07acf534c14
                                  • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                  • Instruction Fuzzy Hash: 3CE08C32A04510BBD3115B20AE0896B73A8EAD9B41301487EF655F6251D734AC11DBBA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 109 40357e-403596 call 405e06 112 403598-4035a8 call 405a17 109->112 113 4035aa-4035d1 call 4059a0 109->113 123 4035f4-40361d call 403847 call 405686 112->123 117 4035d3-4035e4 call 4059a0 113->117 118 4035e9-4035ef call 405add 113->118 117->118 118->123 128 403623-403628 123->128 129 4036a4-4036ac call 405686 123->129 128->129 130 40362a-403642 call 4059a0 128->130 134 4036ba-4036df LoadImageA 129->134 135 4036ae-4036b5 call 405aee 129->135 136 403647-40364e 130->136 138 4036e5-40371b RegisterClassA 134->138 139 40376e-403776 call 401430 134->139 135->134 136->129 140 403650-403652 136->140 141 403721-403769 SystemParametersInfoA CreateWindowExA 138->141 142 40383d 138->142 152 403780-40378b call 403847 139->152 153 403778-40377b 139->153 144 403663-40366f call 405ad0 140->144 145 403654-403661 call 4055ce 140->145 141->139 148 40383f-403846 142->148 154 403671-40367f lstrcmpiA 144->154 155 403697-40369f call 4055a3 call 405aba 144->155 145->144 163 403791-4037ae ShowWindow LoadLibraryA 152->163 164 403814-40381c call 404ef5 152->164 153->148 154->155 157 403681-40368b GetFileAttributesA 154->157 155->129 160 403691-403692 call 4055ea 157->160 161 40368d-40368f 157->161 160->155 161->155 161->160 168 4037b0-4037b5 LoadLibraryA 163->168 169 4037b7-4037c9 GetClassInfoA 163->169 174 403836-403838 call 401430 164->174 175 40381e-403824 164->175 168->169 171 4037e1-403812 DialogBoxParamA call 401430 call 4034ca 169->171 172 4037cb-4037db GetClassInfoA RegisterClassA 169->172 171->148 172->171 174->142 175->153 177 40382a-403831 call 401430 175->177 177->153
                                  APIs
                                    • Part of subcall function 00405E06: GetModuleHandleA.KERNEL32(?,?,00000000,00403164,00000008), ref: 00405E18
                                    • Part of subcall function 00405E06: LoadLibraryA.KERNELBASE(?,?,00000000,00403164,00000008), ref: 00405E23
                                    • Part of subcall function 00405E06: GetProcAddress.KERNEL32(00000000,?), ref: 00405E34
                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403677
                                  • GetFileAttributesA.KERNEL32(del), ref: 00403682
                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp), ref: 004036CB
                                    • Part of subcall function 00405A17: wsprintfA.USER32 ref: 00405A24
                                  • RegisterClassA.USER32 ref: 00403712
                                  • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 0040372A
                                  • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403763
                                  • ShowWindow.USER32(00000005,00000000), ref: 00403799
                                  • LoadLibraryA.KERNEL32(RichEd20), ref: 004037AA
                                  • LoadLibraryA.KERNEL32(RichEd32), ref: 004037B5
                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00423600), ref: 004037C5
                                  • GetClassInfoA.USER32(00000000,RichEdit,00423600), ref: 004037D2
                                  • RegisterClassA.USER32(00423600), ref: 004037DB
                                  • DialogBoxParamA.USER32(?,00000000,00403920,00000000), ref: 004037FA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcmpiwsprintf
                                  • String ID: "C:\Users\user\Desktop\file.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$del
                                  • API String ID: 3298640857-1998729920
                                  • Opcode ID: 3622f207a8de84843689798fb021ea29404539eb3abbff87691d54c644945829
                                  • Instruction ID: d8b6a56b7098eec18566c7b8ecfdadf94b8a985c1f18c636f14116d312d74c39
                                  • Opcode Fuzzy Hash: 3622f207a8de84843689798fb021ea29404539eb3abbff87691d54c644945829
                                  • Instruction Fuzzy Hash: 7F61C1B06042007ED620AF659C85F3B3AADEB4474AF80457FF941B22E1D77D9E018A7E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 183 402c74-402cc2 GetTickCount GetModuleFileNameA call 40578f 186 402cc4-402cc9 183->186 187 402cce-402cfc call 405aba call 4055ea call 405aba GetFileSize 183->187 188 402eab-402eaf 186->188 195 402d02 187->195 196 402de9-402df7 call 402c10 187->196 198 402d07-402d1e 195->198 202 402df9-402dfc 196->202 203 402e4c-402e51 196->203 200 402d20 198->200 201 402d22-402d24 call 4030a4 198->201 200->201 207 402d29-402d2b 201->207 205 402e20-402e4a GlobalAlloc call 4030d6 call 402eb2 202->205 206 402dfe-402e16 call 4030d6 call 4030a4 202->206 203->188 205->203 229 402e5d-402e6e 205->229 206->203 231 402e18-402e1e 206->231 209 402d31-402d38 207->209 210 402e53-402e5b call 402c10 207->210 214 402db4-402db8 209->214 215 402d3a-402d4e call 40574a 209->215 210->203 219 402dc2-402dc8 214->219 220 402dba-402dc1 call 402c10 214->220 215->219 234 402d50-402d57 215->234 226 402dd7-402de1 219->226 227 402dca-402dd4 call 405e7c 219->227 220->219 226->198 230 402de7 226->230 227->226 236 402e70 229->236 237 402e76-402e7d 229->237 230->196 231->203 231->205 234->219 235 402d59-402d60 234->235 235->219 239 402d62-402d69 235->239 236->237 240 402e7e-402e86 237->240 239->219 241 402d6b-402d72 239->241 240->240 242 402e88-402ea4 SetFilePointer call 40574a 240->242 241->219 243 402d74-402d94 241->243 246 402ea9 242->246 243->203 245 402d9a-402d9e 243->245 247 402da0-402da4 245->247 248 402da6-402dae 245->248 246->188 247->230 247->248 248->219 249 402db0-402db2 248->249 249->219
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402C85
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000400), ref: 00402CA1
                                    • Part of subcall function 0040578F: GetFileAttributesA.KERNELBASE(00000003,00402CB4,C:\Users\user\Desktop\file.exe,80000000,00000003), ref: 00405793
                                    • Part of subcall function 0040578F: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004057B5
                                  • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\file.exe,C:\Users\user\Desktop\file.exe,80000000,00000003), ref: 00402CED
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                  • String ID: pA$"C:\Users\user\Desktop\file.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\file.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                  • API String ID: 4283519449-77591201
                                  • Opcode ID: 618a81ccb80276bd782fabd61a3f0b27549380f8bfdeccb4a79955be0cb22e25
                                  • Instruction ID: b606118e793ed5daa4b59b550b8b3073780e541e0a534cf6fb5e0acbaf3dc485
                                  • Opcode Fuzzy Hash: 618a81ccb80276bd782fabd61a3f0b27549380f8bfdeccb4a79955be0cb22e25
                                  • Instruction Fuzzy Hash: A851E231A41215ABDB209F65DE49B9E7BB8EF14315F24413BE900B72D1C7BC9E418BAC

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 325 402eb2-402ec6 326 402ec8 325->326 327 402ecf-402ed7 325->327 326->327 328 402ed9 327->328 329 402ede-402ee3 327->329 328->329 330 402ef3-402f00 call 4030a4 329->330 331 402ee5-402eee call 4030d6 329->331 335 403092 330->335 336 402f06-402f0a 330->336 331->330 337 403094-403095 335->337 338 402f10-402f30 GetTickCount call 405ef2 336->338 339 403038-40303a 336->339 340 40309d-4030a1 337->340 345 40309a 338->345 352 402f36-402f3e 338->352 341 40303c-403040 339->341 342 40307f-403082 339->342 344 403042-403048 341->344 341->345 347 403084 342->347 348 403087-403090 call 4030a4 342->348 350 40304a 344->350 351 40304d-40305b call 4030a4 344->351 345->340 347->348 348->335 357 403097 348->357 350->351 351->335 360 40305d-403070 WriteFile 351->360 355 402f40 352->355 356 402f43-402f51 call 4030a4 352->356 355->356 356->335 364 402f57-402f60 356->364 357->345 362 403072-403075 360->362 363 403034-403036 360->363 362->363 365 403077-40307d 362->365 363->337 366 402f66-402f83 call 405f14 364->366 365->341 369 403030-403032 366->369 370 402f89-402fa0 GetTickCount 366->370 369->337 371 402fa2-402faa 370->371 372 402fe5-402fe9 370->372 373 402fb2-402fe2 MulDiv wsprintfA call 404e23 371->373 374 402fac-402fb0 371->374 375 403025-403028 372->375 376 402feb-402fee 372->376 373->372 374->372 374->373 375->352 377 40302e 375->377 379 402ff0-403002 WriteFile 376->379 380 40300e-403014 376->380 377->345 379->363 382 403004-403007 379->382 383 40301a-40301e 380->383 382->363 384 403009-40300c 382->384 383->345 385 403020 383->385 384->383 385->366
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402F10
                                  • GetTickCount.KERNEL32 ref: 00402F91
                                  • MulDiv.KERNEL32(00000001,00000064,00000020), ref: 00402FBE
                                  • wsprintfA.USER32 ref: 00402FCE
                                  • WriteFile.KERNELBASE(00000000,0040F01C,0040F01C,00000000,00000000,00000000,?), ref: 00402FFA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CountTick$FileWritewsprintf
                                  • String ID: ... %d%%
                                  • API String ID: 4209647438-2449383134
                                  • Opcode ID: 40ee30e9fd5152ab7d23f350c32f624ce2127b6ae4ef115e242253f6f80746b3
                                  • Instruction ID: 4381862cb37d4cb8e36b80e80363237e84dce081af7ae7260683fe282ac783e9
                                  • Opcode Fuzzy Hash: 40ee30e9fd5152ab7d23f350c32f624ce2127b6ae4ef115e242253f6f80746b3
                                  • Instruction Fuzzy Hash: 9F51717190220AABDF10DF65DA08A9F7BBCAB44355F14413BF910B72C5C7789E50CBAA

                                  Control-flow Graph

                                  APIs
                                  • CompareFileTime.KERNEL32(-00000014,?,del,del,00000000,00000000,del,C:\Users\user\AppData\Local\Temp,00000000,00000000,00000031), ref: 004017D3
                                    • Part of subcall function 00405ABA: lstrcpynA.KERNEL32(?,?,00000400,0040318F,00423660,NSIS Error), ref: 00405AC7
                                    • Part of subcall function 00404E23: SetWindowTextA.USER32(0041FC3C,0041FC3C), ref: 00404E91
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EB7
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404ED1
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404EDF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Local\Temp$C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\SelfDel.dll$del
                                  • API String ID: 937995094-2371661106
                                  • Opcode ID: 768682712570a18850501d8660df66a62a37743bf310801a9775bb9f9bc60d00
                                  • Instruction ID: addc9aa2db3b382a4d0e8f7b3d9efda18be127b7accd4839aa404bfc27cf46c8
                                  • Opcode Fuzzy Hash: 768682712570a18850501d8660df66a62a37743bf310801a9775bb9f9bc60d00
                                  • Instruction Fuzzy Hash: FA41C531A01514BACF10BB65DD86DAF3679EF41329B20433BF512F21E2D67C4A418EAD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 459 401f98-401fa4 460 402060-402062 459->460 461 401faa-401fc0 call 402a3c * 2 459->461 463 4021a8-4021ad call 401448 460->463 470 401fc2-401fcd GetModuleHandleA 461->470 471 401fcf-401fdd LoadLibraryExA 461->471 469 4028d1-4028e0 463->469 470->471 473 401fdf-401fed GetProcAddress 470->473 471->473 474 402059-40205b 471->474 476 40202c-402031 call 404e23 473->476 477 401fef-401ff5 473->477 474->463 481 402036-402039 476->481 479 401ff7-402003 call 401448 477->479 480 40200e-40202a 477->480 479->481 489 402005-40200c 479->489 480->481 481->469 484 40203f-402047 call 40351a 481->484 484->469 490 40204d-402054 FreeLibrary 484->490 489->481 490->469
                                  APIs
                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401FC3
                                    • Part of subcall function 00404E23: SetWindowTextA.USER32(0041FC3C,0041FC3C), ref: 00404E91
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EB7
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404ED1
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404EDF
                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FD3
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00401FE3
                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040204E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$Library$AddressFreeHandleLoadModuleProcTextWindow
                                  • String ID: >B
                                  • API String ID: 2049714024-1025945437
                                  • Opcode ID: b47d628cdc2b72a844ea518df37b26bb7517ba57572088f8ade541aeec8e758b
                                  • Instruction ID: aa6fc6c33b3fdf6314d027099c25d221225d7ff07199dc9467d2da2f8f6cc686
                                  • Opcode Fuzzy Hash: b47d628cdc2b72a844ea518df37b26bb7517ba57572088f8ade541aeec8e758b
                                  • Instruction Fuzzy Hash: EA21F932D04215B7CF20AFA4DF4DA6E7665AF40358F204237F611B62D0C7BD49819A5E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 491 4015db-4015ee call 402a3c call 405637 496 4015f0-40160b call 4055ce CreateDirectoryA 491->496 497 401632-401635 491->497 504 401628-401630 496->504 505 40160d-401618 GetLastError 496->505 498 401655-4021ad call 401448 497->498 499 401637-401650 call 401448 call 405aba SetCurrentDirectoryA 497->499 513 4028d1-4028e0 498->513 499->513 504->496 504->497 508 401625 505->508 509 40161a-401623 GetFileAttributesA 505->509 508->504 509->504 509->508
                                  APIs
                                    • Part of subcall function 00405637: CharNextA.USER32(S@,?,C:\,00000000,0040569D,C:\,C:\,?,?,00000000,004053E4,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 00405645
                                    • Part of subcall function 00405637: CharNextA.USER32(00000000), ref: 0040564A
                                    • Part of subcall function 00405637: CharNextA.USER32(00000000), ref: 00405659
                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Temp,00000000,00000000,000000F0), ref: 0040164A
                                    • Part of subcall function 004055CE: CharNextA.USER32(?,004031CC,"C:\Users\user\Desktop\file.exe",00000020), ref: 004055DF
                                  • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 00401603
                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                  • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 0040161B
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp, xrefs: 0040163F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                  • String ID: C:\Users\user\AppData\Local\Temp
                                  • API String ID: 3751793516-3707357800
                                  • Opcode ID: bffddcac20e3bcd4451fc1ad6022db4a4855f4b064c55159f67b1ca216094a7a
                                  • Instruction ID: df909b886637b0bb0bac9a5d09a15d56d747cde8ad7674080f5f79713941c968
                                  • Opcode Fuzzy Hash: bffddcac20e3bcd4451fc1ad6022db4a4855f4b064c55159f67b1ca216094a7a
                                  • Instruction Fuzzy Hash: 2F010831908140ABDB207B781C4896E37A49A51329728073FF492B22E2D23C4942963E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 516 4057be-4057c8 517 4057c9-4057f2 GetTickCount GetTempFileNameA 516->517 518 405803-405805 517->518 519 4057f4-4057f9 517->519 521 4057fd-405800 518->521 519->517 520 4057fb 519->520 520->521
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 004057D0
                                  • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 004057EA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: "C:\Users\user\Desktop\file.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-1681837184
                                  • Opcode ID: 039eec692b3cab215364555e49a254316f079165f6bec859b49b181732976f0d
                                  • Instruction ID: fcff069b7a085bc23b02539c582d539160aaa44614109564f001e62bd316a6c5
                                  • Opcode Fuzzy Hash: 039eec692b3cab215364555e49a254316f079165f6bec859b49b181732976f0d
                                  • Instruction Fuzzy Hash: E2F08232748214B6D7104E59AC04B9B7F69DB91750F04C027F904DA180D6B19A5997A5

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 522 4052ef-40531c CreateProcessA 523 40532a-40532b 522->523 524 40531e-405327 CloseHandle 522->524 524->523
                                  APIs
                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00422468,Error launching installer), ref: 00405314
                                  • CloseHandle.KERNEL32(?), ref: 00405321
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004052EF
                                  • Error launching installer, xrefs: 00405302
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
                                  • API String ID: 3712363035-3625802312
                                  • Opcode ID: 136a8c69e03052529237b728483ec7a68084cf12bebd42ffed9ce86d4dbaa0c2
                                  • Instruction ID: cc0da3218ca1870966f316b567b6b88986ba0dd0d5b7897c550cf8372f4d746c
                                  • Opcode Fuzzy Hash: 136a8c69e03052529237b728483ec7a68084cf12bebd42ffed9ce86d4dbaa0c2
                                  • Instruction Fuzzy Hash: 3DE0ECB4A00209BBEB00AF64ED0996B7BBCFB14345B808522A911E2250E7B8D514CE79

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 00405D46: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405D9E
                                    • Part of subcall function 00405D46: CharNextA.USER32(?,?,?,00000000), ref: 00405DAB
                                    • Part of subcall function 00405D46: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405DB0
                                    • Part of subcall function 00405D46: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405DC0
                                  • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 0040310E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Char$Next$CreateDirectoryPrev
                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 4115351271-3144792594
                                  • Opcode ID: 0dd361f5aa555e8b796fae8027a7b2bd2de9e63c724c903c03b9c76945b8c3bd
                                  • Instruction ID: 90da95e76a55199b039ea2a058e01b0e2884c6e3a12f4984454634433cc2249d
                                  • Opcode Fuzzy Hash: 0dd361f5aa555e8b796fae8027a7b2bd2de9e63c724c903c03b9c76945b8c3bd
                                  • Instruction Fuzzy Hash: 25D0522160B83022C9513A263C0AFCF080D8F8332DB52403BF804B91824BAC5A8208EE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 624 405f14-405f37 625 405f41-405f44 624->625 626 405f39-405f3c 624->626 628 405f47-405f50 625->628 627 4069ac-4069b0 626->627 629 405f56 628->629 630 4069a9 628->630 631 406023-406027 629->631 632 4060d4-4067d8 629->632 633 405f5d-405f61 629->633 634 40609e-4060a2 629->634 630->627 638 406038-406051 631->638 639 406029-406033 631->639 643 4067f2-406808 632->643 644 4067da-4067f0 632->644 640 4068a7-4068ba 633->640 641 405f67-405f74 633->641 635 4060b3-4060c7 634->635 636 4060a4-4060ae 634->636 642 4060ca-4060d2 635->642 636->640 645 406054-406058 638->645 639->640 640->627 641->630 646 405f7a-405fd7 641->646 642->632 642->634 649 40680b-406812 643->649 644->649 645->631 650 40605a-406060 645->650 647 405fd9-405fdd 646->647 648 405fff-406004 646->648 651 405fe8-405ff6 GlobalAlloc 647->651 652 405fdf-405fe2 GlobalFree 647->652 653 406006-40600c 648->653 654 406019-406021 648->654 655 406814-406818 649->655 656 406839-406845 649->656 657 406062-406069 650->657 658 40608a-40609c 650->658 651->630 659 405ffc 651->659 652->651 660 40600d-406017 653->660 654->645 661 40699a-4069a4 655->661 662 40681e-406836 655->662 656->628 656->640 663 406074-406084 GlobalAlloc 657->663 664 40606b-40606e GlobalFree 657->664 658->642 659->648 660->654 660->660 661->630 661->640 662->656 663->630 663->658 664->663
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ecf66c14af0c056a74c7f0a3626fcf1907275ea5d12f0e8c4362a15e1ea876b2
                                  • Instruction ID: cd9ea6a497ca954d9af0e0ea2773304394fd5ac28959d93751cbe7ffc537dccb
                                  • Opcode Fuzzy Hash: ecf66c14af0c056a74c7f0a3626fcf1907275ea5d12f0e8c4362a15e1ea876b2
                                  • Instruction Fuzzy Hash: 25815671E14228CBEF24CFA8C844BADB7B0FB44305F11816AE456BB280D7B85986DF55

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 665 40678d-406791 666 4067b3-4067c3 665->666 667 406793-406895 665->667 668 4067c6-4067d8 666->668 677 4068dd-4068e1 667->677 670 4067f2-406808 668->670 671 4067da-4067f0 668->671 673 40680b-406812 670->673 671->673 675 406814-406818 673->675 676 406839-406845 673->676 680 40699a-4069a4 675->680 681 40681e-406836 675->681 682 405f47-405f50 676->682 683 4068a7-4068ba 676->683 678 406941-406951 677->678 679 4068e3-406904 677->679 684 4069ac-4069b0 678->684 685 406906-40691b 679->685 686 40691d-406930 679->686 680->683 688 4069a9 680->688 681->676 687 405f56 682->687 682->688 683->684 689 406933-40693a 685->689 686->689 690 406023-406027 687->690 691 4060d4-4060f8 687->691 692 405f5d-405f61 687->692 693 40609e-4060a2 687->693 688->684 696 4068da 689->696 697 40693c 689->697 698 406038-406051 690->698 699 406029-406033 690->699 691->668 692->683 700 405f67-405f74 692->700 694 4060b3-4060c7 693->694 695 4060a4-4060ae 693->695 701 4060ca-4060d2 694->701 695->683 696->677 705 40689d 697->705 706 4068bf-4068d7 697->706 703 406054-406058 698->703 699->683 700->688 704 405f7a-405fd7 700->704 701->691 701->693 703->690 709 40605a-406060 703->709 707 405fd9-405fdd 704->707 708 405fff-406004 704->708 705->683 706->696 710 405fe8-405ff6 GlobalAlloc 707->710 711 405fdf-405fe2 GlobalFree 707->711 712 406006-40600c 708->712 713 406019-406021 708->713 714 406062-406069 709->714 715 40608a-40609c 709->715 710->688 716 405ffc 710->716 711->710 717 40600d-406017 712->717 713->703 718 406074-406084 GlobalAlloc 714->718 719 40606b-40606e GlobalFree 714->719 715->701 716->708 717->713 717->717 718->688 718->715 719->718
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e01f9bfc12093ebd2a0ace66a6e2983abb1a79ee681fd065951b99aacc9764d
                                  • Instruction ID: e06ea804dbf93606c4cf2ec606974c4dc0ffee357b4f6b21e966eca63da280ad
                                  • Opcode Fuzzy Hash: 6e01f9bfc12093ebd2a0ace66a6e2983abb1a79ee681fd065951b99aacc9764d
                                  • Instruction Fuzzy Hash: 5F912471E00229CFEF24CF98C8547ADBBB1FB44305F16806AD546BB280D7B85996DF45
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5eb9fd359c95db430e0465195f4970a86e8f2719c9ef8c5527313d45e4f3266c
                                  • Instruction ID: 43c1fa64ae9ad9abbe87c40f05c1c1775fdafde48368947bccf4b02a3e6372c8
                                  • Opcode Fuzzy Hash: 5eb9fd359c95db430e0465195f4970a86e8f2719c9ef8c5527313d45e4f3266c
                                  • Instruction Fuzzy Hash: 38815671E04229CFEF24CF98C8447ADBBB1FB44305F25806AD446BB280D7789995DF55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d20c7f478e90be312cd39b007b0cb2ff2d66cd832eda1021e462df0f8e1a227c
                                  • Instruction ID: 00e67c9986d3c13f7dc060ca4da6ff0f66469df01e46bc4710d544ff4f2b403c
                                  • Opcode Fuzzy Hash: d20c7f478e90be312cd39b007b0cb2ff2d66cd832eda1021e462df0f8e1a227c
                                  • Instruction Fuzzy Hash: B5814471E00228CFEF24CF98C844BADBBB0FB44305F21806AE406BB280D7789A95DF55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f83572679ed04b028c43571e03cfafa94b0d1e0d75751db20946e046a77de563
                                  • Instruction ID: 33b3cf2dadc0a46e9d82620d4e905de9cd6e7506735f4cffe316a84ff05b4fe5
                                  • Opcode Fuzzy Hash: f83572679ed04b028c43571e03cfafa94b0d1e0d75751db20946e046a77de563
                                  • Instruction Fuzzy Hash: F7713471E00229CFEF24CF98C854BADBBB1FB44305F26806AE506BB280D7789995DF55
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 68c79de9321bf552e89de45483f473f641a799cf77810d6ee952ebbb3297c9cb
                                  • Instruction ID: 2ad84defe6136893297db3800509cf5dc6111a0e300241fdf9749391c9d2dfd8
                                  • Opcode Fuzzy Hash: 68c79de9321bf552e89de45483f473f641a799cf77810d6ee952ebbb3297c9cb
                                  • Instruction Fuzzy Hash: AE713871E00229CFEF24CF98C854BADB7B1FB44305F11806AE546BB280D7789A96DF55
                                  APIs
                                    • Part of subcall function 00404E23: SetWindowTextA.USER32(0041FC3C,0041FC3C), ref: 00404E91
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EB7
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404ED1
                                    • Part of subcall function 00404E23: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404EDF
                                    • Part of subcall function 004052EF: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00422468,Error launching installer), ref: 00405314
                                    • Part of subcall function 004052EF: CloseHandle.KERNEL32(?), ref: 00405321
                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E8E
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EAC
                                    • Part of subcall function 00405E3F: PeekMessageA.USER32(?,00000000,00402DF0,00402DF0,00000001), ref: 00405E5A
                                    • Part of subcall function 00405E3F: DispatchMessageA.USER32(?), ref: 00405E64
                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401ED1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Message$Send$CloseHandleProcess$CodeCreateDispatchExitObjectPeekSingleTextWaitWindow
                                  • String ID:
                                  • API String ID: 3753073698-0
                                  • Opcode ID: 3867a90f1fb0108aa947dff9cec38027b39d2ef8cfb3e029f51d4918e6bd1a69
                                  • Instruction ID: a46dd4ec6362f9838c5b44662676efaf077e7f5c45a6b5d2da1a29c0b0f7668f
                                  • Opcode Fuzzy Hash: 3867a90f1fb0108aa947dff9cec38027b39d2ef8cfb3e029f51d4918e6bd1a69
                                  • Instruction Fuzzy Hash: 6B015E31A04104ABDF209F91CD4499E7BB5EF00315F10407BFA05B51E0C7BD4A829F99
                                  APIs
                                  • RegOpenKeyExA.KERNELBASE(?,?,00000000,00405BFC,00405BFC,00000002,?,?,00405BFC,80000002,Software\Microsoft\Windows\CurrentVersion,?,del,?,?,00404E5B), ref: 004059C9
                                  • RegQueryValueExA.ADVAPI32(00405BFC,?,00000000,80000002,80000002,?,?,00405BFC,80000002,Software\Microsoft\Windows\CurrentVersion), ref: 004059EA
                                  • RegCloseKey.ADVAPI32(00405BFC,?,00405BFC,80000002,Software\Microsoft\Windows\CurrentVersion), ref: 00405A0B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CloseOpenQueryValue
                                  • String ID:
                                  • API String ID: 3677997916-0
                                  • Opcode ID: 20ca1dc64cf80f35bde4a5a459f169022cfe0f17446037da1f5ac97088a586f8
                                  • Instruction ID: 6a26a4cbbe92f56136166bd4860d1e55c9ec7579870860227dca3d620881aae1
                                  • Opcode Fuzzy Hash: 20ca1dc64cf80f35bde4a5a459f169022cfe0f17446037da1f5ac97088a586f8
                                  • Instruction Fuzzy Hash: 4501567114024AEFDB228F64EC89AEB7FACEF14394F004536F945A6220D235D964DFA5
                                  APIs
                                    • Part of subcall function 00405ABA: lstrcpynA.KERNEL32(?,?,00000400,0040318F,00423660,NSIS Error), ref: 00405AC7
                                    • Part of subcall function 00405637: CharNextA.USER32(S@,?,C:\,00000000,0040569D,C:\,C:\,?,?,00000000,004053E4,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 00405645
                                    • Part of subcall function 00405637: CharNextA.USER32(00000000), ref: 0040564A
                                    • Part of subcall function 00405637: CharNextA.USER32(00000000), ref: 00405659
                                  • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,00000000,C:\,C:\,?,?,00000000,004053E4,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 004056E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpyn
                                  • String ID: C:\
                                  • API String ID: 1620728220-3404278061
                                  • Opcode ID: 8b6a650f47c5d77a11693364255d147431381df484ab3129b76ca628e03cb58d
                                  • Instruction ID: cf168ce39b7d5aa890c9326bccca8d1b3a6b720b170b0c7d4f5a2b9794c9289a
                                  • Opcode Fuzzy Hash: 8b6a650f47c5d77a11693364255d147431381df484ab3129b76ca628e03cb58d
                                  • Instruction Fuzzy Hash: ACF02821206E5129C72233365C09AAF2A05CE933647D50D3BF869F13D2DA3E8903CD7E
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 0040140B
                                  • SendMessageA.USER32(?,00000402,00000000), ref: 0040141B
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: dc31a525b0d78d586b06c459b6c8b59f1dbcd44b7dc1c0b357438cb554342be6
                                  • Instruction ID: 8306b540dbad444690881dece7272c135e78fd4af76d6f94f2eda4691c923ec6
                                  • Opcode Fuzzy Hash: dc31a525b0d78d586b06c459b6c8b59f1dbcd44b7dc1c0b357438cb554342be6
                                  • Instruction Fuzzy Hash: A401D131B14210ABE7245F24AD48B2672A9E714B15F60463BFA11F66F0E67CCD428B59
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(00000003,00402CB4,C:\Users\user\Desktop\file.exe,80000000,00000003), ref: 00405793
                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004057B5
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                  • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
                                  • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                  • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
                                  APIs
                                  • CloseHandle.KERNEL32(FFFFFFFF,00403310,00000000), ref: 004034AB
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\, xrefs: 004034BF
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsi2AC5.tmp\
                                  • API String ID: 2962429428-489695763
                                  • Opcode ID: bf564ea65003144b177e2f66b60816cea781d9f28756f3edebc367de77a61f64
                                  • Instruction ID: 784c609a44dbd15fcea0832281ee9897f9ae73f7a75bb58e0c1ae8bb1143d783
                                  • Opcode Fuzzy Hash: bf564ea65003144b177e2f66b60816cea781d9f28756f3edebc367de77a61f64
                                  • Instruction Fuzzy Hash: 4EC0123064460097D2247F74AE0E5053A285741736FA04365F571F40F1D77C5901453F
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(?,00405573,?,?,?), ref: 00405774
                                  • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405786
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                  • Instruction ID: 1e5ab56e7945c62be4c341f57016c3f6baca31b7fe5c1c7ce991960d9b2cca7d
                                  • Opcode Fuzzy Hash: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                  • Instruction Fuzzy Hash: 31C04CB1808501BFD6015B24DF0D82F7B66EB50321F108B35F569E10F0C7355C66EA1A
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EFE,000000FF,00000004,00000000,00000000,00000000), ref: 004030BB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: ad01ebe994ea8e5d75c17f9dc7d74897aeb2d9cbe5df98e8e9faa76ff59ceebd
                                  • Instruction ID: 895086ffe442742ac6ea60d832c2963359df8ab299286f81918eabf0cb496861
                                  • Opcode Fuzzy Hash: ad01ebe994ea8e5d75c17f9dc7d74897aeb2d9cbe5df98e8e9faa76ff59ceebd
                                  • Instruction Fuzzy Hash: 7FE08631111119BBDF214F519C00FD63B5CEB04762F008033FA04EA1D0C571AA509BA5
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402E3B,?), ref: 004030E4
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                  • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                                  • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                  • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 00404FC5
                                  • GetDlgItem.USER32(?,000003EE), ref: 00404FD4
                                  • GetClientRect.USER32(?,?), ref: 00405011
                                  • GetSystemMetrics.USER32(00000015), ref: 00405019
                                  • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 0040503A
                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 0040504B
                                  • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 0040505E
                                  • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 0040506C
                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040507F
                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004050A1
                                  • ShowWindow.USER32(?,00000008), ref: 004050B5
                                  • GetDlgItem.USER32(?,000003EC), ref: 004050D6
                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004050E6
                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004050FF
                                  • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 0040510B
                                  • GetDlgItem.USER32(?,000003F8), ref: 00404FE3
                                    • Part of subcall function 00403E28: SendMessageA.USER32(00000028,?,00000001,00403C59), ref: 00403E36
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040512A
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00004EF5,00000000), ref: 00405138
                                  • CloseHandle.KERNEL32(00000000), ref: 0040513F
                                  • ShowWindow.USER32(00000000), ref: 00405163
                                  • ShowWindow.USER32(?,00000008), ref: 00405168
                                  • ShowWindow.USER32(00000008), ref: 004051AF
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051E1
                                  • CreatePopupMenu.USER32 ref: 004051F2
                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405207
                                  • GetWindowRect.USER32(?,?), ref: 0040521A
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040523E
                                  • SendMessageA.USER32(?,0000102D,?,?), ref: 00405277
                                  • OpenClipboard.USER32(00000000), ref: 0040528C
                                  • EmptyClipboard.USER32 ref: 00405292
                                  • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 0040529B
                                  • GlobalLock.KERNEL32(00000000), ref: 004052A5
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052B9
                                  • GlobalUnlock.KERNEL32(00000000), ref: 004052D1
                                  • SetClipboardData.USER32(00000001,00000000), ref: 004052DC
                                  • CloseClipboard.USER32 ref: 004052E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                  • String ID: {
                                  • API String ID: 590372296-366298937
                                  • Opcode ID: 9870f1ce2fba9627d33594a99c66d082a961ba676daaf4e718c2990612632be8
                                  • Instruction ID: 08e0936ae59f397b4605378a1edb99518d3703162f2206ca35357ddfe10324b1
                                  • Opcode Fuzzy Hash: 9870f1ce2fba9627d33594a99c66d082a961ba676daaf4e718c2990612632be8
                                  • Instruction Fuzzy Hash: B9A15C71900208BFDB219F60DD85EAE7F79FB04755F00417AFA04BA2A0C7799A42DF59
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 0040475F
                                  • GetDlgItem.USER32(?,00000408), ref: 0040476A
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004047B4
                                  • LoadBitmapA.USER32(0000006E), ref: 004047C7
                                  • SetWindowLongA.USER32(?,000000FC,00404D73), ref: 004047E1
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004047F6
                                  • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 0040480A
                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404820
                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 0040482C
                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 0040483C
                                  • DeleteObject.GDI32(?), ref: 00404841
                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404871
                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 0040487D
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404918
                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404943
                                    • Part of subcall function 00403E28: SendMessageA.USER32(00000028,?,00000001,00403C59), ref: 00403E36
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404957
                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404986
                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404994
                                  • ShowWindow.USER32(?,00000005), ref: 004049A5
                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404A9C
                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404B0C
                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404B22
                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404B44
                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404B6A
                                  • ImageList_Destroy.COMCTL32(?), ref: 00404B7F
                                  • GlobalFree.KERNEL32(?), ref: 00404B8F
                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404C06
                                  • ShowWindow.USER32(?,00000000), ref: 00404C69
                                  • GetDlgItem.USER32(?,000003FE), ref: 00404C74
                                  • ShowWindow.USER32(00000000), ref: 00404C7B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeLoadMaskedObject
                                  • String ID: $M
                                  • API String ID: 3675576192-1049183097
                                  • Opcode ID: 4618fa708a38249d694b32bd70fbe9416654b157d1f3121e349870d1067c65da
                                  • Instruction ID: b153bbacb3e91fb1e2d33faf95d19a4ccd4d645eed3ae2813ebe8e1d5ff954cb
                                  • Opcode Fuzzy Hash: 4618fa708a38249d694b32bd70fbe9416654b157d1f3121e349870d1067c65da
                                  • Instruction Fuzzy Hash: 2AF19FB0A00209AFEB209F64CD45BAE7BB5FB84315F10413AF714BA2E1D7799A51CF58
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 0040427E
                                  • SetWindowTextA.USER32(?,?), ref: 004042AB
                                  • SHBrowseForFolderA.SHELL32(?,0041F838,?), ref: 00404360
                                  • CoTaskMemFree.OLE32(00000000), ref: 0040436B
                                  • lstrcmpiA.KERNEL32(del,00420460), ref: 0040439D
                                    • Part of subcall function 00405343: GetDlgItemTextA.USER32(?,?,00000400,004043EC), ref: 00405356
                                    • Part of subcall function 00405D46: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405D9E
                                    • Part of subcall function 00405D46: CharNextA.USER32(?,?,?,00000000), ref: 00405DAB
                                    • Part of subcall function 00405D46: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405DB0
                                    • Part of subcall function 00405D46: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405DC0
                                  • GetDiskFreeSpaceA.KERNEL32(0041F434,?,?,0000040F,?,0041F434,0041F434,?,00000000,0041F434,?,?,000003FB,?), ref: 00404472
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040448D
                                    • Part of subcall function 0040532E: SetDlgItemTextA.USER32(?,?,?), ref: 0040533A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Char$ItemNextText$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcmpi
                                  • String ID: A$C:\Users\user\AppData\Local\Temp$del
                                  • API String ID: 2187339355-149061535
                                  • Opcode ID: 0044fd3db1d5ee3921df077c54b0b0b288afed3a920886a143cc4cc486ef188d
                                  • Instruction ID: 9833108ab83f13d1216fd3bd0ec19b1ce1809796a8840f851a17381b2ce6f0d3
                                  • Opcode Fuzzy Hash: 0044fd3db1d5ee3921df077c54b0b0b288afed3a920886a143cc4cc486ef188d
                                  • Instruction Fuzzy Hash: 92A153B1A00118ABDF109FA1DC85AAF7AB9EF84358F10407BFA04B62D1D77C9A41CF59
                                  APIs
                                  • GetVersion.KERNEL32(?,0041FC3C,00000000,?,00404E5B,0041FC3C,00000000,00000000,0040F01C,0040F01C), ref: 00405B9F
                                  • GetSystemDirectoryA.KERNEL32(del,00000400), ref: 00405C17
                                  • GetWindowsDirectoryA.KERNEL32(del,00000400,?,00404E5B,0041FC3C,00000000), ref: 00405C2A
                                  • SHGetSpecialFolderLocation.SHELL32(?,0040F01C,?,00404E5B,0041FC3C,00000000), ref: 00405C6A
                                  • SHGetPathFromIDListA.SHELL32(0040F01C,del,?,00404E5B,0041FC3C,00000000), ref: 00405C78
                                  • CoTaskMemFree.OLE32(0040F01C,?,00404E5B,0041FC3C,00000000), ref: 00405C84
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindows
                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$del
                                  • API String ID: 2629221455-2108001582
                                  • Opcode ID: 00110967bc701b678de305f9c91e03ececfbbb2a2219761589b9e98642f920be
                                  • Instruction ID: fa9f0e703a813b7a27b824d0a196bdede8b756cd7ff50f9c9e599dafcba5bb42
                                  • Opcode Fuzzy Hash: 00110967bc701b678de305f9c91e03ececfbbb2a2219761589b9e98642f920be
                                  • Instruction Fuzzy Hash: 4E611431A08A55ABEB209F689C887BB7BB4EF11314F14823BE911BA2D0C37C5941DF4D
                                  APIs
                                  • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BA
                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409348,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402171
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp, xrefs: 004020F2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: ByteCharCreateInstanceMultiWide
                                  • String ID: C:\Users\user\AppData\Local\Temp
                                  • API String ID: 123533781-3707357800
                                  • Opcode ID: b7064c46d57a15f65ff4574600a3e04ef0947528f292f649836ead34992cb8fa
                                  • Instruction ID: c1d0d012afded3b4039fd74b7075fbe76126839184038c5d6160efa632d3cb24
                                  • Opcode Fuzzy Hash: b7064c46d57a15f65ff4574600a3e04ef0947528f292f649836ead34992cb8fa
                                  • Instruction Fuzzy Hash: F1418E71A00204BFCB10DFA4CD88E9E3BB6AF49324B20456AF905FF2D1DA799D41CB54
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 00402693
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: 520eb23b417cbef5900151e10629b033abb70deac232ebacd5e489bad6b7fb30
                                  • Instruction ID: 7afb1a03dd7f1a0191d37dc0c80b4dee7408fc38be1324a9a7e80c107b976cf9
                                  • Opcode Fuzzy Hash: 520eb23b417cbef5900151e10629b033abb70deac232ebacd5e489bad6b7fb30
                                  • Instruction Fuzzy Hash: 68F0A732644140ABD710EB649D499EEB768DF51324F60017BF101B20C1C6F849849F2E
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040395C
                                  • ShowWindow.USER32(?), ref: 00403979
                                  • DestroyWindow.USER32 ref: 0040398D
                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 004039A9
                                  • GetDlgItem.USER32(?,?), ref: 004039CA
                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 004039DE
                                  • IsWindowEnabled.USER32(00000000), ref: 004039E5
                                  • GetDlgItem.USER32(?,00000001), ref: 00403A93
                                  • GetDlgItem.USER32(?,00000002), ref: 00403A9D
                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403AB7
                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403B08
                                  • GetDlgItem.USER32(?,00000003), ref: 00403BAE
                                  • ShowWindow.USER32(00000000,?), ref: 00403BCF
                                  • EnableWindow.USER32(?,?), ref: 00403BE1
                                  • EnableWindow.USER32(?,?), ref: 00403BFC
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403C12
                                  • EnableMenuItem.USER32(00000000), ref: 00403C19
                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403C31
                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403C44
                                  • SetWindowTextA.USER32(?,00420460), ref: 00403C7C
                                  • ShowWindow.USER32(?,0000000A), ref: 00403DB0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemText
                                  • String ID:
                                  • API String ID: 4122040696-0
                                  • Opcode ID: 4ee09b2caf74cd9129e8788d51bf0cf6fba9c1d38ba174257dc7886376c04bb2
                                  • Instruction ID: 822ce4b4a79a00458cb22135b6bf8ac097d43b7102fd8c24891d9a969020acf6
                                  • Opcode Fuzzy Hash: 4ee09b2caf74cd9129e8788d51bf0cf6fba9c1d38ba174257dc7886376c04bb2
                                  • Instruction Fuzzy Hash: 84C1A071A14204BBDB206F61ED85E2B7E7DEB0470AF50053EF641B12E1C779AA42DB1E
                                  APIs
                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403FC6
                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00403FDA
                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00403FF8
                                  • GetSysColor.USER32(?), ref: 00404009
                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404018
                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404027
                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040403F
                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 0040404E
                                  • GetDlgItem.USER32(?,0000040A), ref: 004040B2
                                  • SendMessageA.USER32(00000000), ref: 004040B5
                                  • GetDlgItem.USER32(?,000003E8), ref: 004040E0
                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404120
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040412F
                                  • SetCursor.USER32(00000000), ref: 00404138
                                  • ShellExecuteA.SHELL32(0000070B,open,00422E00,00000000,00000000,00000001), ref: 0040414B
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00404158
                                  • SetCursor.USER32(00000000), ref: 0040415B
                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404187
                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040419B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShell
                                  • String ID: N$del$open
                                  • API String ID: 2553919181-4287126420
                                  • Opcode ID: 4f63d35b63b6adf1f30c89e8474c4ba7b959b001eb650b890fe2a7cd87293fdb
                                  • Instruction ID: 32cc22161c11fa657b25fe7429f28a10b024f6cccd07486344230bb242fe12d0
                                  • Opcode Fuzzy Hash: 4f63d35b63b6adf1f30c89e8474c4ba7b959b001eb650b890fe2a7cd87293fdb
                                  • Instruction Fuzzy Hash: B861C271A40309BFEB109F60DC45F6A3B69FB54715F108136FB047A2D1C7B8AA918F99
                                  APIs
                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010E5
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010FA
                                  • DeleteObject.GDI32(?), ref: 00401103
                                  • CreateFontIndirectA.GDI32(?), ref: 0040111B
                                  • SetBkMode.GDI32(00000000,00000001), ref: 0040113C
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401146
                                  • SelectObject.GDI32(00000000,?), ref: 00401156
                                  • DrawTextA.USER32(00000000,00423660,000000FF,00000010,00000820), ref: 0040116C
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401176
                                  • DeleteObject.GDI32(?), ref: 0040117B
                                  • EndPaint.USER32(?,?), ref: 00401184
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F
                                  • API String ID: 941294808-1304234792
                                  • Opcode ID: 3e413509c4e3615d2fb3fd13af2a4ccd0d54e8f66ec41a3620c62113ef5b5ce2
                                  • Instruction ID: 4032a99e8ae375e5f299f5c9ccfedd970e0385a98bd723899401d4ff11ef6e81
                                  • Opcode Fuzzy Hash: 3e413509c4e3615d2fb3fd13af2a4ccd0d54e8f66ec41a3620c62113ef5b5ce2
                                  • Instruction Fuzzy Hash: 69517871800209AFCF058FA5CD459BFBBB9FF44315F00812AF952AA2A0C778A955DFA5
                                  APIs
                                    • Part of subcall function 00405E06: GetModuleHandleA.KERNEL32(?,?,00000000,00403164,00000008), ref: 00405E18
                                    • Part of subcall function 00405E06: LoadLibraryA.KERNELBASE(?,?,00000000,00403164,00000008), ref: 00405E23
                                    • Part of subcall function 00405E06: GetProcAddress.KERNEL32(00000000,?), ref: 00405E34
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,00405593,?,00000000,000000F1,?), ref: 00405854
                                  • GetShortPathNameA.KERNEL32(?,004225F0,00000400), ref: 0040585D
                                  • GetShortPathNameA.KERNEL32(00000000,00422068,00000400), ref: 0040587A
                                  • wsprintfA.USER32 ref: 00405898
                                  • GetFileSize.KERNEL32(00000000,00000000,00422068,C0000000,00000004,00422068,?,?,?,00000000,000000F1,?), ref: 004058D3
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 004058E2
                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 004058F8
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,00421C68,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040593E
                                  • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 00405950
                                  • GlobalFree.KERNEL32(00000000), ref: 00405957
                                  • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 0040595E
                                    • Part of subcall function 004056FE: lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405726
                                    • Part of subcall function 004056FE: CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 00405734
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: File$Handle$CloseGlobalNamePathShort$AddressAllocCharFreeLibraryLoadModuleNextPointerProcReadSizeWritelstrcmpiwsprintf
                                  • String ID: %s=%s$[Rename]$h B
                                  • API String ID: 2212013373-3280566248
                                  • Opcode ID: 73f26533948f499e7249a7fda850cf4e84a4f2f79919e681dd76129e890cd5a3
                                  • Instruction ID: 1a9792d8d5d9e9aab060a378fd71f88f3442d52d0e04fb3672249972c77e42bc
                                  • Opcode Fuzzy Hash: 73f26533948f499e7249a7fda850cf4e84a4f2f79919e681dd76129e890cd5a3
                                  • Instruction Fuzzy Hash: 95412171604B12BBD7206B619D49FAB3A5CEB45724F040036FA05F62D2E678A805CEBE
                                  APIs
                                  • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405D9E
                                  • CharNextA.USER32(?,?,?,00000000), ref: 00405DAB
                                  • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405DB0
                                  • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\file.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030F9,C:\Users\user\AppData\Local\Temp\,00000000,00403269), ref: 00405DC0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: "C:\Users\user\Desktop\file.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-3334322681
                                  • Opcode ID: 7fcd70315e273b69258d07be9381e43ed8dfeed35706c3a1724bb024a80f428e
                                  • Instruction ID: 752f2ceb6fa339900ba89f291ca2c93cfa1bd721d35065cd8eaccf896ff5a9be
                                  • Opcode Fuzzy Hash: 7fcd70315e273b69258d07be9381e43ed8dfeed35706c3a1724bb024a80f428e
                                  • Instruction Fuzzy Hash: FB119D55804B952EEB3216384C48BB7BF89CF96760F18847BE8C5722C2D67C5C829E6D
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EB), ref: 00403E77
                                  • GetSysColor.USER32(00000000), ref: 00403E93
                                  • SetTextColor.GDI32(?,00000000), ref: 00403E9F
                                  • SetBkMode.GDI32(?,?), ref: 00403EAB
                                  • GetSysColor.USER32(?), ref: 00403EBE
                                  • SetBkColor.GDI32(?,?), ref: 00403ECE
                                  • DeleteObject.GDI32(?), ref: 00403EE8
                                  • CreateBrushIndirect.GDI32(?), ref: 00403EF2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                  • Instruction ID: 62a9ad4c7a73ffc9cb86ca7c716a8a4c9f862f18c07a6a7207539b231c8623d9
                                  • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                  • Instruction Fuzzy Hash: 45219671904745ABC7219F78DD08B5BBFF8AF01715F048A29F996E22E0D738EA04CB65
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 00402716
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 00402732
                                  • GlobalFree.KERNEL32(?), ref: 0040276B
                                  • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 0040277D
                                  • GlobalFree.KERNEL32(00000000), ref: 00402784
                                  • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 0040279C
                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004027B0
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                  • String ID:
                                  • API String ID: 3294113728-0
                                  • Opcode ID: dc259d8af93aae6d3e87d12b280899fdaae246836dd472ee48694a2694c4f43b
                                  • Instruction ID: c164b34f633167bc70830bb6fa20a1e613aea451858857728fb4cee29c4a85e9
                                  • Opcode Fuzzy Hash: dc259d8af93aae6d3e87d12b280899fdaae246836dd472ee48694a2694c4f43b
                                  • Instruction Fuzzy Hash: F3318B71C00128BBDF216FA5CD89DAE7E79EF04324F10422AF910B62E0C77959419BA9
                                  APIs
                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004046E2
                                  • GetMessagePos.USER32 ref: 004046EA
                                  • ScreenToClient.USER32(?,?), ref: 00404704
                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404716
                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 0040473C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                  • Instruction ID: be41981aa202d06ba42ecb1d8d9770b4bf4589f765522592d8133ef7c8608880
                                  • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                  • Instruction Fuzzy Hash: 65014071D00219BADB00DBA4DD45BFEBBB8AB55711F10012BBA00B71C0D7B465418B95
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402BA8
                                  • MulDiv.KERNEL32(0000B200,00000064,?), ref: 00402BD3
                                  • wsprintfA.USER32 ref: 00402BE3
                                  • SetWindowTextA.USER32(?,?), ref: 00402BF3
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402BDD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: TextTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 2438957755-82062127
                                  • Opcode ID: 4f271783d9116301ef928e9870c70834f4b6e40e89d3dcdab3e6920100e412e8
                                  • Instruction ID: c5ff746cdd3f2aec24005ef6ac0e44de3c67302403ed62d2c0be8ecce63342f9
                                  • Opcode Fuzzy Hash: 4f271783d9116301ef928e9870c70834f4b6e40e89d3dcdab3e6920100e412e8
                                  • Instruction Fuzzy Hash: 2D014470900208ABEB259F60DD0AFEE3769FB04305F008035FA16A92D1D7B49A559B99
                                  APIs
                                  • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A9D
                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402ABE
                                  • RegCloseKey.ADVAPI32(?), ref: 00402AEE
                                  • RegCloseKey.ADVAPI32(?), ref: 00402B01
                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402B31
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Close$DeleteEnumOpen
                                  • String ID:
                                  • API String ID: 1912718029-0
                                  • Opcode ID: e143a9de713d65b22b45ffa201b3adf8a2d64fbd31a0aab70c993b8dccfa7d2c
                                  • Instruction ID: 07d1fbf7a047228144637b536b072ad29fb047bf687eb23e1f1577b756332cb2
                                  • Opcode Fuzzy Hash: e143a9de713d65b22b45ffa201b3adf8a2d64fbd31a0aab70c993b8dccfa7d2c
                                  • Instruction Fuzzy Hash: 4C211871A00009FADF219F90DE49DAB7B79EB44344F104476FA04B10A0D7B99E51BE69
                                  APIs
                                  • GetDlgItem.USER32(?), ref: 00401D09
                                  • GetClientRect.USER32(00000000,?), ref: 00401D16
                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D37
                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D45
                                  • DeleteObject.GDI32(00000000), ref: 00401D54
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: e7f555ae755f4011991a2c29fdc406017416609f1097d336ec3c696feb6c7674
                                  • Instruction ID: a759b7b63d085fb6f14da2e5a8d19c370c1489c49eb5ebe15418aaa2ecf38cf5
                                  • Opcode Fuzzy Hash: e7f555ae755f4011991a2c29fdc406017416609f1097d336ec3c696feb6c7674
                                  • Instruction Fuzzy Hash: F1F01DB2A04109BFD700EBA4EE89DAFB7BDEF44315B104476F601F2191C6789D458B29
                                  APIs
                                  • CharNextA.USER32(S@,?,C:\,00000000,0040569D,C:\,C:\,?,?,00000000,004053E4,?,"C:\Users\user\Desktop\file.exe",00000000), ref: 00405645
                                  • CharNextA.USER32(00000000), ref: 0040564A
                                  • CharNextA.USER32(00000000), ref: 00405659
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CharNext
                                  • String ID: C:\$S@
                                  • API String ID: 3213498283-2819263676
                                  • Opcode ID: 1ad6e67117f8c956449ae4c5db9bf5aebfa4a1cd2605d5e48cf16f9d5d16c202
                                  • Instruction ID: 18696712d74d1b481e2deda0e74adb13b6775f68b3a6dc8b47189095f8000d0b
                                  • Opcode Fuzzy Hash: 1ad6e67117f8c956449ae4c5db9bf5aebfa4a1cd2605d5e48cf16f9d5d16c202
                                  • Instruction Fuzzy Hash: 38F02751A04B246AEB2122B40C44F7B5BACCB55720F440C77F204B21D0D2BA0C828FA9
                                  APIs
                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C51
                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C69
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 9e134de257a068e09e10b4953a180385db49f72b228c2e2a68eb950cbb7d2852
                                  • Instruction ID: b12435db339aa105ade1be31f14f6de7bd30e81e38517229bc1c50f3127953a2
                                  • Opcode Fuzzy Hash: 9e134de257a068e09e10b4953a180385db49f72b228c2e2a68eb950cbb7d2852
                                  • Instruction Fuzzy Hash: A5219071A44244BFEF11EFB0DE4AAAE7A76EF44318F14413EF601F61D1D6B88A419B18
                                  APIs
                                  • SetWindowTextA.USER32(0041FC3C,0041FC3C), ref: 00404E91
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EB7
                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404ED1
                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404EDF
                                    • Part of subcall function 00405AEE: GetVersion.KERNEL32(?,0041FC3C,00000000,?,00404E5B,0041FC3C,00000000,00000000,0040F01C,0040F01C), ref: 00405B9F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: MessageSend$TextVersionWindow
                                  • String ID:
                                  • API String ID: 725768855-0
                                  • Opcode ID: 1651f495bbe13f20b2cc42b76f3689d4e9eeef9194b9b13d25a13cc865bbdcf4
                                  • Instruction ID: e8b907e25bc8824d5dc76fb07b74603c3d15ead815d8bb8d952e82485ab56bcb
                                  • Opcode Fuzzy Hash: 1651f495bbe13f20b2cc42b76f3689d4e9eeef9194b9b13d25a13cc865bbdcf4
                                  • Instruction Fuzzy Hash: 02218E71A00118BBDF219FA5DD84ADFBFB9FB44354F10807AF904A6290D6794E41CFA8
                                  APIs
                                  • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401F1B
                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                  • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F52
                                  • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F6B
                                    • Part of subcall function 00405A17: wsprintfA.USER32 ref: 00405A24
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                  • String ID:
                                  • API String ID: 1404258612-0
                                  • Opcode ID: d43b7d5bf52b24a6302c476193d79e7681bc661d7f8915b4152c4bfe2e8e09cd
                                  • Instruction ID: 26a014468aa188edf1880291178b8d582cf68a6562efb888f7332690aa7bd06e
                                  • Opcode Fuzzy Hash: d43b7d5bf52b24a6302c476193d79e7681bc661d7f8915b4152c4bfe2e8e09cd
                                  • Instruction Fuzzy Hash: 0B114F72A00109BFDB01EFA5D985DAEBBB9EF04344B20803AF505F61A1D7789E54DF28
                                  APIs
                                  • GetDC.USER32(?), ref: 00401D66
                                  • GetDeviceCaps.GDI32(00000000), ref: 00401D6D
                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D7C
                                    • Part of subcall function 00405AEE: GetVersion.KERNEL32(?,0041FC3C,00000000,?,00404E5B,0041FC3C,00000000,00000000,0040F01C,0040F01C), ref: 00405B9F
                                  • CreateFontIndirectA.GDI32(0040AF50), ref: 00401DCE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectVersion
                                  • String ID:
                                  • API String ID: 3260685224-0
                                  • Opcode ID: 699ff77ec8cde7dea788752901c75b556254c38aedfa727075257aad255a4cc5
                                  • Instruction ID: 02ec6e9baacee1f01d072f15e9468ddb689b016a2527383320120dc66931aa1e
                                  • Opcode Fuzzy Hash: 699ff77ec8cde7dea788752901c75b556254c38aedfa727075257aad255a4cc5
                                  • Instruction Fuzzy Hash: 0AF044B1948345AEE701A770AE0AB9A3F64A719305F144535F641BA1E3CA7C1414DB3F
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,00402DF0,00000001), ref: 00402C23
                                  • GetTickCount.KERNEL32 ref: 00402C41
                                  • CreateDialogParamA.USER32(0000006F,00000000,00402B8D,00000000), ref: 00402C5E
                                  • ShowWindow.USER32(00000000,00000005), ref: 00402C6C
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 7c58fff3741215562ce3e587bd614b66217c6b50781dd9611e7eff0522133455
                                  • Instruction ID: cc7f802a35f84cef6f5bdf85897be426ba065069cfc8f20ad423496c920a54dc
                                  • Opcode Fuzzy Hash: 7c58fff3741215562ce3e587bd614b66217c6b50781dd9611e7eff0522133455
                                  • Instruction Fuzzy Hash: F2F03A3090D220EBD7215F24FE4C98F7A74A708B527118836F404A12E4C7B8D9829FE9
                                  APIs
                                  • SetWindowTextA.USER32(00000000,00423660), ref: 004038E4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: TextWindow
                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 530164218-3144792594
                                  • Opcode ID: 16453532615edf6dcc69895a8fe032745ecc6d2c8d03afc46c8246bdc9ace0af
                                  • Instruction ID: fea5df5edc08ba60111476b2fde10976d58b3655a83907dfe6c86257761e8b3f
                                  • Opcode Fuzzy Hash: 16453532615edf6dcc69895a8fe032745ecc6d2c8d03afc46c8246bdc9ace0af
                                  • Instruction Fuzzy Hash: 59210671B006059BC734AF15DC9093377ADEF8430636882BFE801673A1D73D9E068A98
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00404DA9
                                  • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404E17
                                    • Part of subcall function 00403E3F: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00403E51
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: 76b423985d12a643011934de1796def2cfe54e8fd055aeb45e16926cb9d45637
                                  • Instruction ID: e244304c0d1edeb9e0223921f5b1514cf7ade9540d693cc06063b34ee73320ac
                                  • Opcode Fuzzy Hash: 76b423985d12a643011934de1796def2cfe54e8fd055aeb45e16926cb9d45637
                                  • Instruction Fuzzy Hash: E5116071600219BBDB216F51DC4099B3A69AB80369F00813AF714751E2C3795D918FE9
                                  APIs
                                  • FreeLibrary.KERNEL32(?,"C:\Users\user\Desktop\file.exe",00000000,00000000,004034BD,00403310,00000000), ref: 004034FF
                                  • GlobalFree.KERNEL32(?), ref: 00403506
                                  Strings
                                  • "C:\Users\user\Desktop\file.exe", xrefs: 004034F7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1411014885.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000000.00000002.1410999178.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411036392.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411051465.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1411106754.000000000042C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: "C:\Users\user\Desktop\file.exe"
                                  • API String ID: 1100898210-2214761044
                                  • Opcode ID: 914631cf79bc4f5712b993741e1832c0d075bb2cc09114bf11dfbba85481bbc1
                                  • Instruction ID: 9cab24f12007134522121f8ccde68e98ee389680b10af2b039e95af53afe0655
                                  • Opcode Fuzzy Hash: 914631cf79bc4f5712b993741e1832c0d075bb2cc09114bf11dfbba85481bbc1
                                  • Instruction Fuzzy Hash: F7E08C32810020ABD7225F54BC0579A776C6B98B32F058137F9007B2A087746D824AE8

                                  Execution Graph

                                  Execution Coverage:21.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:2.3%
                                  Total number of Nodes:1468
                                  Total number of Limit Nodes:28
                                  execution_graph 6449 409f47 6450 4099c0 4 API calls 6449->6450 6451 409f4c 6450->6451 6452 402f24 5 API calls 6451->6452 6453 409f51 6452->6453 6454 407878 InterlockedExchange 6453->6454 6455 409f7b 6454->6455 6456 4099c0 4 API calls 6455->6456 6457 409f8b 6455->6457 6456->6457 6462 40760c SetEndOfFile 6457->6462 6459 409fa7 6460 4025ac 4 API calls 6459->6460 6461 409fde 6460->6461 6463 407623 6462->6463 6464 40761c 6462->6464 6463->6459 6465 4073ec 21 API calls 6464->6465 6465->6463 6466 402b48 RaiseException 6467 40294a 6470 402952 6467->6470 6468 403554 4 API calls 6468->6470 6469 402967 6470->6468 6470->6469 6471 403f4a 6472 403f53 6471->6472 6474 403f5c 6471->6474 6473 403f07 4 API calls 6472->6473 6473->6474 6199 403a52 6200 403a74 6199->6200 6201 403a5a WriteFile 6199->6201 6201->6200 6202 403a78 GetLastError 6201->6202 6202->6200 6203 402654 6204 403154 4 API calls 6203->6204 6205 402614 6204->6205 6206 402632 6205->6206 6207 403154 4 API calls 6205->6207 6206->6206 6207->6206 6479 40755a GetFileSize 6480 407586 6479->6480 6481 407576 GetLastError 6479->6481 6481->6480 6482 40757f 6481->6482 6483 4073ec 21 API calls 6482->6483 6483->6480 6484 406f5b 6485 406f68 SetErrorMode 6484->6485 4887 409b60 4926 4030dc 4887->4926 4889 409b76 4929 4042e8 4889->4929 4891 409b7b 4932 406518 4891->4932 4895 409b85 4942 409004 GetModuleHandleA 6D166DE0 GetModuleHandleA 6D166DE0 4895->4942 4912 409c5e 5004 407400 4912->5004 4914 409c20 4914->4912 5037 4099c0 4914->5037 4915 409c84 4916 409c9f 4915->4916 4918 4099c0 4 API calls 4915->4918 5008 407988 4916->5008 4918->4916 4919 409cc4 5018 408a68 4919->5018 4923 409d0a 4924 408a68 21 API calls 4923->4924 4925 409d43 4923->4925 4924->4923 5047 403094 4926->5047 4928 4030e1 GetModuleHandleA GetCommandLineA 4928->4889 4931 404323 4929->4931 5048 403154 4929->5048 4931->4891 5061 405bf8 4932->5061 4941 406564 6FAA1CD0 4941->4895 4943 409057 4942->4943 5188 406f00 SetErrorMode 4943->5188 4948 403198 4 API calls 4949 40909c 4948->4949 4950 409a50 GetSystemInfo VirtualQuery 4949->4950 4951 409b04 4950->4951 4954 409a7a 4950->4954 4956 4095bc 4951->4956 4952 409ae5 VirtualQuery 4952->4951 4952->4954 4953 409aa4 VirtualProtect 4953->4954 4954->4951 4954->4952 4954->4953 4955 409ad3 VirtualProtect 4954->4955 4955->4952 5198 406b30 GetCommandLineA 4956->5198 4958 409679 4960 4031b8 4 API calls 4958->4960 4959 406b8c 6 API calls 4962 4095d9 4959->4962 4961 409693 4960->4961 4964 406b8c 4961->4964 4962->4958 4962->4959 4963 403454 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 4962->4963 4963->4962 4965 406bb3 GetModuleFileNameA 4964->4965 4966 406bd7 GetCommandLineA 4964->4966 4967 403278 4 API calls 4965->4967 4970 406bdc 4966->4970 4968 406bd5 4967->4968 4972 406c04 4968->4972 4969 406be1 4973 403198 4 API calls 4969->4973 4970->4969 4971 406a50 4 API calls 4970->4971 4974 406be9 4970->4974 4971->4970 4975 403198 4 API calls 4972->4975 4973->4974 4976 40322c 4 API calls 4974->4976 4977 406c19 4975->4977 4976->4972 4978 4031e8 4977->4978 4979 4031ec 4978->4979 4980 4031fc 4978->4980 4979->4980 4982 403254 4 API calls 4979->4982 4981 403228 4980->4981 4983 4025ac 4 API calls 4980->4983 4984 407440 4981->4984 4982->4980 4983->4981 4985 40744a 4984->4985 5219 4074d6 4985->5219 5222 4074d8 4985->5222 4986 407476 4987 40748a 4986->4987 5225 4073ec GetLastError 4986->5225 4991 409b0c FindResourceA 4987->4991 4992 409b21 4991->4992 4993 409b26 SizeofResource 4991->4993 4994 4099c0 4 API calls 4992->4994 4995 409b33 4993->4995 4996 409b38 LoadResource 4993->4996 4994->4993 4997 4099c0 4 API calls 4995->4997 4998 409b46 4996->4998 4999 409b4b LockResource 4996->4999 4997->4996 5000 4099c0 4 API calls 4998->5000 5001 409b57 4999->5001 5002 409b5c 4999->5002 5000->4999 5003 4099c0 4 API calls 5001->5003 5002->4914 5034 407878 5002->5034 5003->5002 5005 407414 5004->5005 5006 407424 5005->5006 5007 40734c 20 API calls 5005->5007 5006->4915 5007->5006 5009 407995 5008->5009 5010 4057e0 4 API calls 5009->5010 5011 4079e9 5009->5011 5010->5011 5012 407878 InterlockedExchange 5011->5012 5013 4079fb 5012->5013 5014 4057e0 4 API calls 5013->5014 5015 407a11 5013->5015 5014->5015 5016 407a54 5015->5016 5017 4057e0 4 API calls 5015->5017 5016->4919 5017->5016 5032 408a99 5018->5032 5033 408ae2 5018->5033 5019 408b2d 5333 407c18 5019->5333 5020 407c18 21 API calls 5020->5032 5022 407c18 21 API calls 5022->5033 5023 408b44 5026 4031b8 4 API calls 5023->5026 5025 4034f0 4 API calls 5025->5033 5028 408b5e 5026->5028 5027 4031e8 4 API calls 5027->5032 5044 404b70 5028->5044 5029 403420 4 API calls 5029->5032 5030 403420 4 API calls 5030->5033 5031 4031e8 4 API calls 5031->5033 5032->5020 5032->5027 5032->5029 5032->5033 5324 4034f0 5032->5324 5033->5019 5033->5022 5033->5025 5033->5030 5033->5031 5359 407824 5034->5359 5038 4099e1 5037->5038 5039 4099c9 5037->5039 5041 4057e0 4 API calls 5038->5041 5040 4057e0 4 API calls 5039->5040 5043 4099db 5040->5043 5042 4099f2 5041->5042 5042->4912 5043->4912 5045 402594 4 API calls 5044->5045 5046 404b7b 5045->5046 5046->4923 5047->4928 5049 403164 5048->5049 5050 40318c TlsGetValue 5048->5050 5049->4931 5051 403196 5050->5051 5052 40316f 5050->5052 5051->4931 5056 40310c 5052->5056 5054 403174 TlsGetValue 5055 403184 5054->5055 5055->4931 5057 403120 LocalAlloc 5056->5057 5058 403116 5056->5058 5059 40313e TlsSetValue 5057->5059 5060 403132 5057->5060 5058->5057 5059->5060 5060->5054 5133 405890 5061->5133 5064 4051d0 GetSystemDefaultLCID 5067 405206 5064->5067 5065 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5065->5067 5066 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5066->5067 5067->5065 5067->5066 5068 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5067->5068 5069 405268 5067->5069 5068->5067 5070 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5069->5070 5071 40515c LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 5069->5071 5072 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5069->5072 5073 4052eb 5069->5073 5070->5069 5071->5069 5072->5069 5166 4031b8 5073->5166 5076 405314 GetSystemDefaultLCID 5170 40515c GetLocaleInfoA 5076->5170 5079 4031e8 4 API calls 5080 405354 5079->5080 5081 40515c 5 API calls 5080->5081 5082 405369 5081->5082 5083 40515c 5 API calls 5082->5083 5084 40538d 5083->5084 5176 4051a8 GetLocaleInfoA 5084->5176 5087 4051a8 GetLocaleInfoA 5088 4053bd 5087->5088 5089 40515c 5 API calls 5088->5089 5090 4053d7 5089->5090 5091 4051a8 GetLocaleInfoA 5090->5091 5092 4053f4 5091->5092 5093 40515c 5 API calls 5092->5093 5094 40540e 5093->5094 5095 4031e8 4 API calls 5094->5095 5096 40541b 5095->5096 5097 40515c 5 API calls 5096->5097 5098 405430 5097->5098 5099 4031e8 4 API calls 5098->5099 5100 40543d 5099->5100 5101 4051a8 GetLocaleInfoA 5100->5101 5102 40544b 5101->5102 5103 40515c 5 API calls 5102->5103 5104 405465 5103->5104 5105 4031e8 4 API calls 5104->5105 5106 405472 5105->5106 5107 40515c 5 API calls 5106->5107 5108 405487 5107->5108 5109 4031e8 4 API calls 5108->5109 5110 405494 5109->5110 5111 40515c 5 API calls 5110->5111 5112 4054a9 5111->5112 5113 4054c6 5112->5113 5114 4054b7 5112->5114 5116 40322c 4 API calls 5113->5116 5184 40322c 5114->5184 5117 4054c4 5116->5117 5118 40515c 5 API calls 5117->5118 5119 4054e8 5118->5119 5120 405505 5119->5120 5121 4054f6 5119->5121 5123 403198 4 API calls 5120->5123 5122 40322c 4 API calls 5121->5122 5124 405503 5122->5124 5123->5124 5178 4033b4 5124->5178 5126 405527 5127 4033b4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5126->5127 5128 405541 5127->5128 5129 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5128->5129 5130 40555b 5129->5130 5131 405c44 GetVersionExA 5130->5131 5132 405c5b 5131->5132 5132->4941 5134 40589c 5133->5134 5141 404c2c LoadStringA 5134->5141 5137 4031e8 4 API calls 5138 4058cd 5137->5138 5144 403198 5138->5144 5148 403278 5141->5148 5145 4031b7 5144->5145 5146 40319e 5144->5146 5145->5064 5146->5145 5162 4025ac 5146->5162 5153 403254 5148->5153 5150 403288 5151 403198 4 API calls 5150->5151 5152 4032a0 5151->5152 5152->5137 5154 403274 5153->5154 5155 403258 5153->5155 5154->5150 5158 402594 5155->5158 5157 403261 5157->5150 5159 402598 5158->5159 5160 4025a2 5158->5160 5159->5160 5161 403154 4 API calls 5159->5161 5160->5157 5160->5160 5161->5160 5163 4025b0 5162->5163 5164 4025ba 5162->5164 5163->5164 5165 403154 4 API calls 5163->5165 5164->5145 5165->5164 5168 4031be 5166->5168 5167 4031e3 5167->5076 5168->5167 5169 4025ac 4 API calls 5168->5169 5169->5168 5171 405183 5170->5171 5172 405195 5170->5172 5174 403278 4 API calls 5171->5174 5173 40322c 4 API calls 5172->5173 5175 405193 5173->5175 5174->5175 5175->5079 5177 4051c4 5176->5177 5177->5087 5179 4033bc 5178->5179 5180 403254 4 API calls 5179->5180 5181 4033cf 5180->5181 5182 4031e8 4 API calls 5181->5182 5183 4033f7 5182->5183 5186 403230 5184->5186 5185 403252 5185->5117 5186->5185 5187 4025ac 4 API calls 5186->5187 5187->5185 5196 403414 5188->5196 5191 406f4e 5192 4071e4 FormatMessageA 5191->5192 5193 40720a 5192->5193 5194 403278 4 API calls 5193->5194 5195 407227 5194->5195 5195->4948 5197 403418 LoadLibraryA 5196->5197 5197->5191 5205 406a50 5198->5205 5200 406b53 5201 406b65 5200->5201 5202 406a50 4 API calls 5200->5202 5203 403198 4 API calls 5201->5203 5202->5200 5204 406b7a 5203->5204 5204->4962 5206 406a7c 5205->5206 5207 403278 4 API calls 5206->5207 5208 406a89 5207->5208 5215 403420 5208->5215 5210 406a91 5211 4031e8 4 API calls 5210->5211 5212 406aa9 5211->5212 5213 403198 4 API calls 5212->5213 5214 406acb 5213->5214 5214->5200 5216 403426 5215->5216 5218 403437 5215->5218 5217 403254 4 API calls 5216->5217 5216->5218 5217->5218 5218->5210 5220 4074d8 5219->5220 5221 407517 6D1674B0 5220->5221 5221->4986 5223 403414 5222->5223 5224 407517 6D1674B0 5223->5224 5224->4986 5228 40734c 5225->5228 5229 4071e4 5 API calls 5228->5229 5230 407374 5229->5230 5231 407394 5230->5231 5237 4050e4 5230->5237 5240 4057e0 5231->5240 5234 4073a3 5235 403198 4 API calls 5234->5235 5236 4073c0 5235->5236 5236->4987 5244 4050f8 5237->5244 5241 4057e7 5240->5241 5242 4031e8 4 API calls 5241->5242 5243 4057ff 5242->5243 5243->5234 5245 405115 5244->5245 5252 404da8 5245->5252 5248 405141 5250 403278 4 API calls 5248->5250 5251 4050f3 5250->5251 5251->5231 5254 404dc3 5252->5254 5253 404dd5 5253->5248 5257 404b34 5253->5257 5254->5253 5260 404eca 5254->5260 5267 404d9c 5254->5267 5258 405890 5 API calls 5257->5258 5259 404b45 5258->5259 5259->5248 5261 404edb 5260->5261 5263 404f29 5260->5263 5261->5263 5264 404faf 5261->5264 5266 404f47 5263->5266 5270 404d44 5263->5270 5264->5266 5274 404d88 5264->5274 5266->5254 5268 403198 4 API calls 5267->5268 5269 404da6 5268->5269 5269->5254 5271 404d52 5270->5271 5277 404b4c 5271->5277 5273 404d80 5273->5263 5290 4039a4 5274->5290 5280 405900 5277->5280 5279 404b65 5279->5273 5281 40590e 5280->5281 5282 404c2c LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 5281->5282 5283 405938 5282->5283 5284 4050e4 19 API calls 5283->5284 5285 405946 5284->5285 5286 4031e8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5285->5286 5287 405951 5286->5287 5288 4031b8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5287->5288 5289 40596b 5288->5289 5289->5279 5291 4039ab 5290->5291 5296 4038b4 5291->5296 5293 4039cb 5294 403198 4 API calls 5293->5294 5295 4039d2 5294->5295 5295->5266 5297 4038d5 5296->5297 5298 4038c8 5296->5298 5300 403934 5297->5300 5301 4038db 5297->5301 5299 403780 6 API calls 5298->5299 5304 4038d0 5299->5304 5302 403993 5300->5302 5303 40393b 5300->5303 5305 4038e1 5301->5305 5306 4038ee 5301->5306 5308 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5302->5308 5309 403941 5303->5309 5310 40394b 5303->5310 5304->5293 5311 403894 6 API calls 5305->5311 5307 403894 6 API calls 5306->5307 5312 4038fc 5307->5312 5308->5304 5313 403864 9 API calls 5309->5313 5314 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5310->5314 5311->5304 5315 4037f4 VariantClear VariantChangeTypeEx VariantChangeTypeEx 5312->5315 5313->5304 5316 40395d 5314->5316 5318 403917 5315->5318 5317 403864 9 API calls 5316->5317 5319 403976 5317->5319 5320 40374c VariantClear 5318->5320 5321 40374c VariantClear 5319->5321 5322 40392c 5320->5322 5323 40398b 5321->5323 5322->5293 5323->5293 5325 4034fd 5324->5325 5332 40352d 5324->5332 5326 403526 5325->5326 5329 403509 5325->5329 5330 403254 4 API calls 5326->5330 5327 403198 4 API calls 5328 403517 5327->5328 5328->5032 5339 4025c4 5329->5339 5330->5332 5332->5327 5334 407c33 5333->5334 5338 407c28 5333->5338 5343 407bbc 5334->5343 5337 4057e0 4 API calls 5337->5338 5338->5023 5340 4025ca 5339->5340 5341 4025dc 5340->5341 5342 403154 4 API calls 5340->5342 5341->5328 5341->5341 5342->5341 5344 407c0f 5343->5344 5345 407bd0 5343->5345 5344->5337 5344->5338 5345->5344 5347 407b0c 5345->5347 5348 407b17 5347->5348 5349 407b28 5347->5349 5350 4057e0 4 API calls 5348->5350 5351 407400 20 API calls 5349->5351 5350->5349 5352 407b3c 5351->5352 5353 407400 20 API calls 5352->5353 5354 407b5d 5353->5354 5355 407878 InterlockedExchange 5354->5355 5356 407b72 5355->5356 5357 4057e0 4 API calls 5356->5357 5358 407b88 5356->5358 5357->5358 5358->5345 5360 407836 5359->5360 5361 407847 5359->5361 5362 40783b InterlockedExchange 5360->5362 5361->4914 5362->5361 6490 409d62 6491 409d87 6490->6491 6492 409724 15 API calls 6491->6492 6496 409d8c 6492->6496 6493 409ddf 6524 4026c4 GetSystemTime 6493->6524 6495 409de4 6497 409290 32 API calls 6495->6497 6496->6493 6499 408d38 4 API calls 6496->6499 6498 409dec 6497->6498 6500 4031e8 4 API calls 6498->6500 6501 409dbb 6499->6501 6502 409df9 6500->6502 6503 409dc3 MessageBoxA 6501->6503 6504 406888 5 API calls 6502->6504 6503->6493 6505 409dd0 6503->6505 6506 409e06 6504->6506 6507 4057b4 5 API calls 6505->6507 6508 406620 5 API calls 6506->6508 6507->6493 6509 409e16 6508->6509 6510 406598 5 API calls 6509->6510 6511 409e27 6510->6511 6512 403340 4 API calls 6511->6512 6513 409e35 6512->6513 6514 4031e8 4 API calls 6513->6514 6515 409e45 6514->6515 6516 407440 23 API calls 6515->6516 6517 409e84 6516->6517 6518 402594 4 API calls 6517->6518 6519 409ea4 6518->6519 6520 407988 5 API calls 6519->6520 6521 409ee6 6520->6521 6522 407c18 21 API calls 6521->6522 6523 409f0d 6522->6523 6524->6495 6208 402e64 6209 402e69 6208->6209 6210 402e7a RtlUnwind 6209->6210 6211 402e5e 6209->6211 6212 402e9d 6210->6212 6529 408b70 6530 408b77 6529->6530 6531 403198 4 API calls 6530->6531 6539 408c11 6531->6539 6532 408c3c 6533 4031b8 4 API calls 6532->6533 6535 408cc9 6533->6535 6534 408c28 6537 4032fc 4 API calls 6534->6537 6536 403278 4 API calls 6536->6539 6537->6532 6538 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 6538->6539 6539->6532 6539->6534 6539->6536 6539->6538 5876 406f77 5877 406f68 SetErrorMode 5876->5877 5878 409d7d 5879 4099c0 4 API calls 5878->5879 5880 409d82 5879->5880 5881 409d87 5880->5881 5882 402f24 5 API calls 5880->5882 5915 409724 5881->5915 5882->5881 5884 409ddf 5936 4026c4 GetSystemTime 5884->5936 5886 409de4 5937 409290 5886->5937 5887 409d8c 5887->5884 5997 408d38 5887->5997 5891 4031e8 4 API calls 5893 409df9 5891->5893 5892 409dbb 5894 409dc3 MessageBoxA 5892->5894 5955 406888 5893->5955 5894->5884 5896 409dd0 5894->5896 6000 4057b4 5896->6000 5902 409e27 5982 403340 5902->5982 5904 409e35 5905 4031e8 4 API calls 5904->5905 5906 409e45 5905->5906 5907 407440 23 API calls 5906->5907 5908 409e84 5907->5908 5909 402594 4 API calls 5908->5909 5910 409ea4 5909->5910 5911 407988 5 API calls 5910->5911 5912 409ee6 5911->5912 5913 407c18 21 API calls 5912->5913 5914 409f0d 5913->5914 5916 40976d 5915->5916 5921 409731 5915->5921 5917 409776 5916->5917 5918 40977a 5916->5918 5919 409783 GetUserDefaultLangID 5917->5919 5928 409778 5917->5928 6004 406f84 GetModuleHandleA 6D166DE0 5918->6004 5919->5928 5921->5916 5925 40975d 5921->5925 5923 40982b 5924 4096d8 5 API calls 5923->5924 5926 409764 5924->5926 5927 4096d8 5 API calls 5925->5927 5926->5887 5927->5926 5928->5923 5929 4097c3 GetACP 5928->5929 5930 4097cd 5928->5930 5931 4097da 5928->5931 5929->5928 5929->5930 5932 4096d8 5 API calls 5930->5932 5931->5923 5933 409814 GetACP 5931->5933 5934 40981e 5931->5934 5932->5926 5933->5931 5933->5934 5935 4096d8 5 API calls 5934->5935 5935->5926 5936->5886 5940 4092b0 5937->5940 5941 4092d5 CreateDirectoryA 5940->5941 5946 408d38 4 API calls 5940->5946 5948 404be4 19 API calls 5940->5948 5950 4071e4 5 API calls 5940->5950 5953 408d08 4 API calls 5940->5953 5954 4057e0 4 API calls 5940->5954 6048 406c54 5940->6048 6071 409184 5940->6071 5942 40934d 5941->5942 5943 4092df GetLastError 5941->5943 5944 40322c 4 API calls 5942->5944 5943->5940 5945 409357 5944->5945 5947 4031b8 4 API calls 5945->5947 5946->5940 5949 409371 5947->5949 5948->5940 5951 4031b8 4 API calls 5949->5951 5950->5940 5952 40937e 5951->5952 5952->5891 5953->5940 5954->5940 6177 406780 5955->6177 5958 403454 4 API calls 5959 4068aa 5958->5959 5960 406620 5959->5960 6182 406844 5960->6182 5963 406650 5966 403340 4 API calls 5963->5966 5964 40665e 5965 403454 4 API calls 5964->5965 5967 406671 5965->5967 5968 40665c 5966->5968 5969 403340 4 API calls 5967->5969 5970 403198 4 API calls 5968->5970 5969->5968 5971 406693 5970->5971 5972 406598 5971->5972 5973 4065a2 5972->5973 5974 4065c5 5972->5974 6188 4068b0 5973->6188 5975 40322c 4 API calls 5974->5975 5977 4065ce 5975->5977 5977->5902 5978 4065a9 5978->5974 5979 4065b4 5978->5979 5980 403340 4 API calls 5979->5980 5981 4065c2 5980->5981 5981->5902 5983 403344 5982->5983 5984 4033a5 5982->5984 5985 4031e8 5983->5985 5986 40334c 5983->5986 5987 4031fc 5985->5987 5989 403254 4 API calls 5985->5989 5986->5984 5990 4031e8 4 API calls 5986->5990 5992 40335b 5986->5992 5988 403228 5987->5988 5993 4025ac 4 API calls 5987->5993 5988->5904 5989->5987 5990->5992 5991 403254 4 API calls 5994 403375 5991->5994 5992->5991 5993->5988 5995 4031e8 4 API calls 5994->5995 5996 4033a1 5995->5996 5996->5904 5998 408d08 4 API calls 5997->5998 5999 408d54 5998->5999 5999->5892 6001 4057b9 6000->6001 6002 405890 5 API calls 6001->6002 6003 4057cb 6002->6003 6003->6003 6005 406fc7 6004->6005 6024 406fbe 6004->6024 6006 406fd0 6005->6006 6007 407008 6005->6007 6025 406ec8 6006->6025 6008 406ec8 6D167FA0 6007->6008 6010 407021 6008->6010 6012 40703e 6010->6012 6015 406ebc 6 API calls 6010->6015 6011 406fe9 6011->6012 6028 406ebc 6011->6028 6016 40322c 4 API calls 6012->6016 6014 403198 4 API calls 6018 407080 6014->6018 6019 407035 6D167B60 6015->6019 6020 40704b 6016->6020 6021 403198 4 API calls 6018->6021 6019->6012 6022 4032fc 4 API calls 6020->6022 6023 407088 6021->6023 6022->6024 6023->5928 6024->6014 6026 406ed3 6025->6026 6027 406ed9 6D167FA0 6025->6027 6026->6027 6027->6011 6031 406d70 6028->6031 6032 406d96 RegQueryValueExA 6031->6032 6033 406ddb 6032->6033 6038 406db9 6032->6038 6035 403198 4 API calls 6033->6035 6034 406dd3 6036 403198 4 API calls 6034->6036 6037 406ea7 6D167B60 6035->6037 6036->6033 6037->6012 6038->6033 6038->6034 6039 403278 4 API calls 6038->6039 6040 403420 4 API calls 6038->6040 6039->6038 6041 406e10 RegQueryValueExA 6040->6041 6041->6032 6042 406e2c 6041->6042 6042->6033 6043 4034f0 4 API calls 6042->6043 6044 406e6e 6043->6044 6045 406e80 6044->6045 6047 403420 4 API calls 6044->6047 6046 4031e8 4 API calls 6045->6046 6046->6033 6047->6045 6090 4069b8 6048->6090 6051 406c86 6053 4069b8 5 API calls 6051->6053 6055 406cd2 6051->6055 6054 406c96 6053->6054 6056 406ca2 6054->6056 6058 406994 7 API calls 6054->6058 6098 4067e8 6055->6098 6056->6055 6059 406cc7 6056->6059 6062 4069b8 5 API calls 6056->6062 6058->6056 6059->6055 6110 406c28 GetWindowsDirectoryA 6059->6110 6064 406cbb 6062->6064 6063 406598 5 API calls 6065 406ce7 6063->6065 6064->6059 6066 406994 7 API calls 6064->6066 6067 40322c 4 API calls 6065->6067 6066->6059 6068 406cf1 6067->6068 6069 4031b8 4 API calls 6068->6069 6070 406d0b 6069->6070 6070->5940 6072 4091a4 6071->6072 6073 406598 5 API calls 6072->6073 6074 4091bd 6073->6074 6075 40322c 4 API calls 6074->6075 6076 4091c8 6075->6076 6077 4068d8 6 API calls 6076->6077 6079 408d38 4 API calls 6076->6079 6080 4033b4 4 API calls 6076->6080 6081 4057e0 4 API calls 6076->6081 6083 409244 6076->6083 6150 409110 6076->6150 6158 408f94 6076->6158 6077->6076 6079->6076 6080->6076 6081->6076 6084 40322c 4 API calls 6083->6084 6085 40924f 6084->6085 6086 4031b8 4 API calls 6085->6086 6087 409269 6086->6087 6088 403198 4 API calls 6087->6088 6089 409271 6088->6089 6089->5940 6091 4034f0 4 API calls 6090->6091 6092 4069cb 6091->6092 6093 4069e2 GetEnvironmentVariableA 6092->6093 6097 4069f5 6092->6097 6112 406d4c 6092->6112 6093->6092 6094 4069ee 6093->6094 6095 403198 4 API calls 6094->6095 6095->6097 6097->6051 6107 406994 6097->6107 6099 403414 6098->6099 6100 40680b GetFullPathNameA 6099->6100 6101 406817 6100->6101 6102 40682e 6100->6102 6101->6102 6103 40681f 6101->6103 6104 40322c 4 API calls 6102->6104 6105 403278 4 API calls 6103->6105 6106 40682c 6104->6106 6105->6106 6106->6063 6116 40693c 6107->6116 6111 406c49 6110->6111 6111->6055 6113 406d5a 6112->6113 6114 4034f0 4 API calls 6113->6114 6115 406d68 6114->6115 6115->6092 6123 4068d8 6116->6123 6118 40695e 6119 406966 GetFileAttributesA 6118->6119 6120 40697b 6119->6120 6121 403198 4 API calls 6120->6121 6122 406983 6121->6122 6122->6051 6133 4066a4 6123->6133 6125 406910 6128 406926 6125->6128 6129 40691b 6125->6129 6127 4068e9 6127->6125 6140 4068d0 CharPrevA 6127->6140 6141 403454 6128->6141 6130 40322c 4 API calls 6129->6130 6132 406924 6130->6132 6132->6118 6136 4066b5 6133->6136 6134 406719 6135 4065e0 IsDBCSLeadByte 6134->6135 6137 406714 6134->6137 6135->6137 6136->6134 6139 4066d3 6136->6139 6137->6127 6139->6137 6148 4065e0 IsDBCSLeadByte 6139->6148 6140->6127 6142 403486 6141->6142 6143 403459 6141->6143 6144 403198 4 API calls 6142->6144 6143->6142 6146 40346d 6143->6146 6145 40347c 6144->6145 6145->6132 6147 403278 4 API calls 6146->6147 6147->6145 6149 4065f4 6148->6149 6149->6139 6151 403198 4 API calls 6150->6151 6154 409131 6151->6154 6155 40915e 6154->6155 6167 4032a8 6154->6167 6170 403494 6154->6170 6156 403198 4 API calls 6155->6156 6157 409173 6156->6157 6157->6076 6159 408ed0 2 API calls 6158->6159 6160 408faa 6159->6160 6161 408fae 6160->6161 6174 4069a8 6160->6174 6161->6076 6164 408fe1 6165 408f0c Wow64RevertWow64FsRedirection 6164->6165 6166 408fe9 6165->6166 6166->6076 6168 403278 4 API calls 6167->6168 6169 4032b5 6168->6169 6169->6154 6171 403498 6170->6171 6173 4034c3 6170->6173 6172 4034f0 4 API calls 6171->6172 6172->6173 6173->6154 6175 40693c 7 API calls 6174->6175 6176 4069b2 GetLastError 6175->6176 6176->6164 6178 4066a4 IsDBCSLeadByte 6177->6178 6180 406795 6178->6180 6179 4067df 6179->5958 6180->6179 6181 4065e0 IsDBCSLeadByte 6180->6181 6181->6180 6183 406853 6182->6183 6184 406780 IsDBCSLeadByte 6183->6184 6187 40685e 6184->6187 6185 40664a 6185->5963 6185->5964 6186 4065e0 IsDBCSLeadByte 6186->6187 6187->6185 6187->6186 6189 4068b7 6188->6189 6190 4068bb 6188->6190 6189->5978 6193 4068d0 CharPrevA 6190->6193 6192 4068cc 6192->5978 6193->6192 6548 403f7d 6549 403fa2 6548->6549 6550 403f84 6548->6550 6549->6550 6552 403e8e 4 API calls 6549->6552 6551 403f8c 6550->6551 6553 402674 4 API calls 6550->6553 6552->6550 6554 403fca 6553->6554 6555 408f7e 6556 408f70 6555->6556 6557 408f0c Wow64RevertWow64FsRedirection 6556->6557 6558 408f78 6557->6558 5363 403d02 5370 403d12 5363->5370 5364 403ddf ExitProcess 5365 403db8 5379 403cc8 5365->5379 5367 403dea 5369 403cc8 4 API calls 5371 403dcc 5369->5371 5370->5364 5370->5365 5370->5367 5373 403da4 5370->5373 5374 403d8f MessageBoxA 5370->5374 5383 4019dc 5371->5383 5395 403fe4 5373->5395 5374->5365 5375 403dd1 5375->5364 5375->5367 5380 403cd6 5379->5380 5382 403ceb 5380->5382 5399 402674 5380->5399 5382->5369 5384 401abb 5383->5384 5385 4019ed 5383->5385 5384->5375 5386 401a04 RtlEnterCriticalSection 5385->5386 5387 401a0e LocalFree 5385->5387 5386->5387 5388 401a41 5387->5388 5389 401a2f VirtualFree 5388->5389 5390 401a49 5388->5390 5389->5388 5391 401a70 LocalFree 5390->5391 5392 401a87 5390->5392 5391->5391 5391->5392 5393 401aa9 RtlDeleteCriticalSection 5392->5393 5394 401a9f RtlLeaveCriticalSection 5392->5394 5393->5375 5394->5393 5396 403fe8 5395->5396 5402 403f07 5396->5402 5398 404006 5400 403154 4 API calls 5399->5400 5401 40267a 5400->5401 5401->5382 5403 403f09 5402->5403 5407 403e9c 5403->5407 5408 403154 4 API calls 5403->5408 5413 403f3d 5403->5413 5425 403e9c 5403->5425 5405 403f3c 5405->5398 5406 403ef2 5410 402674 4 API calls 5406->5410 5407->5405 5407->5406 5414 403ea9 5407->5414 5416 403e8e 5407->5416 5408->5403 5412 403ecf 5410->5412 5412->5398 5413->5398 5414->5412 5415 402674 4 API calls 5414->5415 5415->5412 5417 403e4c 5416->5417 5418 403e62 5417->5418 5419 403e7b 5417->5419 5422 403e67 5417->5422 5421 403cc8 4 API calls 5418->5421 5420 402674 4 API calls 5419->5420 5423 403e78 5420->5423 5421->5422 5422->5423 5424 402674 4 API calls 5422->5424 5423->5406 5423->5414 5424->5423 5427 403ed7 5425->5427 5428 403ea9 5425->5428 5426 403ef2 5431 402674 4 API calls 5426->5431 5427->5426 5430 403e8e 4 API calls 5427->5430 5429 403ecf 5428->5429 5433 402674 4 API calls 5428->5433 5429->5403 5432 403ee6 5430->5432 5431->5429 5432->5426 5432->5428 5433->5429 5434 40a003 5435 40a046 CreateWindowExA SetWindowLongA 5434->5435 5436 40a006 SetLastError 5434->5436 5438 4050e4 19 API calls 5435->5438 5508 40949c GetLastError 5436->5508 5440 40a0ad 5438->5440 5465 4032fc 5440->5465 5443 40a0bb 5445 4032fc 4 API calls 5443->5445 5446 40a0c8 5445->5446 5479 406adc GetCommandLineA 5446->5479 5449 4032fc 4 API calls 5450 40a0dd 5449->5450 5484 4098c4 5450->5484 5454 40a102 5455 40a13b 5454->5455 5500 409438 5454->5500 5457 40a154 5455->5457 5460 40a14e RemoveDirectoryA 5455->5460 5458 40a168 5457->5458 5459 40a15d 73F85CF0 5457->5459 5461 40a190 5458->5461 5532 40357c 5458->5532 5459->5458 5460->5457 5463 40a186 5464 4025ac 4 API calls 5463->5464 5464->5461 5466 403300 5465->5466 5467 40333f 5465->5467 5468 4031e8 5466->5468 5469 40330a 5466->5469 5467->5443 5472 4031fc 5468->5472 5476 403254 4 API calls 5468->5476 5470 403334 5469->5470 5471 40331d 5469->5471 5475 4034f0 4 API calls 5470->5475 5473 4034f0 4 API calls 5471->5473 5474 403228 5472->5474 5478 4025ac 4 API calls 5472->5478 5477 403322 5473->5477 5474->5443 5475->5477 5476->5472 5477->5443 5478->5474 5480 406a50 4 API calls 5479->5480 5481 406b01 5480->5481 5482 403198 4 API calls 5481->5482 5483 406b1f 5482->5483 5483->5449 5485 4033b4 4 API calls 5484->5485 5486 4098ff 5485->5486 5487 409931 CreateProcessA 5486->5487 5488 409944 CloseHandle 5487->5488 5489 40993d 5487->5489 5491 40994d 5488->5491 5490 40949c 21 API calls 5489->5490 5490->5488 5545 409898 5491->5545 5494 409969 5495 409898 3 API calls 5494->5495 5496 40996e GetExitCodeProcess CloseHandle 5495->5496 5497 40998e 5496->5497 5498 403198 4 API calls 5497->5498 5499 409996 5498->5499 5499->5454 5526 4096d8 5499->5526 5501 409492 5500->5501 5503 40944b 5500->5503 5501->5455 5502 409453 Sleep 5502->5503 5503->5501 5503->5502 5504 409463 Sleep 5503->5504 5506 40947a GetLastError 5503->5506 5549 408f1c 5503->5549 5504->5503 5506->5501 5507 409484 GetLastError 5506->5507 5507->5501 5507->5503 5566 404be4 5508->5566 5511 4071e4 5 API calls 5512 4094f3 5511->5512 5569 408d08 5512->5569 5515 4057e0 4 API calls 5516 409517 5515->5516 5517 4031b8 4 API calls 5516->5517 5518 409536 5517->5518 5519 403198 4 API calls 5518->5519 5520 40953e 5519->5520 5521 402f24 5520->5521 5522 403154 4 API calls 5521->5522 5523 402f29 5522->5523 5583 402bcc 5523->5583 5525 402f51 5525->5525 5527 4096e0 5526->5527 5531 40971a 5526->5531 5528 403420 4 API calls 5527->5528 5527->5531 5529 409714 5528->5529 5586 408de0 5529->5586 5531->5454 5535 403591 5532->5535 5541 4035a0 5532->5541 5533 4035b1 5536 403198 4 API calls 5533->5536 5534 4035b8 5537 4031b8 4 API calls 5534->5537 5538 4035d0 5535->5538 5539 40359b 5535->5539 5540 4035b6 5535->5540 5536->5540 5537->5540 5538->5540 5543 40357c 4 API calls 5538->5543 5539->5541 5542 4035ec 5539->5542 5540->5463 5541->5533 5541->5534 5542->5540 5602 403554 5542->5602 5543->5538 5546 4098ac PeekMessageA 5545->5546 5547 4098a0 TranslateMessage DispatchMessageA 5546->5547 5548 4098be MsgWaitForMultipleObjects 5546->5548 5547->5546 5548->5491 5548->5494 5557 408ed0 5549->5557 5551 408f32 5552 408f36 5551->5552 5553 408f52 6D167770 GetLastError 5551->5553 5552->5503 5554 408f70 5553->5554 5563 408f0c 5554->5563 5558 408eda 5557->5558 5559 408ede 5557->5559 5558->5551 5560 408f00 SetLastError 5559->5560 5561 408ee7 Wow64DisableWow64FsRedirection 5559->5561 5562 408efb 5560->5562 5561->5562 5562->5551 5564 408f11 Wow64RevertWow64FsRedirection 5563->5564 5565 408f1b 5563->5565 5564->5565 5565->5503 5567 4050f8 19 API calls 5566->5567 5568 404c02 5567->5568 5568->5511 5570 408d28 5569->5570 5573 408be0 5570->5573 5574 403198 4 API calls 5573->5574 5575 408c11 5573->5575 5574->5575 5577 408c28 5575->5577 5579 403278 4 API calls 5575->5579 5581 408c3c 5575->5581 5582 4032fc LocalAlloc TlsSetValue TlsGetValue TlsGetValue 5575->5582 5576 4031b8 4 API calls 5578 408cc9 5576->5578 5580 4032fc 4 API calls 5577->5580 5578->5515 5579->5575 5580->5581 5581->5576 5582->5575 5584 402bd5 RaiseException 5583->5584 5585 402be6 5583->5585 5584->5585 5585->5525 5587 408dee 5586->5587 5589 408e06 5587->5589 5599 408d78 5587->5599 5590 408d78 4 API calls 5589->5590 5591 408e2a 5589->5591 5590->5591 5592 407878 InterlockedExchange 5591->5592 5593 408e45 5592->5593 5594 408d78 4 API calls 5593->5594 5596 408e58 5593->5596 5594->5596 5595 408d78 4 API calls 5595->5596 5596->5595 5597 403278 4 API calls 5596->5597 5598 408e87 5596->5598 5597->5596 5598->5531 5600 4057e0 4 API calls 5599->5600 5601 408d89 5600->5601 5601->5589 5603 403566 5602->5603 5605 403578 5603->5605 5606 403604 5603->5606 5605->5542 5607 40357c 5606->5607 5612 40359b 5607->5612 5613 4035b6 5607->5613 5614 4035d0 5607->5614 5615 4035a0 5607->5615 5608 4035b1 5610 403198 4 API calls 5608->5610 5609 4035b8 5611 4031b8 4 API calls 5609->5611 5610->5613 5611->5613 5612->5615 5616 4035ec 5612->5616 5613->5603 5614->5613 5617 40357c 4 API calls 5614->5617 5615->5608 5615->5609 5616->5613 5618 403554 4 API calls 5616->5618 5617->5614 5618->5616 6223 404206 6224 4041cc 6223->6224 6227 40420a 6223->6227 6225 404282 6226 403154 4 API calls 6228 404323 6226->6228 6227->6225 6227->6226 6229 402c08 6232 402c19 6229->6232 6233 402c82 6229->6233 6230 402c56 RtlUnwind 6231 403154 4 API calls 6230->6231 6231->6233 6232->6230 6232->6233 6236 402b28 6232->6236 6237 402b31 RaiseException 6236->6237 6238 402b47 6236->6238 6237->6238 6238->6230 5633 40760c SetEndOfFile 5634 407623 5633->5634 5635 40761c 5633->5635 5636 4073ec 21 API calls 5635->5636 5636->5634 6239 403018 6240 403070 6239->6240 6241 403025 6239->6241 6242 40302a RtlUnwind 6241->6242 6244 40304e 6242->6244 6245 402f78 6244->6245 6246 402be8 6244->6246 6247 402bf1 RaiseException 6246->6247 6248 402c04 6246->6248 6247->6248 6248->6240 5619 407524 SetFilePointer 5620 407557 5619->5620 5621 407547 GetLastError 5619->5621 5621->5620 5622 407550 5621->5622 5623 4073ec 21 API calls 5622->5623 5623->5620 6259 405a24 6260 405a34 6259->6260 6261 405a2c 6259->6261 6262 405a32 6261->6262 6263 405a3b 6261->6263 6266 40599c 6262->6266 6264 405890 5 API calls 6263->6264 6264->6260 6267 4059a4 6266->6267 6268 4059be 6267->6268 6271 403154 4 API calls 6267->6271 6269 4059c3 6268->6269 6270 4059da 6268->6270 6272 405890 5 API calls 6269->6272 6273 403154 4 API calls 6270->6273 6271->6267 6274 4059d6 6272->6274 6275 4059df 6273->6275 6277 403154 4 API calls 6274->6277 6276 405900 19 API calls 6275->6276 6276->6274 6278 405a08 6277->6278 6279 403154 4 API calls 6278->6279 6280 405a16 6279->6280 6280->6260 5624 407628 WriteFile 5625 407648 5624->5625 5626 40764f 5624->5626 5627 4073ec 21 API calls 5625->5627 5628 407660 5626->5628 5629 40734c 20 API calls 5626->5629 5627->5626 5629->5628 6281 403a28 ReadFile 6282 403a46 6281->6282 6283 403a49 GetLastError 6281->6283 6575 409f2c 6576 409f51 6575->6576 6577 407878 InterlockedExchange 6576->6577 6578 409f7b 6577->6578 6579 409f8b 6578->6579 6580 4099c0 4 API calls 6578->6580 6581 40760c 22 API calls 6579->6581 6580->6579 6582 409fa7 6581->6582 6583 4025ac 4 API calls 6582->6583 6584 409fde 6583->6584 6585 403932 6586 403924 6585->6586 6589 40374c 6586->6589 6588 40392c 6590 403766 6589->6590 6591 403759 6589->6591 6590->6588 6591->6590 6592 403779 VariantClear 6591->6592 6592->6588 5830 407f34 5831 407f46 5830->5831 5833 407f4d 5830->5833 5841 407e70 5831->5841 5834 407f81 5833->5834 5835 407f75 5833->5835 5836 407f77 5833->5836 5837 407fae 5834->5837 5839 407cdc 19 API calls 5834->5839 5855 407d8c 5835->5855 5852 407cdc 5836->5852 5839->5837 5842 407e85 5841->5842 5843 407cdc 19 API calls 5842->5843 5844 407e94 5842->5844 5843->5844 5845 407ece 5844->5845 5846 407cdc 19 API calls 5844->5846 5847 407ee2 5845->5847 5848 407cdc 19 API calls 5845->5848 5846->5845 5851 407f0e 5847->5851 5862 407e18 5847->5862 5848->5847 5851->5833 5865 405814 5852->5865 5854 407cfe 5854->5834 5856 4050e4 19 API calls 5855->5856 5857 407db7 5856->5857 5873 407d44 5857->5873 5859 407dbf 5860 403198 4 API calls 5859->5860 5861 407dd4 5860->5861 5861->5834 5863 407e27 VirtualFree 5862->5863 5864 407e39 VirtualAlloc 5862->5864 5863->5864 5864->5851 5866 405820 5865->5866 5867 4050e4 19 API calls 5866->5867 5868 40584d 5867->5868 5869 4031e8 4 API calls 5868->5869 5870 405858 5869->5870 5871 403198 4 API calls 5870->5871 5872 40586d 5871->5872 5872->5854 5874 405814 19 API calls 5873->5874 5875 407d66 5874->5875 5875->5859 6284 409838 6285 409847 6284->6285 6287 409851 6284->6287 6286 409876 CallWindowProcA 6285->6286 6285->6287 6286->6287 6288 402ccc 6289 402cdd 6288->6289 6292 402cfe 6288->6292 6290 402d88 RtlUnwind 6289->6290 6289->6292 6293 402b28 RaiseException 6289->6293 6291 403154 4 API calls 6290->6291 6291->6292 6294 402d7f 6293->6294 6294->6290 6597 403fcd 6598 403f07 4 API calls 6597->6598 6599 403fd6 6598->6599 6600 403e9c 4 API calls 6599->6600 6601 403fe2 6600->6601 5648 4024d0 5649 4024e4 5648->5649 5650 4024f7 5648->5650 5687 401918 RtlInitializeCriticalSection 5649->5687 5652 402518 5650->5652 5653 40250e RtlEnterCriticalSection 5650->5653 5664 402300 5652->5664 5653->5652 5656 4024ed 5658 402525 5660 402581 5658->5660 5661 402577 RtlLeaveCriticalSection 5658->5661 5661->5660 5662 402531 5662->5658 5694 40215c 5662->5694 5665 402314 5664->5665 5666 4023b8 5665->5666 5669 402335 5665->5669 5667 402344 5666->5667 5671 402455 5666->5671 5711 401d80 5666->5711 5719 401e84 5666->5719 5667->5658 5674 401fd4 5667->5674 5669->5667 5708 401b74 5669->5708 5671->5667 5715 401d00 5671->5715 5675 401fe8 5674->5675 5676 401ffb 5674->5676 5678 401918 4 API calls 5675->5678 5677 402012 RtlEnterCriticalSection 5676->5677 5681 40201c 5676->5681 5677->5681 5679 401fed 5678->5679 5679->5676 5680 401ff1 5679->5680 5682 402052 5680->5682 5681->5682 5801 401ee0 5681->5801 5682->5662 5685 402147 5685->5662 5686 40213d RtlLeaveCriticalSection 5686->5685 5688 40193c RtlEnterCriticalSection 5687->5688 5689 401946 5687->5689 5688->5689 5690 401964 LocalAlloc 5689->5690 5691 40197e 5690->5691 5692 4019c3 RtlLeaveCriticalSection 5691->5692 5693 4019cd 5691->5693 5692->5693 5693->5650 5693->5656 5695 40217a 5694->5695 5696 402175 5694->5696 5698 4021b5 5695->5698 5699 4021ab RtlEnterCriticalSection 5695->5699 5700 40217e 5695->5700 5697 401918 4 API calls 5696->5697 5697->5695 5701 402244 5698->5701 5704 4021c1 5698->5704 5706 402270 5698->5706 5699->5698 5700->5658 5701->5700 5705 401d80 7 API calls 5701->5705 5702 4022e3 RtlLeaveCriticalSection 5703 4022ed 5702->5703 5703->5658 5704->5702 5704->5703 5705->5700 5706->5704 5707 401d00 7 API calls 5706->5707 5707->5704 5709 40215c 9 API calls 5708->5709 5710 401b95 5709->5710 5710->5667 5712 401d92 5711->5712 5713 401d89 5711->5713 5712->5666 5713->5712 5714 401b74 9 API calls 5713->5714 5714->5712 5716 401d4e 5715->5716 5717 401d1e 5715->5717 5716->5717 5724 401c68 5716->5724 5717->5667 5779 401768 5719->5779 5721 401e99 5722 401ea6 5721->5722 5790 401dcc 5721->5790 5722->5666 5725 401c7a 5724->5725 5726 401c9d 5725->5726 5727 401caf 5725->5727 5737 40188c 5726->5737 5729 40188c 3 API calls 5727->5729 5730 401cad 5729->5730 5731 401cc5 5730->5731 5747 401b44 5730->5747 5731->5717 5733 401cd4 5734 401cee 5733->5734 5752 401b98 5733->5752 5757 4013a0 5734->5757 5738 4018b2 5737->5738 5746 40190b 5737->5746 5761 401658 5738->5761 5744 4018e6 5745 4013a0 LocalAlloc 5744->5745 5744->5746 5745->5746 5746->5730 5748 401b61 5747->5748 5749 401b52 5747->5749 5748->5733 5750 401d00 9 API calls 5749->5750 5751 401b5f 5750->5751 5751->5733 5753 401b9d 5752->5753 5755 401bab 5752->5755 5754 401b74 9 API calls 5753->5754 5756 401baa 5754->5756 5755->5734 5756->5734 5758 4013ab 5757->5758 5759 4013c6 5758->5759 5760 4012e4 LocalAlloc 5758->5760 5759->5731 5760->5759 5763 40168f 5761->5763 5762 4016cf 5765 40132c 5762->5765 5763->5762 5764 4016a9 VirtualFree 5763->5764 5764->5763 5766 401348 5765->5766 5773 4012e4 5766->5773 5769 40150c 5770 40153b 5769->5770 5771 401594 5770->5771 5772 401568 VirtualFree 5770->5772 5771->5744 5772->5770 5776 40128c 5773->5776 5777 401298 LocalAlloc 5776->5777 5778 4012aa 5776->5778 5777->5778 5778->5744 5778->5769 5780 401787 5779->5780 5781 40183b 5780->5781 5782 401494 LocalAlloc VirtualAlloc VirtualAlloc VirtualFree 5780->5782 5783 40132c LocalAlloc 5780->5783 5785 401821 5780->5785 5787 4017d6 5780->5787 5788 4017e7 5781->5788 5797 4015c4 5781->5797 5782->5780 5783->5780 5786 40150c VirtualFree 5785->5786 5786->5788 5789 40150c VirtualFree 5787->5789 5788->5721 5789->5788 5791 401d80 9 API calls 5790->5791 5792 401de0 5791->5792 5793 40132c LocalAlloc 5792->5793 5794 401df0 5793->5794 5795 401df8 5794->5795 5796 401b44 9 API calls 5794->5796 5795->5722 5796->5795 5798 40160a 5797->5798 5799 40163a 5798->5799 5800 401626 VirtualAlloc 5798->5800 5799->5788 5800->5798 5800->5799 5804 401ef0 5801->5804 5802 401f1c 5803 401d00 9 API calls 5802->5803 5806 401f40 5802->5806 5803->5806 5804->5802 5804->5806 5807 401e58 5804->5807 5806->5685 5806->5686 5812 4016d8 5807->5812 5810 401dcc 9 API calls 5811 401e75 5810->5811 5811->5804 5816 4016f4 5812->5816 5813 4016fe 5815 4015c4 VirtualAlloc 5813->5815 5819 40170a 5815->5819 5816->5813 5817 40175b 5816->5817 5818 40132c LocalAlloc 5816->5818 5820 40174f 5816->5820 5822 401430 5816->5822 5817->5810 5817->5811 5818->5816 5819->5817 5821 40150c VirtualFree 5820->5821 5821->5817 5823 40143f VirtualAlloc 5822->5823 5825 40146c 5823->5825 5826 40148f 5823->5826 5827 4012e4 LocalAlloc 5825->5827 5826->5816 5828 401478 5827->5828 5828->5826 5829 40147c VirtualFree 5828->5829 5829->5826 6303 4028d2 6307 4028da 6303->6307 6304 4028ef 6306 4025ac 4 API calls 6304->6306 6305 403554 4 API calls 6305->6307 6308 4028f4 6306->6308 6307->6304 6307->6305 6602 4019d3 6603 4019ba 6602->6603 6604 4019c3 RtlLeaveCriticalSection 6603->6604 6605 4019cd 6603->6605 6604->6605 6613 4065dc IsDBCSLeadByte 6614 4065f4 6613->6614 6619 40a1e5 6628 409550 6619->6628 6622 402f24 5 API calls 6623 40a1ef 6622->6623 6624 403198 4 API calls 6623->6624 6625 40a20e 6624->6625 6626 403198 4 API calls 6625->6626 6627 40a216 6626->6627 6637 4055fc 6628->6637 6630 40956b 6631 409599 6630->6631 6643 40716c 6630->6643 6634 403198 4 API calls 6631->6634 6633 409589 6636 409591 MessageBoxA 6633->6636 6635 4095ae 6634->6635 6635->6622 6636->6631 6638 403154 4 API calls 6637->6638 6639 405601 6638->6639 6640 405619 6639->6640 6641 403154 4 API calls 6639->6641 6640->6630 6642 40560f 6641->6642 6642->6630 6644 4055fc 4 API calls 6643->6644 6645 40717b 6644->6645 6646 407181 6645->6646 6647 40718f 6645->6647 6648 40322c 4 API calls 6646->6648 6650 4071ab 6647->6650 6651 40719f 6647->6651 6649 40718d 6648->6649 6649->6633 6661 4032b8 6650->6661 6654 407130 6651->6654 6655 40322c 4 API calls 6654->6655 6656 40713f 6655->6656 6657 40715c 6656->6657 6658 4068b0 CharPrevA 6656->6658 6657->6649 6659 40714b 6658->6659 6659->6657 6660 4032fc 4 API calls 6659->6660 6660->6657 6662 403278 4 API calls 6661->6662 6663 4032c2 6662->6663 6663->6649 6664 402be9 RaiseException 6665 402c04 6664->6665 6674 407df0 6675 407e18 VirtualFree 6674->6675 6676 407dfd 6675->6676 6677 409ff0 6678 40a020 6677->6678 6679 40a046 CreateWindowExA SetWindowLongA 6678->6679 6680 4050e4 19 API calls 6679->6680 6681 40a0ad 6680->6681 6682 4032fc 4 API calls 6681->6682 6683 40a0bb 6682->6683 6684 4032fc 4 API calls 6683->6684 6685 40a0c8 6684->6685 6686 406adc 5 API calls 6685->6686 6687 40a0d4 6686->6687 6688 4032fc 4 API calls 6687->6688 6689 40a0dd 6688->6689 6690 4098c4 29 API calls 6689->6690 6691 40a0ef 6690->6691 6692 4096d8 5 API calls 6691->6692 6693 40a102 6691->6693 6692->6693 6694 40a13b 6693->6694 6695 409438 9 API calls 6693->6695 6696 40a154 6694->6696 6699 40a14e RemoveDirectoryA 6694->6699 6695->6694 6697 40a168 6696->6697 6698 40a15d 73F85CF0 6696->6698 6700 40a190 6697->6700 6701 40357c 4 API calls 6697->6701 6698->6697 6699->6696 6702 40a186 6701->6702 6703 4025ac 4 API calls 6702->6703 6703->6700 6313 402af2 6314 402afe 6313->6314 6317 402ed0 6314->6317 6318 403154 4 API calls 6317->6318 6319 402ee0 6318->6319 6320 402b03 6319->6320 6322 402b0c 6319->6322 6323 402b25 6322->6323 6324 402b15 RaiseException 6322->6324 6323->6320 6324->6323 6325 405af2 6327 405af4 6325->6327 6326 405b30 6329 405890 5 API calls 6326->6329 6327->6326 6328 405b2a 6327->6328 6333 405b47 6327->6333 6328->6326 6330 405b9c 6328->6330 6331 405b43 6329->6331 6332 405900 19 API calls 6330->6332 6335 403198 4 API calls 6331->6335 6332->6331 6334 404c2c 5 API calls 6333->6334 6336 405b70 6334->6336 6337 405bd6 6335->6337 6338 405900 19 API calls 6336->6338 6338->6331 6706 402dfa 6707 402e26 6706->6707 6708 402e0d 6706->6708 6710 402ba4 6708->6710 6711 402bc9 6710->6711 6712 402bad 6710->6712 6711->6707 6713 402bb5 RaiseException 6712->6713 6713->6711 6357 403a80 CloseHandle 6358 403a90 6357->6358 6359 403a91 GetLastError 6357->6359 6718 408f80 SetLastError 6719 408f89 6718->6719 6360 404283 6361 4042c3 6360->6361 6362 403154 4 API calls 6361->6362 6363 404323 6362->6363 6726 404185 6727 4041ff 6726->6727 6728 4041cc 6727->6728 6729 403154 4 API calls 6727->6729 6730 404323 6729->6730 6364 403e87 6365 403e4c 6364->6365 6366 403e62 6365->6366 6367 403e7b 6365->6367 6371 403e67 6365->6371 6369 403cc8 4 API calls 6366->6369 6368 402674 4 API calls 6367->6368 6370 403e78 6368->6370 6369->6371 6371->6370 6372 402674 4 API calls 6371->6372 6372->6370 5642 40758c ReadFile 5643 4075c3 5642->5643 5644 4075ac 5642->5644 5645 4075b2 GetLastError 5644->5645 5646 4075bc 5644->5646 5645->5643 5645->5646 5647 4073ec 21 API calls 5646->5647 5647->5643 6373 40708e 6374 407078 6373->6374 6375 403198 4 API calls 6374->6375 6376 407080 6375->6376 6377 403198 4 API calls 6376->6377 6378 407088 6377->6378 6379 408e90 6382 408d5c 6379->6382 6383 408d65 6382->6383 6384 403198 4 API calls 6383->6384 6385 408d73 6383->6385 6384->6383 6739 403991 6740 403983 6739->6740 6741 40374c VariantClear 6740->6741 6742 40398b 6741->6742 6395 403a97 6396 403aac 6395->6396 6397 403bbc GetStdHandle 6396->6397 6398 403b0e 6D1674B0 6396->6398 6408 403ab2 6396->6408 6399 403c17 GetLastError 6397->6399 6403 403bba 6397->6403 6398->6399 6400 403b2c 6398->6400 6399->6408 6402 403b3b GetFileSize 6400->6402 6400->6403 6402->6399 6404 403b4e SetFilePointer 6402->6404 6405 403be7 GetFileType 6403->6405 6403->6408 6404->6399 6409 403b6a ReadFile 6404->6409 6407 403c02 CloseHandle 6405->6407 6405->6408 6407->6408 6409->6399 6410 403b8c 6409->6410 6410->6403 6411 403b9f SetFilePointer 6410->6411 6411->6399 6412 403bb0 SetEndOfFile 6411->6412 6412->6399 6412->6403 6747 40a19d 6748 40a10f 6747->6748 6749 40a13b 6748->6749 6750 409438 9 API calls 6748->6750 6751 40a154 6749->6751 6754 40a14e RemoveDirectoryA 6749->6754 6750->6749 6752 40a168 6751->6752 6753 40a15d 73F85CF0 6751->6753 6755 40a190 6752->6755 6756 40357c 4 API calls 6752->6756 6753->6752 6754->6751 6757 40a186 6756->6757 6758 4025ac 4 API calls 6757->6758 6758->6755 6759 40a1a2 6760 40a1ab 6759->6760 6762 40a1d6 6759->6762 6769 4093a8 6760->6769 6763 403198 4 API calls 6762->6763 6765 40a20e 6763->6765 6764 40a1b0 6764->6762 6767 40a1ce MessageBoxA 6764->6767 6766 403198 4 API calls 6765->6766 6768 40a216 6766->6768 6767->6762 6770 4093b4 GetCurrentProcess OpenProcessToken 6769->6770 6771 40940f ExitWindowsEx 6769->6771 6772 4093c6 6770->6772 6773 4093ca LookupPrivilegeValueA AdjustTokenPrivileges GetLastError 6770->6773 6771->6772 6772->6764 6773->6771 6773->6772 5630 4074a8 5631 4074b4 CloseHandle 5630->5631 5632 4074bd 5630->5632 5631->5632 6774 4011aa 6775 4011ac GetStdHandle 6774->6775 6428 4028ac 6429 402594 4 API calls 6428->6429 6430 4028b6 6429->6430 6435 4050b0 6436 4050c3 6435->6436 6437 404da8 19 API calls 6436->6437 6438 4050d7 6437->6438 6439 401ab9 6440 401a96 6439->6440 6441 401aa9 RtlDeleteCriticalSection 6440->6441 6442 401a9f RtlLeaveCriticalSection 6440->6442 6442->6441

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 130 409a50-409a74 GetSystemInfo VirtualQuery 131 409b04-409b0b 130->131 132 409a7a 130->132 133 409af9-409afe 132->133 133->131 134 409a7c-409a83 133->134 135 409ae5-409af7 VirtualQuery 134->135 136 409a85-409a89 134->136 135->131 135->133 136->135 137 409a8b-409a93 136->137 138 409aa4-409ab5 VirtualProtect 137->138 139 409a95-409a98 137->139 141 409ab7 138->141 142 409ab9-409abb 138->142 139->138 140 409a9a-409a9d 139->140 140->138 143 409a9f-409aa2 140->143 141->142 144 409aca-409acd 142->144 143->138 143->142 145 409abd-409ac6 call 409a48 144->145 146 409acf-409ad1 144->146 145->144 146->135 147 409ad3-409ae0 VirtualProtect 146->147 147->135
                                  APIs
                                  • GetSystemInfo.KERNEL32(?), ref: 00409A62
                                  • VirtualQuery.KERNEL32(00400000,?,0000001C,?), ref: 00409A6D
                                  • VirtualProtect.KERNEL32(?,?,00000040,?,00400000,?,0000001C,?), ref: 00409AAE
                                  • VirtualProtect.KERNEL32(?,?,?,?,?,?,00000040,?,00400000,?,0000001C,?), ref: 00409AE0
                                  • VirtualQuery.KERNEL32(?,?,0000001C,00400000,?,0000001C,?), ref: 00409AF0
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Virtual$ProtectQuery$InfoSystem
                                  • String ID:
                                  • API String ID: 2441996862-0
                                  • Opcode ID: 7201f50c1bbc867616f34b0d7869ade918e84d4ffec2886a855211ecfaafd62a
                                  • Instruction ID: f454ad9899b025228c1f7fcdea0b90f60778d00e9e42dca68456bdeb88109946
                                  • Opcode Fuzzy Hash: 7201f50c1bbc867616f34b0d7869ade918e84d4ffec2886a855211ecfaafd62a
                                  • Instruction Fuzzy Hash: 7F2181B13003446BDB30DA998C85E6777D89F85364F04493AFA85E23D3D779ED40CA59
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                  • Instruction ID: b78bf48cff894a3999656c5243e329942f020ab22272e2e872fdbeeaebf0035e
                                  • Opcode Fuzzy Hash: 8ef9b48ed96d6a8df8db933101511442404bdd0abec70889978d036278c5d13e
                                  • Instruction Fuzzy Hash: EDE09271B0021426D711A9699C86AEB735DDB58310F0006BFB904EB3C6EDB49E8046ED

                                  Control-flow Graph

                                  APIs
                                  • SetLastError.KERNEL32 ref: 0040A00F
                                    • Part of subcall function 0040949C: GetLastError.KERNEL32(00000000,0040953F,?,0040B240,?,01F51E48), ref: 004094C0
                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A04C
                                  • SetWindowLongA.USER32(00020468,000000FC,00409838), ref: 0040A063
                                  • RemoveDirectoryA.KERNEL32(00000000,0040A1A2,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A14F
                                  • 73F85CF0.USER32(00020468,0040A1A2,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A163
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLastWindow$CreateDirectoryLongRemove
                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                  • API String ID: 3341979996-3001827809
                                  • Opcode ID: 5d513686816418ae243219bf7528eb4b9db1107b46c668a60ca7906752dc9ac7
                                  • Instruction ID: 1f7e7fc7b16e3061b9688a463084272918fb4b7ca7fd913d180e89589801694f
                                  • Opcode Fuzzy Hash: 5d513686816418ae243219bf7528eb4b9db1107b46c668a60ca7906752dc9ac7
                                  • Instruction Fuzzy Hash: 9A411A70600205DFD711EBA9EE86B9A7BA5EB45304F10427BF110BB3E2DB789845CB9D

                                  Control-flow Graph

                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040909D,?,?,?,?,00000000,?,00409B8F), ref: 00409024
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040909D,?,?,?,?,00000000,?,00409B8F), ref: 0040902A
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040909D,?,?,?,?,00000000,?,00409B8F), ref: 0040903E
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,0040909D,?,?,?,?,00000000,?,00409B8F), ref: 00409044
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                  • API String ID: 439651959-2130885113
                                  • Opcode ID: 25df230f82b2c79a3aa95c836895d72a490780489c89180c14923933fe6b72f2
                                  • Instruction ID: 72ad054f56adce7298f13d7b65f4c4f8572bdb54ea2996b6cde6789755c9e6b9
                                  • Opcode Fuzzy Hash: 25df230f82b2c79a3aa95c836895d72a490780489c89180c14923933fe6b72f2
                                  • Instruction Fuzzy Hash: 22018F70208300EEEB10BB76DC47B163AA8E785B14F60447BF604B62D3DA7D4D04CA6E

                                  Control-flow Graph

                                  APIs
                                  • CreateWindowExA.USER32(00000000,STATIC,InnoSetupLdrWindow,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0040A04C
                                  • SetWindowLongA.USER32(00020468,000000FC,00409838), ref: 0040A063
                                    • Part of subcall function 00406ADC: GetCommandLineA.KERNEL32(00000000,00406B20,?,?,?,?,00000000,?,0040A0D4,?), ref: 00406AF4
                                    • Part of subcall function 004098C4: CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004099BC,01F51E48,004099B0,00000000,00409997), ref: 00409934
                                    • Part of subcall function 004098C4: CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004099BC,01F51E48,004099B0,00000000), ref: 00409948
                                    • Part of subcall function 004098C4: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409961
                                    • Part of subcall function 004098C4: GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409973
                                    • Part of subcall function 004098C4: CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004099BC,01F51E48,004099B0), ref: 0040997C
                                  • RemoveDirectoryA.KERNEL32(00000000,0040A1A2,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A14F
                                  • 73F85CF0.USER32(00020468,0040A1A2,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A163
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcessWindow$CodeCommandDirectoryExitLineLongMultipleObjectsRemoveWait
                                  • String ID: /SL5="$%x,%d,%d,$InnoSetupLdrWindow$STATIC
                                  • API String ID: 978128352-3001827809
                                  • Opcode ID: d166a4cec2fc33cb56bfbbabcb8daa70af576f639edca3908572750b16a4c946
                                  • Instruction ID: a7b6eb54af5060593f1dc40a182d07bad82914a8e6ed89a98b428be1cc587243
                                  • Opcode Fuzzy Hash: d166a4cec2fc33cb56bfbbabcb8daa70af576f639edca3908572750b16a4c946
                                  • Instruction Fuzzy Hash: F1414B70604204DFD710EBA9EE86B9A77A5EB48304F20827BF110B77E1DB789845CB9D

                                  Control-flow Graph

                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004099BC,01F51E48,004099B0,00000000,00409997), ref: 00409934
                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004099BC,01F51E48,004099B0,00000000), ref: 00409948
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00409961
                                  • GetExitCodeProcess.KERNEL32(?,0040B240), ref: 00409973
                                  • CloseHandle.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004099BC,01F51E48,004099B0), ref: 0040997C
                                    • Part of subcall function 0040949C: GetLastError.KERNEL32(00000000,0040953F,?,0040B240,?,01F51E48), ref: 004094C0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$CodeCreateErrorExitLastMultipleObjectsWait
                                  • String ID: D
                                  • API String ID: 3356880605-2746444292
                                  • Opcode ID: 6cd749b7da8c447fd26e412475d3e6c1201e0a1137176375851fbb0900f59f1e
                                  • Instruction ID: bdd927f14c3698a1a1570e24eb7dd81e4fd7863d50f3020ec4c945394429738e
                                  • Opcode Fuzzy Hash: 6cd749b7da8c447fd26e412475d3e6c1201e0a1137176375851fbb0900f59f1e
                                  • Instruction Fuzzy Hash: 12114FB16442086EDB10EBE6CC52FAEB7ACEF49714F50007FB604F72C6DA789D048669

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 111 4019dc-4019e7 112 401abb-401abd 111->112 113 4019ed-401a02 111->113 114 401a04-401a09 RtlEnterCriticalSection 113->114 115 401a0e-401a2d LocalFree 113->115 114->115 116 401a41-401a47 115->116 117 401a49-401a6e call 4012dc * 3 116->117 118 401a2f-401a3f VirtualFree 116->118 125 401a70-401a85 LocalFree 117->125 126 401a87-401a9d 117->126 118->116 125->125 125->126 128 401aa9-401ab3 RtlDeleteCriticalSection 126->128 129 401a9f-401aa4 RtlLeaveCriticalSection 126->129 129->128
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,00000000,00401AB4), ref: 00401A09
                                  • LocalFree.KERNEL32(00000000,00000000,00401AB4), ref: 00401A1B
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A3A
                                  • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401AB4), ref: 00401A79
                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AA4
                                  • RtlDeleteCriticalSection.KERNEL32(0040C41C,00401ABB), ref: 00401AAE
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                  • String ID:
                                  • API String ID: 3782394904-0
                                  • Opcode ID: 2760f6fc436d2282df077fa3fe2c561b0ff429e9c23b98cc44d100e589fe962f
                                  • Instruction ID: 5447b05044442752c1d56c7733342563ab4b4f61826a3093f511f794066d9233
                                  • Opcode Fuzzy Hash: 2760f6fc436d2282df077fa3fe2c561b0ff429e9c23b98cc44d100e589fe962f
                                  • Instruction Fuzzy Hash: 91116330341280DAD711ABA59EE2F623668B785748F44437EF444B62F2C67C9840CA9D

                                  Control-flow Graph

                                  APIs
                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409DC6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: $u@$.tmp$Hy@
                                  • API String ID: 2030045667-3467318143
                                  • Opcode ID: 7e3326119f0f45bf3fdc8ffe6fce87748f707ac64b952cdb44e1f50d64bea5b8
                                  • Instruction ID: 0fcf381c82764b4c9d7c70074c7f75f418c395a73277f9788cc20b10a1b959eb
                                  • Opcode Fuzzy Hash: 7e3326119f0f45bf3fdc8ffe6fce87748f707ac64b952cdb44e1f50d64bea5b8
                                  • Instruction Fuzzy Hash: 0141AF30614201DFD315EF25DE92A1A7BA6FB49704B60457AF801B77E2CB79AC01CBAD

                                  Control-flow Graph

                                  APIs
                                  • MessageBoxA.USER32(00000000,00000000,00000000,00000024), ref: 00409DC6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Message
                                  • String ID: $u@$.tmp$Hy@
                                  • API String ID: 2030045667-3467318143
                                  • Opcode ID: dd301ae767feb5139ffce102741ee14f65d9c8096cb46c7d46dfbabafacc20fb
                                  • Instruction ID: b33f538e520dd1c81796310b03ba0e64836a70915577e91deec38726eba2a1aa
                                  • Opcode Fuzzy Hash: dd301ae767feb5139ffce102741ee14f65d9c8096cb46c7d46dfbabafacc20fb
                                  • Instruction Fuzzy Hash: 1F41BE30610201DFC315EF25DE92A1A7BA6FB49708B10457AF801B77E2CB79AC01CBAD

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 245 403d02-403d10 246 403d12-403d19 245->246 247 403d29-403d30 245->247 248 403ddf-403de5 ExitProcess 246->248 249 403d1f 246->249 250 403d32-403d3c 247->250 251 403d3e-403d45 247->251 249->247 254 403d21-403d23 249->254 250->247 252 403d47-403d51 251->252 253 403db8-403dcc call 403cc8 * 2 call 4019dc 251->253 255 403d56-403d62 252->255 270 403dd1-403dd8 253->270 254->247 257 403dea-403e19 call 4030b4 254->257 255->255 259 403d64-403d6e 255->259 262 403d73-403d84 259->262 262->262 265 403d86-403d8d 262->265 268 403da4-403db3 call 403fe4 call 403f67 265->268 269 403d8f-403da2 MessageBoxA 265->269 268->253 269->253 270->257 272 403dda call 4030b4 270->272 272->248
                                  APIs
                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00403D9D
                                  • ExitProcess.KERNEL32 ref: 00403DE5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ExitMessageProcess
                                  • String ID: Error$Runtime error at 00000000
                                  • API String ID: 1220098344-2970929446
                                  • Opcode ID: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                  • Instruction ID: db3008c0e6bc5d60e05df0545d3e9f81ce91e923819fa2a9fb93000da4b6b716
                                  • Opcode Fuzzy Hash: 0b7abc0913d0e9b6482778e2bb40dc1e8adb9ed549d30d0444a38b969016e341
                                  • Instruction Fuzzy Hash: B521F830A04341CAE714EFA59AD17153E98AB49349F04837BD500B73E3C77C8A45C76E

                                  Control-flow Graph

                                  APIs
                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,0040937F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004092D6
                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,0040937F,?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004092DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: .tmp
                                  • API String ID: 1375471231-2986845003
                                  • Opcode ID: c29b4afbc625b0adb94a8cd3073cadbee00818e16f6f1e3b2c629215ed2a0195
                                  • Instruction ID: 52471fc28369041db9dc80566a9fc74e846417a9792ccad030e5e87360f7ab1a
                                  • Opcode Fuzzy Hash: c29b4afbc625b0adb94a8cd3073cadbee00818e16f6f1e3b2c629215ed2a0195
                                  • Instruction Fuzzy Hash: 7A211A74A002099BDB01EBA1C9529DFB7B9EF48304F50457BE901B73C2DA7C9E059A65

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 364 409438-409449 365 409492-409497 364->365 366 40944b-40944c 364->366 367 40944e-409451 366->367 368 409453-40945c Sleep 367->368 369 40945e-409461 367->369 370 40946c-409471 call 408f1c 368->370 369->370 371 409463-409467 Sleep 369->371 373 409476-409478 370->373 371->370 373->365 374 40947a-409482 GetLastError 373->374 374->365 375 409484-40948c GetLastError 374->375 375->365 376 40948e-409490 375->376 376->365 376->367
                                  APIs
                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 00409457
                                  • Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 00409467
                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 0040947A
                                  • GetLastError.KERNEL32(?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 00409484
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLastSleep
                                  • String ID:
                                  • API String ID: 1458359878-0
                                  • Opcode ID: 07d8f92f5a140c3baa791f56a037d46507faa73f0e250797275cfabcff61e676
                                  • Instruction ID: c88bf81094fe9498b3f4a43de29c1033330ebaee36a687def7254f10b7ff23de
                                  • Opcode Fuzzy Hash: 07d8f92f5a140c3baa791f56a037d46507faa73f0e250797275cfabcff61e676
                                  • Instruction Fuzzy Hash: 6DF0B476A0811477CB34E5AE9D81A6F628DDBD1369710803FFA54F3283C579CD0242AE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 377 408f1c-408f34 call 408ed0 380 408f36-408f91 377->380 381 408f3d-408f6b call 403414 6D167770 GetLastError 377->381 385 408f70-408f78 call 408f0c 381->385
                                  APIs
                                  • 6D167770.KERNEL32(00000000,00000000,00408F79,?,0000000D,00000000), ref: 00408F53
                                  • GetLastError.KERNEL32(00000000,00000000,00408F79,?,0000000D,00000000), ref: 00408F5B
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167770ErrorLast
                                  • String ID:
                                  • API String ID: 4081035853-0
                                  • Opcode ID: f2cb50cc657bda14d3bb312ac10fd5a86930a6c163d77b3ac60cb23cdc188d21
                                  • Instruction ID: a15b2d46f4e197b9001b9aeeb57ba92ae3624390afab9249dc216eb4faede85a
                                  • Opcode Fuzzy Hash: f2cb50cc657bda14d3bb312ac10fd5a86930a6c163d77b3ac60cb23cdc188d21
                                  • Instruction Fuzzy Hash: D4F0C271B04709AFCB01EFB59D414AEB7E9EB88714B5045BBF804F3281EF789E1085A9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 392 40a19d call 402924 396 40a122-40a136 call 409438 392->396 397 40a13b-40a142 392->397 396->397 399 40a154-40a15b 397->399 400 40a144-40a149 call 403414 397->400 402 40a168-40a16f 399->402 403 40a15d-40a163 73F85CF0 399->403 404 40a14e-40a14f RemoveDirectoryA 400->404 405 40a171-40a192 call 40357c call 4025ac 402->405 406 40a197 402->406 403->402 404->399 405->406
                                  APIs
                                  • RemoveDirectoryA.KERNEL32(00000000,0040A1A2,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A14F
                                  • 73F85CF0.USER32(00020468,0040A1A2,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0040A163
                                    • Part of subcall function 00409438: Sleep.KERNEL32(?,?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 00409457
                                    • Part of subcall function 00409438: GetLastError.KERNEL32(?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 0040947A
                                    • Part of subcall function 00409438: GetLastError.KERNEL32(?,?,?,0000000D,?,0040A13B,000000FA,00000032,0040A1A2), ref: 00409484
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast$DirectoryRemoveSleep
                                  • String ID:
                                  • API String ID: 936953547-0
                                  • Opcode ID: a00273ca4a8178c961b9720f82700e3d8e15a9a0b1c761a42b4abaec5ddbfeef
                                  • Instruction ID: 0c8896f5df820562778f557013a9bf53dced06f03082227eb4dbd77002fc3682
                                  • Opcode Fuzzy Hash: a00273ca4a8178c961b9720f82700e3d8e15a9a0b1c761a42b4abaec5ddbfeef
                                  • Instruction Fuzzy Hash: EFF0EC70201200DBD725FB69EFDAB9537A5AB44309F14463BA100BA6F1DBBC9881CB8D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 388 406f00-406f53 SetErrorMode call 403414 LoadLibraryA
                                  APIs
                                  • SetErrorMode.KERNEL32(00008000), ref: 00406F0A
                                  • LoadLibraryA.KERNEL32(00000000,00000000,00406F54,?,00000000,00406F72,?,00008000), ref: 00406F39
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLibraryLoadMode
                                  • String ID:
                                  • API String ID: 2987862817-0
                                  • Opcode ID: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                  • Instruction ID: 61c75ae37e4b7eabf140846b9e9d3e90831ba1beb5fed57b889ca027c52d2016
                                  • Opcode Fuzzy Hash: 280b78466cfb49ac5d1a4d8de4e82968344a77d2278ba686a31885ea79f0a63b
                                  • Instruction Fuzzy Hash: 49F08270614704BEDB029FB69C6282BBBFCE749B0475348B6F904A26D2E53C5D208568
                                  APIs
                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 004075EB
                                  • GetLastError.KERNEL32(?,?,?,00000000), ref: 004075F3
                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,01F503AC,?,00409BE9,00000001,00000000,00000002,00000000,0040A1E0,?,00000000,0040A217), ref: 004073EF
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast$FilePointer
                                  • String ID:
                                  • API String ID: 1156039329-0
                                  • Opcode ID: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                  • Instruction ID: cda5b13584bb414d1d7c0d7cef5a43535e1b929ad68122291bf656bee98e9d77
                                  • Opcode Fuzzy Hash: 4b4e93de333a3cce642c2996d73c93b1535ff8d1f0695df8178d397978e57373
                                  • Instruction Fuzzy Hash: A0E092766081016FD601D55EC881B9B33DCDFC5365F00453ABA54EB2D1D675AC0087B6
                                  APIs
                                  • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 004075A3
                                  • GetLastError.KERNEL32(?,?,?,?,00000000), ref: 004075B2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastRead
                                  • String ID:
                                  • API String ID: 1948546556-0
                                  • Opcode ID: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                  • Instruction ID: 6d0e635579d8ef6deec62af0acb898b5effba2491802df9b0589d4017bc118ea
                                  • Opcode Fuzzy Hash: 60e63bc2ff5526e1bd28c8a7098a19329bed0093cf160d1b5924f83231400461
                                  • Instruction Fuzzy Hash: 4FE012B1A181147AEB24965A9CC5FAB6BDCCBC5314F14847BF904DB282D678DC04877B
                                  APIs
                                  • SetFilePointer.KERNEL32(?,00000000,?,00000001), ref: 0040753B
                                  • GetLastError.KERNEL32(?,00000000,?,00000001), ref: 00407547
                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,01F503AC,?,00409BE9,00000001,00000000,00000002,00000000,0040A1E0,?,00000000,0040A217), ref: 004073EF
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast$FilePointer
                                  • String ID:
                                  • API String ID: 1156039329-0
                                  • Opcode ID: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                  • Instruction ID: cd7afd6369a15af5fc7b0f7528e30ca6696358c0ea2e6c45e94f6e0b4d50a73a
                                  • Opcode Fuzzy Hash: 0dd762855ce75d8d861d21fe55c1929f9bb0fd02210f0b496c114b023f039fab
                                  • Instruction Fuzzy Hash: 0EE04FB1600210AFEB10EEB98C81B9672DC9F48364F048576EA14DF2C6D274DC00C766
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,00401739), ref: 0040145F
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,00401739), ref: 00401486
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: efc6f27fa4c1f0416fcf42a0cb9c981ca4ea103f0f96f52908972bf4ed8d2b74
                                  • Instruction ID: 29306f1da17679ce7d7d3cecb65679b0075e6f6f2ddca0a826851c871ac90975
                                  • Opcode Fuzzy Hash: efc6f27fa4c1f0416fcf42a0cb9c981ca4ea103f0f96f52908972bf4ed8d2b74
                                  • Instruction Fuzzy Hash: 57F02772B0032057DB206A6A0CC1B636AC59F85B90F1541BBFA4CFF3F9D2B98C0042A9
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,00405306), ref: 004051EF
                                    • Part of subcall function 00404C2C: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00404C49
                                    • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                  • String ID:
                                  • API String ID: 1658689577-0
                                  • Opcode ID: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                  • Instruction ID: c760dbbb10683706500036a577470844d35ac6ab0c013c9c95042e4326961867
                                  • Opcode Fuzzy Hash: 9ea3c66d670cb0c44a2644de082ff92dfdb36693542507e19320d23b5394a13d
                                  • Instruction Fuzzy Hash: 3B313D75E00119ABCB00EF95C8C19EEB779FF84304F158977E815BB285E739AE058B98
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D1674
                                  • String ID:
                                  • API String ID: 2996001779-0
                                  • Opcode ID: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                  • Instruction ID: d860c9bcffbd3325f9178b4d72e9b59b5a3ff3896166b15a891a1a6cde46a7a7
                                  • Opcode Fuzzy Hash: ce86d0b46b6749cbb1c8065cdd94f6338fa023cacd1506a2c152e65e14b54ccf
                                  • Instruction Fuzzy Hash: 6EE06D713442082EE3409AEC6C51FA277DCD309354F008032B988DB342D5719D108BE8
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 00407518
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D1674
                                  • String ID:
                                  • API String ID: 2996001779-0
                                  • Opcode ID: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                  • Instruction ID: d44512077142226ebef1615cfdb59f208ea4aebd3ed4d24446e2b73eb7949d4a
                                  • Opcode Fuzzy Hash: 5c7f1f50133f8918f9d70925a1da877e635501982028b62cfe689d085d452769
                                  • Instruction Fuzzy Hash: A7E06D713442082ED2409AEC6C51F92779C9309354F008022B988DB342D5719D108BE8
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,00406984,?,?,?,?,00000000,?,00406999,00406CC7,00000000,00406D0C,?,?,?), ref: 00406967
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                  • Instruction ID: a5d31a369ac9c1460ce21b6bb4ed2cb839aeaeb50f5f76e03c39097c5263300d
                                  • Opcode Fuzzy Hash: 53f9965764e037d0eade91fd77cfc00c47722664131d9e88e47f7f2d0abdeb71
                                  • Instruction Fuzzy Hash: A9E065712043047FD701EA629C52959B7ACDB89708B924476B501A6682D5785E108568
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 0040763F
                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,01F503AC,?,00409BE9,00000001,00000000,00000002,00000000,0040A1E0,?,00000000,0040A217), ref: 004073EF
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastWrite
                                  • String ID:
                                  • API String ID: 442123175-0
                                  • Opcode ID: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                  • Instruction ID: 68b513bd5595dc6b38f1d245c0222f257f742b1e6f06676187839ef0e6677733
                                  • Opcode Fuzzy Hash: 2449abf237b154253dcf2b231e0da589e0eb2b5517b9a23d8c49629d5bbf5411
                                  • Instruction Fuzzy Hash: 93E01A727081106BEB10E65EDCC0EABA7DCDFC5764F04547BBA08EB291D674AC049676
                                  APIs
                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,00409087,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 00407203
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FormatMessage
                                  • String ID:
                                  • API String ID: 1306739567-0
                                  • Opcode ID: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                  • Instruction ID: 095b59eb22c1ada42cfe979e419102ec0d22498c88dfceb067fba30b4837873c
                                  • Opcode Fuzzy Hash: 606059c89ae6d8e8cf07aa2f3a49422b1cb7a18355834490beef1a35ac41266b
                                  • Instruction Fuzzy Hash: 8DE0D8A0B8830125F22514544C87B77110E53C0700F50847EB710ED3D3D6BEA90641AF
                                  APIs
                                  • SetEndOfFile.KERNEL32(?,01F67FF4,00409FA7,00000000), ref: 00407613
                                    • Part of subcall function 004073EC: GetLastError.KERNEL32($u@,0040748A,?,?,01F503AC,?,00409BE9,00000001,00000000,00000002,00000000,0040A1E0,?,00000000,0040A217), ref: 004073EF
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorFileLast
                                  • String ID:
                                  • API String ID: 734332943-0
                                  • Opcode ID: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                  • Instruction ID: 5d9383f6f08d3e81a9fa52c4aba0b6319cc61be016c813106cdb36ce464f185a
                                  • Opcode Fuzzy Hash: 2ff8edb08080e924c2b395f282aa3d8258573adb5ced5672aaac345b41159427
                                  • Instruction Fuzzy Hash: 39C04CB1A0450047DB40A6BE99C1A0662DC5A483157045576BA08DB297D679E8009665
                                  APIs
                                  • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                  • Instruction ID: 754ecbd0d3eeca534395493226652c0236480d823d7569c9efe771d01927bad3
                                  • Opcode Fuzzy Hash: b3342c3bee8ef6d4bfebdffece25c86b3cab89117035339c57c774ddff03cb9f
                                  • Instruction Fuzzy Hash: 97B09B7661C2015DE705D6D5745193863F4D7C47103A1457BF104D25C0D57CD4144518
                                  APIs
                                  • SetErrorMode.KERNEL32(?,00406F79), ref: 00406F6C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                  • Instruction ID: 7c61e226393e4972c06343dd54fa3db727d2c771c967085a02b7622724de7152
                                  • Opcode Fuzzy Hash: 8c0feaa3b8caa60bdda2d34a80aa64328f40d718bb3766066fe9d436f42a4d4e
                                  • Instruction Fuzzy Hash: BAA022A8C00002B2CE00E2F08080A3C23282A8C3003C00AAA322EB20C0C03CC000822A
                                  APIs
                                  • CharPrevA.USER32(?,?,004068CC,?,004065A9,?,?,00406CE7,00000000,00406D0C,?,?,?,?,00000000,00000000), ref: 004068D2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CharPrev
                                  • String ID:
                                  • API String ID: 122130370-0
                                  • Opcode ID: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                  • Instruction ID: 57bb655d476c0b104ac503b4dc16dcc9cc7d9309af7e6782790f501f1b0aeff9
                                  • Opcode Fuzzy Hash: 17375083e06acd4281245791c958798094bb343357575ce1856f87173c3dc77f
                                  • Instruction Fuzzy Hash:
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004), ref: 00407F00
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: bcbcab35e69e4aac02ddc8f9306424be7352c7af00132f0a6ac812590d81b4ba
                                  • Instruction ID: fc41cd242ecd06977689102cbc3fe0dda7292da63ddead5a333d1a1ffb22ba19
                                  • Opcode Fuzzy Hash: bcbcab35e69e4aac02ddc8f9306424be7352c7af00132f0a6ac812590d81b4ba
                                  • Instruction Fuzzy Hash: 0A1184716082059FDB10EF19C881B4B3794EF84359F15847FF958AB2C6DA38EC01CBAA
                                  APIs
                                  • VirtualFree.KERNEL32(00000000,00000000,00004000,?,0000000C,?,-00000008,00003FFB,004018BF), ref: 004016B2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: a2f32dd8ef58eb042d1926e7c5d87192c2fb778a874e681f692e1318d4ea2181
                                  • Instruction ID: 63c8255cdd02620dd55efc6405714c3c0a63becca9b218cdeda95617091702f1
                                  • Opcode Fuzzy Hash: a2f32dd8ef58eb042d1926e7c5d87192c2fb778a874e681f692e1318d4ea2181
                                  • Instruction Fuzzy Hash: 3601A7726442148BC310AF28DDC093A77D5EB85364F1A4A7ED985B73A1D23B6C0587A8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                  • Instruction ID: 0172511661962fd54a17c381567595eb1d39a1afdb2a9088c563811225ee2893
                                  • Opcode Fuzzy Hash: e9d4eabf3352258034a438adb9f93a7799ac96b59790047b66948ab7235a5e89
                                  • Instruction Fuzzy Hash: FDD05E81B00A6017D215E2BE498864696C85F88745B08847AFA84E73D1D67CAC008399
                                  APIs
                                  • VirtualFree.KERNEL32(?,00000000,00008000,?,00407DFD), ref: 00407E2F
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: 1093f2965c8d826e2d9255731fcf61e27ff6ff650429467d7a56a0a768ac96fe
                                  • Instruction ID: febac6bc74e6b78133d4c9973fd00bf1b5266498df1910f6a89c28e3011ccf1e
                                  • Opcode Fuzzy Hash: 1093f2965c8d826e2d9255731fcf61e27ff6ff650429467d7a56a0a768ac96fe
                                  • Instruction Fuzzy Hash: E9D0E9B17553055BDB90EEB98CC5B0237D87B48604F5044B66908EB296E774E8009654
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028), ref: 004093B7
                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 004093BD
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004093D6
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004093FD
                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 00409402
                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00409413
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 107509674-3733053543
                                  • Opcode ID: 5f11c42dfc459d8c8d745bef3874dea2540740a64161af9a8cfd559d3eb700c3
                                  • Instruction ID: 6d7ed6c9cda2f1ce1f9f93618b8ae596d287dd3264b4ec817c14c29068bbf8ac
                                  • Opcode Fuzzy Hash: 5f11c42dfc459d8c8d745bef3874dea2540740a64161af9a8cfd559d3eb700c3
                                  • Instruction Fuzzy Hash: D6F036B079831576E620AA718D07F6762C89BC5B08F50493ABF11FA1C3D7BDD809466F
                                  APIs
                                  • FindResourceA.KERNEL32(00000000,00002B67,0000000A), ref: 00409B16
                                  • SizeofResource.KERNEL32(00000000,00000000,?,00409C01,00000000,0040A198,?,00000001,00000000,00000002,00000000,0040A1E0,?,00000000,0040A217), ref: 00409B29
                                  • LoadResource.KERNEL32(00000000,00000000,00000000,00000000,?,00409C01,00000000,0040A198,?,00000001,00000000,00000002,00000000,0040A1E0,?,00000000), ref: 00409B3B
                                  • LockResource.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00409C01,00000000,0040A198,?,00000001,00000000,00000002,00000000,0040A1E0), ref: 00409B4C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID:
                                  • API String ID: 3473537107-0
                                  • Opcode ID: 376c05bc37c95194bc326ac3b717fe79ec3e42ad3bbb289724ae4c4e289e3edd
                                  • Instruction ID: 6064aaca9a792ef40435c2eee74f3701aac6da7f3f1b996cd847f096d57c9d2c
                                  • Opcode Fuzzy Hash: 376c05bc37c95194bc326ac3b717fe79ec3e42ad3bbb289724ae4c4e289e3edd
                                  • Instruction Fuzzy Hash: 2BE05AE035430665EA6036EB1CC2B2A21185BA472DF00003FB740792C3DDACAC04912E
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                  • Instruction ID: dec8dcb9893e8432c944e1b70884c8cc40709e939aac0c2d0d2241257bb7fc31
                                  • Opcode Fuzzy Hash: 5ea09b3054f78be8d61aadd1ef4a431fb4c5ee7ddbf8397ee2588b1f4940bcb7
                                  • Instruction Fuzzy Hash: D3D05EB631E6502AE210519B2D85EBB4EACCAC57A4F14443BF648DB242D2248C069776
                                  APIs
                                  • GetSystemTime.KERNEL32(?), ref: 004026CE
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: SystemTime
                                  • String ID:
                                  • API String ID: 2656138-0
                                  • Opcode ID: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                  • Instruction ID: 69442b1fa125f02c17f5f00667ba5619268a94e84ed87230136e9e38920861ba
                                  • Opcode Fuzzy Hash: 1c1586f040ad907c453502297459692aa8199981632c93951a31d41848eff65d
                                  • Instruction Fuzzy Hash: 14E04F21E0010A82C704ABA5CD435EDF7AEAB95600B044272A418E92E0F631C251C748
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00406FAD
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00406FB3
                                  • 6D167B60.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,00407089), ref: 00407001
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166D167HandleModule
                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                  • API String ID: 1587692801-2401316094
                                  • Opcode ID: e3d1d02752a949e7be31ad703c02a9802a243e51059f8895845ba5cb13b9df21
                                  • Instruction ID: 4848c3cc747176469ce0ef08a48ea257d9f62360c4c8e5a9f2e1a14c28c6fa3b
                                  • Opcode Fuzzy Hash: e3d1d02752a949e7be31ad703c02a9802a243e51059f8895845ba5cb13b9df21
                                  • Instruction Fuzzy Hash: C3217370E04209ABDB10EBB5CD51B9F77A8EB44304F60857BA500F72C1DB7CAA05879E
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B1E
                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B42
                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00403B5E
                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00403B7F
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00403BA8
                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00403BB2
                                  • GetStdHandle.KERNEL32(000000F5), ref: 00403BD2
                                  • GetFileType.KERNEL32(?,000000F5), ref: 00403BE9
                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00403C04
                                  • GetLastError.KERNEL32(000000F5), ref: 00403C1E
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: File$HandlePointer$CloseD1674ErrorLastReadSizeType
                                  • String ID:
                                  • API String ID: 1365492021-0
                                  • Opcode ID: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                  • Instruction ID: 6684f6b4d1923fa93cc5777a7ebe0ca766b8c5f16b1f456132d2f0a6dbb27d3d
                                  • Opcode Fuzzy Hash: bd0a662ad2dd38144def4530256030cdb08cf53568247c3ffcddd32d1ed1ea18
                                  • Instruction Fuzzy Hash: 444194302042009EF7305F258805B237DEDEB4571AF208A3FA1D6BA6E1E77DAE419B5D
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040555C,?,?,?,?,00000000,00000000,00000000,?,0040653B,00000000,0040654E), ref: 0040532E
                                    • Part of subcall function 0040515C: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,0040C4BC,00000001,?,00405227,?,00000000,00405306), ref: 0040517A
                                    • Part of subcall function 004051A8: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,004053AA,?,?,?,00000000,0040555C), ref: 004051BB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: InfoLocale$DefaultSystem
                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                  • API String ID: 1044490935-665933166
                                  • Opcode ID: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                  • Instruction ID: f22f4b18e1885e1925b87b286fa486de3d96a381b4aec2b7527aff107c54c5fa
                                  • Opcode Fuzzy Hash: 161572950381ad7cbc257d6fe5eb76d638651fb1e2415ab537dea70fc89fa197
                                  • Instruction Fuzzy Hash: 8E514234B00648ABDB00EBA59C91B9F776ADB89304F50957BB514BB3C6CA3DCA058B5C
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 004036F2
                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 004036FD
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403710
                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 0040371A
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403729
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocString
                                  • String ID:
                                  • API String ID: 262959230-0
                                  • Opcode ID: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                  • Instruction ID: 1285967c487f36a4f1f77a8b8e1f1fe351824cacfdb80e5859a13ebcd08b75b2
                                  • Opcode Fuzzy Hash: e5c78b39f57021be2b84baee447ab27339ef0409ceaef8bd5dd3a85dcd2f6a98
                                  • Instruction Fuzzy Hash: 17F068A13442543AF56075A75C43FAB198CCB45BAEF10457FF704FA2C2D8B89D0492BD
                                  APIs
                                  • RtlInitializeCriticalSection.KERNEL32(0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040192E
                                  • RtlEnterCriticalSection.KERNEL32(0040C41C,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 00401941
                                  • LocalAlloc.KERNEL32(00000000,00000FF8,0040C41C,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 0040196B
                                  • RtlLeaveCriticalSection.KERNEL32(0040C41C,004019D5,00000000,004019CE,?,?,0040217A,?,?,?,?,?,00401B95,00401DBB,00401DE0), ref: 004019C8
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                  • String ID:
                                  • API String ID: 730355536-0
                                  • Opcode ID: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                  • Instruction ID: 093a8b970c40f4dda7bd37408b901a2e20e4e29fb74a5496b56404d4d89a3717
                                  • Opcode Fuzzy Hash: aabd9570e7a52811c13604d6a46282fe49281d95e81aad3d3e53893a1864dea1
                                  • Instruction Fuzzy Hash: CC0161B0684240DEE715ABA999E6B353AA4E786744F10427FF080F62F2C67C4450CB9D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,00409B76), ref: 004030E3
                                  • GetCommandLineA.KERNEL32(00000000,00409B76), ref: 004030EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1414337628.0000000000401000.00000020.00000001.01000000.00000004.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.1414325313.0000000000400000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414350666.000000000040B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                  • Associated: 00000002.00000002.1414362855.0000000000411000.00000002.00000001.01000000.00000004.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CommandHandleLineModule
                                  • String ID: U1hd.@
                                  • API String ID: 2123368496-2904493091
                                  • Opcode ID: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                  • Instruction ID: 0f926add87520dc699e98d27074396f9fab16295c11a520b4b5863bd90c7cb52
                                  • Opcode Fuzzy Hash: ab44cebb113f23cc453db0582047ce3f33ed2b100303cb8959b7892e21e32e4b
                                  • Instruction Fuzzy Hash: 03C01274541300CAD328AFF69E8A304B990A385349F40823FA608BA2F1CA7C4201EBDD

                                  Execution Graph

                                  Execution Coverage:7.3%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:4.1%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:30
                                  execution_graph 52707 402e70 52710 402eea 52707->52710 52711 402e81 52707->52711 52708 402ebe RtlUnwind 52709 4033bc 4 API calls 52708->52709 52709->52710 52711->52708 52711->52710 52714 402d90 RaiseException 52711->52714 52713 402eb5 52713->52708 52714->52713 49108 496828 49162 403344 49108->49162 49110 496836 49165 4056a0 49110->49165 49112 49683b 49168 4098b4 49112->49168 49448 4032fc 49162->49448 49164 403349 GetModuleHandleA GetCommandLineA 49164->49110 49167 4056db 49165->49167 49449 4033bc 49165->49449 49167->49112 49458 408f8c 49168->49458 49448->49164 49450 4033f4 TlsGetValue 49449->49450 49451 4033cc 49449->49451 49452 4033d7 49450->49452 49453 4033fe 49450->49453 49451->49167 49457 403374 LocalAlloc TlsSetValue 49452->49457 49453->49167 49455 4033dc TlsGetValue 49456 4033ec 49455->49456 49456->49167 49457->49455 49530 408c24 49458->49530 49461 408544 GetSystemDefaultLCID 49465 40857a 49461->49465 49462 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49462->49465 49463 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 49463->49465 49464 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49464->49465 49465->49462 49465->49463 49465->49464 49466 4085dc 49465->49466 49467 406d54 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 49466->49467 49468 4084d0 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetLocaleInfoA 49466->49468 49469 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49466->49469 49470 40865f 49466->49470 49467->49466 49468->49466 49469->49466 49567 403420 49470->49567 49473 408688 GetSystemDefaultLCID 49572 4084d0 GetLocaleInfoA 49473->49572 49476 403450 4 API calls 49477 4086c8 49476->49477 49478 4084d0 5 API calls 49477->49478 49479 4086dd 49478->49479 49480 4084d0 5 API calls 49479->49480 49481 408701 49480->49481 49578 40851c GetLocaleInfoA 49481->49578 49484 40851c GetLocaleInfoA 49485 408731 49484->49485 49486 4084d0 5 API calls 49485->49486 49487 40874b 49486->49487 49488 40851c GetLocaleInfoA 49487->49488 49489 408768 49488->49489 49490 4084d0 5 API calls 49489->49490 49491 408782 49490->49491 49492 403450 4 API calls 49491->49492 49493 40878f 49492->49493 49494 4084d0 5 API calls 49493->49494 49495 4087a4 49494->49495 49496 403450 4 API calls 49495->49496 49497 4087b1 49496->49497 49498 40851c GetLocaleInfoA 49497->49498 49499 4087bf 49498->49499 49500 4084d0 5 API calls 49499->49500 49501 4087d9 49500->49501 49502 403450 4 API calls 49501->49502 49503 4087e6 49502->49503 49504 4084d0 5 API calls 49503->49504 49505 4087fb 49504->49505 49506 403450 4 API calls 49505->49506 49507 408808 49506->49507 49508 4084d0 5 API calls 49507->49508 49509 40881d 49508->49509 49510 40883a 49509->49510 49511 40882b 49509->49511 49513 403494 4 API calls 49510->49513 49586 403494 49511->49586 49514 408838 49513->49514 49515 4084d0 5 API calls 49514->49515 49516 40885c 49515->49516 49517 408879 49516->49517 49518 40886a 49516->49518 49519 403400 4 API calls 49517->49519 49520 403494 4 API calls 49518->49520 49521 408877 49519->49521 49520->49521 49580 403634 49521->49580 49531 408c30 49530->49531 49538 406d54 LoadStringA 49531->49538 49551 4034e0 49538->49551 49541 403450 49542 403454 49541->49542 49545 403464 49541->49545 49544 4034bc 4 API calls 49542->49544 49542->49545 49543 403490 49547 403400 49543->49547 49544->49545 49545->49543 49565 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49545->49565 49548 40341f 49547->49548 49549 403406 49547->49549 49548->49461 49549->49548 49566 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49549->49566 49556 4034bc 49551->49556 49553 4034f0 49554 403400 4 API calls 49553->49554 49555 403508 49554->49555 49555->49541 49557 4034c0 49556->49557 49558 4034dc 49556->49558 49561 402648 49557->49561 49558->49553 49560 4034c9 49560->49553 49562 40264c 49561->49562 49563 402656 49561->49563 49562->49563 49564 4033bc 4 API calls 49562->49564 49563->49560 49563->49563 49564->49563 49565->49543 49566->49548 49569 403426 49567->49569 49568 40344b 49568->49473 49569->49568 49571 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49569->49571 49571->49569 49573 4084f7 49572->49573 49574 408509 49572->49574 49575 4034e0 4 API calls 49573->49575 49576 403494 4 API calls 49574->49576 49577 408507 49575->49577 49576->49577 49577->49476 49579 408538 49578->49579 49579->49484 49581 40363c 49580->49581 49582 4034bc 4 API calls 49581->49582 49583 40364f 49582->49583 49584 403450 4 API calls 49583->49584 49585 403677 49584->49585 49587 403498 49586->49587 49588 4034ba 49587->49588 49590 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 49587->49590 49588->49514 49590->49588 50235 402584 50236 402598 50235->50236 50237 4025ab 50235->50237 50265 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50236->50265 50238 4025c2 RtlEnterCriticalSection 50237->50238 50239 4025cc 50237->50239 50238->50239 50251 4023b4 13 API calls 50239->50251 50242 40259d 50242->50237 50243 4025a1 50242->50243 50244 4025d9 50247 402635 50244->50247 50248 40262b RtlLeaveCriticalSection 50244->50248 50245 4025d5 50245->50244 50252 402088 50245->50252 50248->50247 50249 4025e5 50249->50244 50266 402210 9 API calls 50249->50266 50251->50245 50253 40209c 50252->50253 50254 4020af 50252->50254 50273 4019cc RtlInitializeCriticalSection RtlEnterCriticalSection LocalAlloc RtlLeaveCriticalSection 50253->50273 50256 4020c6 RtlEnterCriticalSection 50254->50256 50259 4020d0 50254->50259 50256->50259 50257 4020a1 50257->50254 50258 4020a5 50257->50258 50264 402106 50258->50264 50259->50264 50267 401f94 50259->50267 50262 4021f1 RtlLeaveCriticalSection 50263 4021fb 50262->50263 50263->50249 50264->50249 50265->50242 50266->50244 50268 401fa4 50267->50268 50269 401fd0 50268->50269 50272 401ff4 50268->50272 50274 401f0c 50268->50274 50269->50272 50279 401db4 50269->50279 50272->50262 50272->50263 50273->50257 50283 40178c 50274->50283 50277 401f29 50277->50268 50280 401e02 50279->50280 50281 401dd2 50279->50281 50280->50281 50306 401d1c 50280->50306 50281->50272 50284 4017a8 50283->50284 50285 4017b2 50284->50285 50288 40180f 50284->50288 50291 401803 50284->50291 50294 4014e4 50284->50294 50303 4013e0 LocalAlloc 50284->50303 50302 401678 VirtualAlloc 50285->50302 50288->50277 50293 401e80 9 API calls 50288->50293 50289 4017be 50289->50288 50304 4015c0 VirtualFree 50291->50304 50293->50277 50295 4014f3 VirtualAlloc 50294->50295 50297 401520 50295->50297 50298 401543 50295->50298 50305 401398 LocalAlloc 50297->50305 50298->50284 50300 40152c 50300->50298 50301 401530 VirtualFree 50300->50301 50301->50298 50302->50289 50303->50284 50304->50288 50305->50300 50307 401d2e 50306->50307 50308 401d51 50307->50308 50309 401d63 50307->50309 50319 401940 50308->50319 50311 401940 3 API calls 50309->50311 50312 401d61 50311->50312 50318 401d79 50312->50318 50329 401bf8 9 API calls 50312->50329 50314 401d88 50315 401da2 50314->50315 50330 401c4c 9 API calls 50314->50330 50331 401454 LocalAlloc 50315->50331 50318->50281 50320 401966 50319->50320 50328 4019bf 50319->50328 50332 40170c 50320->50332 50324 401983 50326 40199a 50324->50326 50337 4015c0 VirtualFree 50324->50337 50326->50328 50338 401454 LocalAlloc 50326->50338 50328->50312 50329->50314 50330->50315 50331->50318 50335 401743 50332->50335 50333 401783 50336 4013e0 LocalAlloc 50333->50336 50334 40175d VirtualFree 50334->50335 50335->50333 50335->50334 50336->50324 50337->50326 50338->50328 52715 40cd94 52718 406e78 WriteFile 52715->52718 52719 406e95 52718->52719 52720 47e651 52721 4501ec 5 API calls 52720->52721 52722 47e665 52721->52722 52723 47d780 21 API calls 52722->52723 52724 47e689 52723->52724 52725 47ae10 52726 47ae1b 52725->52726 52727 451af0 5 API calls 52726->52727 52728 47ae31 GetLastError 52726->52728 52729 47ae5c 52726->52729 52727->52726 52728->52729 52730 47ae3b GetLastError 52728->52730 52730->52729 52731 47ae45 GetTickCount 52730->52731 52731->52729 52732 47ae53 Sleep 52731->52732 52732->52726 52733 48b890 52734 48b8e1 52733->52734 52735 48b90d 52734->52735 52736 48b8e3 52734->52736 52739 48b91c 52735->52739 52740 48b946 52735->52740 52737 4464b8 18 API calls 52736->52737 52738 48b8f0 52737->52738 53410 451f88 GetFileAttributesA Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection GetLastError 52738->53410 52742 4464b8 18 API calls 52739->52742 52747 48b97f 52740->52747 52748 48b955 52740->52748 52744 48b929 52742->52744 52743 48b8fd 53411 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52743->53411 53412 451b68 11 API calls 52744->53412 52755 48b98e 52747->52755 52756 48b9f3 52747->52756 52750 4464b8 18 API calls 52748->52750 52749 48b936 53413 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52749->53413 52751 48b962 52750->52751 52754 451bd8 11 API calls 52751->52754 52752 403420 4 API calls 52757 48ceca 52752->52757 52758 48b96f 52754->52758 52759 4464b8 18 API calls 52755->52759 52764 48ba78 52756->52764 52765 48ba02 52756->52765 52760 403420 4 API calls 52757->52760 53414 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52758->53414 52762 48b99d 52759->52762 52763 48ced7 52760->52763 52766 4464b8 18 API calls 52762->52766 52767 403400 4 API calls 52763->52767 52774 48bae3 52764->52774 52775 48ba87 52764->52775 52768 44645c 18 API calls 52765->52768 52769 48b9b4 52766->52769 52770 48cedf 52767->52770 52771 48ba0e 52768->52771 52772 4464b8 18 API calls 52769->52772 52773 44645c 18 API calls 52771->52773 52776 48b9c7 52772->52776 52777 48ba1b 52773->52777 52784 48bb3f 52774->52784 52785 48baf2 52774->52785 52778 4464b8 18 API calls 52775->52778 52779 4464b8 18 API calls 52776->52779 52781 4464b8 18 API calls 52777->52781 52782 48ba96 52778->52782 52780 48b9d8 52779->52780 53415 42cc70 6 API calls 52780->53415 52786 48ba2b 52781->52786 52787 4464b8 18 API calls 52782->52787 52798 48bb4e 52784->52798 52799 48bb87 52784->52799 52790 4464b8 18 API calls 52785->52790 52791 4464b8 18 API calls 52786->52791 52788 48baa9 52787->52788 52793 4464b8 18 API calls 52788->52793 52789 48b9e2 53416 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52789->53416 52795 48bb01 52790->52795 52792 48ba3e 52791->52792 52796 4464b8 18 API calls 52792->52796 52797 48baba 52793->52797 52800 4464b8 18 API calls 52795->52800 52802 48ba4f 52796->52802 53419 446410 18 API calls 52797->53419 52804 4464b8 18 API calls 52798->52804 52812 48bbf6 52799->52812 52813 48bb96 52799->52813 52801 48bb14 52800->52801 52805 4464b8 18 API calls 52801->52805 52806 44645c 18 API calls 52802->52806 52808 48bb5d 52804->52808 52809 48bb25 52805->52809 52810 48ba5f 52806->52810 52807 48baca 53420 42ce08 6 API calls 52807->53420 52814 4464b8 18 API calls 52808->52814 53422 42ceb8 GetPrivateProfileStringA GetProfileStringA lstrcmp 52809->53422 53417 42cd74 6 API calls 52810->53417 52827 48bc61 52812->52827 52828 48bc05 52812->52828 52818 4464b8 18 API calls 52813->52818 52819 48bb6e 52814->52819 52817 48bad3 53421 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52817->53421 52823 48bba5 52818->52823 53424 42cf04 GetPrivateProfileStringA GetProfileStringA 52819->53424 52820 48bb2f 53423 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52820->53423 52821 48ba68 53418 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52821->53418 52830 4464b8 18 API calls 52823->52830 52825 48bb77 53425 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52825->53425 52836 48bccc 52827->52836 52837 48bc70 52827->52837 52832 4464b8 18 API calls 52828->52832 52833 48bbb8 52830->52833 52834 48bc14 52832->52834 52835 4464b8 18 API calls 52833->52835 52838 4464b8 18 API calls 52834->52838 52839 48bbcb 52835->52839 52846 48bd1a 52836->52846 52847 48bcdb 52836->52847 52840 4464b8 18 API calls 52837->52840 52841 48bc27 52838->52841 52842 4464b8 18 API calls 52839->52842 52843 48bc7f 52840->52843 52844 4464b8 18 API calls 52841->52844 52845 48bbdc 52842->52845 52848 4464b8 18 API calls 52843->52848 52849 48bc38 52844->52849 53426 42cf74 WritePrivateProfileStringA WriteProfileStringA 52845->53426 52859 48bd29 52846->52859 52865 48bd54 52846->52865 52852 4464b8 18 API calls 52847->52852 52853 48bc92 52848->52853 52854 44645c 18 API calls 52849->52854 52851 48bbe6 53427 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52851->53427 52856 48bcea 52852->52856 52857 4464b8 18 API calls 52853->52857 52858 48bc48 52854->52858 52860 4464b8 18 API calls 52856->52860 52861 48bca3 52857->52861 53428 42cfe4 21 API calls 52858->53428 52864 4464b8 18 API calls 52859->52864 52866 48bcfb 52860->52866 53430 446410 18 API calls 52861->53430 52863 48bc51 53429 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52863->53429 52869 48bd36 52864->52869 52874 48bd8c 52865->52874 52875 48bd63 52865->52875 52870 4464b8 18 API calls 52866->52870 52873 4464b8 18 API calls 52869->52873 52876 48bd0b 52870->52876 52871 48bcb3 53431 42d044 21 API calls 52871->53431 52872 48b908 52872->52752 52879 48bd46 52873->52879 52885 48bd9b 52874->52885 52886 48bdb4 52874->52886 52880 4464b8 18 API calls 52875->52880 53433 42d05c WritePrivateProfileStringA WriteProfileStringA 52876->53433 52878 48bcbc 53432 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52878->53432 53434 42d0a8 WritePrivateProfileStringA WriteProfileStringA 52879->53434 52884 48bd70 52880->52884 52887 42d0e4 5 API calls 52884->52887 53436 42d208 LocalAlloc TlsSetValue TlsGetValue TlsGetValue GetCommandLineA 52885->53436 52893 48bdd8 52886->52893 52894 48bdc3 52886->52894 52888 48bd7b 52887->52888 53435 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52888->53435 52891 48bda3 53437 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52891->53437 52898 48be0a 52893->52898 52899 48bde7 52893->52899 52895 42d2cc 5 API calls 52894->52895 52896 48bdc8 52895->52896 53438 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52896->53438 52902 48be19 52898->52902 52903 48be42 52898->52903 52900 44645c 18 API calls 52899->52900 52901 48bdf1 52900->52901 52904 42d328 6 API calls 52901->52904 52905 4464b8 18 API calls 52902->52905 52910 48be7a 52903->52910 52911 48be51 52903->52911 52906 48bdf9 52904->52906 52907 48be26 52905->52907 53439 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52906->53439 52909 42c36c 5 API calls 52907->52909 52912 48be31 52909->52912 52916 48be89 52910->52916 52917 48beb2 52910->52917 52913 4464b8 18 API calls 52911->52913 53440 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52912->53440 52915 48be5e 52913->52915 53441 42ca44 LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 52915->53441 52919 4464b8 18 API calls 52916->52919 52924 48beea 52917->52924 52925 48bec1 52917->52925 52921 48be96 52919->52921 52920 48be69 53442 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52920->53442 52923 42ca9c 6 API calls 52921->52923 52926 48bea1 52923->52926 52931 48bef9 52924->52931 52932 48bf22 52924->52932 52927 4464b8 18 API calls 52925->52927 53443 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52926->53443 52928 48bece 52927->52928 53444 42d3c4 6 API calls 52928->53444 52934 4464b8 18 API calls 52931->52934 52937 48bf5f 52932->52937 52938 48bf31 52932->52938 52933 48bed9 53445 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52933->53445 52936 48bf06 52934->52936 53446 42d41c LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 52936->53446 52945 48bf6e 52937->52945 52946 48bf87 52937->52946 52940 4464b8 18 API calls 52938->52940 52942 48bf3e 52940->52942 52941 48bf11 53447 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52941->53447 53448 451d40 8 API calls 52942->53448 52948 42d774 GetWindowsDirectoryA 52945->52948 52951 48bfaf 52946->52951 52952 48bf96 52946->52952 52947 48bf4e 53449 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52947->53449 52950 48bf76 52948->52950 53450 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52950->53450 52957 48bfbe 52951->52957 52958 48bfd7 52951->52958 52954 42d7a0 GetSystemDirectoryA 52952->52954 52955 48bf9e 52954->52955 53451 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52955->53451 52959 42d7cc 6 API calls 52957->52959 52961 48bfff 52958->52961 52962 48bfe6 52958->52962 52960 48bfc6 52959->52960 53452 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52960->53452 52967 48c00e 52961->52967 52968 48c066 52961->52968 52964 42d850 10 API calls 52962->52964 52965 48bfee 52964->52965 53453 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52965->53453 52969 4464b8 18 API calls 52967->52969 52971 48c0da 52968->52971 52972 48c075 52968->52972 52970 48c01b 52969->52970 52973 4464b8 18 API calls 52970->52973 52979 48c0e9 52971->52979 52980 48c0fe 52971->52980 52975 4464b8 18 API calls 52972->52975 52974 48c02a 52973->52974 52976 4464b8 18 API calls 52974->52976 52977 48c082 52975->52977 52978 48c03d 52976->52978 53457 446410 18 API calls 52977->53457 53454 42da00 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 52978->53454 53461 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52979->53461 52989 48c10d 52980->52989 52990 48c181 52980->52990 52982 48c08e 52984 4464b8 18 API calls 52982->52984 52987 48c09e 52984->52987 52985 48c049 53455 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52985->53455 52991 4464b8 18 API calls 52987->52991 52993 4464b8 18 API calls 52989->52993 52999 48c190 52990->52999 53000 48c1c2 52990->53000 52994 48c0b1 52991->52994 52992 48c054 53456 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 52992->53456 52996 48c11a 52993->52996 53458 42d948 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 52994->53458 53462 42c528 7 API calls 52996->53462 53003 4464b8 18 API calls 52999->53003 53009 48c23f 53000->53009 53010 48c1d1 53000->53010 53001 48c0bd 53459 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53001->53459 53002 48c128 53005 48c12c 53002->53005 53006 48c171 53002->53006 53007 48c19d 53003->53007 53463 446410 18 API calls 53005->53463 53466 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53006->53466 53467 42d474 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53007->53467 53023 48c2e1 53009->53023 53024 48c252 53009->53024 53014 44645c 18 API calls 53010->53014 53011 48c0c8 53460 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53011->53460 53018 48c1db 53014->53018 53016 48c138 53019 4464b8 18 API calls 53016->53019 53017 48c1a5 53468 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53017->53468 53022 48b608 4 API calls 53018->53022 53025 48c14b 53019->53025 53021 48c1b0 53469 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53021->53469 53028 48c1e6 53022->53028 53034 48c33c 53023->53034 53035 48c2f0 53023->53035 53029 44645c 18 API calls 53024->53029 53464 451a68 Wow64DisableWow64FsRedirection SetLastError Wow64RevertWow64FsRedirection 6D167310 GetLastError 53025->53464 53031 4464b8 18 API calls 53028->53031 53032 48c25c 53029->53032 53030 48c15b 53465 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53030->53465 53036 48c1f5 53031->53036 53037 48b608 4 API calls 53032->53037 53043 48c34b 53034->53043 53044 48c397 53034->53044 53038 44645c 18 API calls 53035->53038 53046 42dc54 6D167FA0 53036->53046 53039 48c267 53037->53039 53040 48c2fa 53038->53040 53041 4464b8 18 API calls 53039->53041 53045 48b608 4 API calls 53040->53045 53042 48c276 53041->53042 53055 42dc54 6D167FA0 53042->53055 53048 44645c 18 API calls 53043->53048 53056 48c3aa 53044->53056 53057 48c43c 53044->53057 53049 48c305 53045->53049 53047 48c212 53046->53047 53050 48c22f 53047->53050 53051 48c216 53047->53051 53052 48c355 53048->53052 53053 4464b8 18 API calls 53049->53053 53471 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53050->53471 53470 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53051->53470 53059 48b608 4 API calls 53052->53059 53060 48c314 53053->53060 53062 48c293 53055->53062 53063 44645c 18 API calls 53056->53063 53072 48c4a9 53057->53072 53073 48c44b 53057->53073 53064 48c360 53059->53064 53475 42dcf8 10 API calls 53060->53475 53061 48c221 6D167B60 53061->52872 53065 48c2d1 53062->53065 53066 48c297 53062->53066 53067 48c3b4 53063->53067 53068 4464b8 18 API calls 53064->53068 53474 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53065->53474 53069 4464b8 18 API calls 53066->53069 53070 48b608 4 API calls 53067->53070 53071 48c36f 53068->53071 53076 48c2a6 53069->53076 53077 48c3bf 53070->53077 53477 42de34 6 API calls 53071->53477 53085 48c4b8 53072->53085 53086 48c516 53072->53086 53078 44645c 18 API calls 53073->53078 53472 42db9c RegQueryValueExA RegEnumValueA 53076->53472 53080 4464b8 18 API calls 53077->53080 53081 48c455 53078->53081 53079 48c329 53476 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53079->53476 53083 48c3ce 53080->53083 53087 48b608 4 API calls 53081->53087 53098 42dc54 6D167FA0 53083->53098 53090 44645c 18 API calls 53085->53090 53094 48c5d8 53086->53094 53095 48c529 53086->53095 53100 48c460 53087->53100 53089 48c384 53478 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53089->53478 53091 48c4c2 53090->53091 53096 48b608 4 API calls 53091->53096 53092 48c2b8 53473 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53092->53473 53110 48c69a 53094->53110 53111 48c5eb 53094->53111 53396 44645c 53095->53396 53114 48c4cd 53096->53114 53102 48c3eb 53098->53102 53108 4464b8 18 API calls 53100->53108 53101 48c2c3 6D167B60 53101->52872 53104 48c42c 53102->53104 53105 48c3ef 53102->53105 53480 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53104->53480 53106 4464b8 18 API calls 53105->53106 53112 48c3fe 53106->53112 53115 48c48b 53108->53115 53125 48c6ad 53110->53125 53126 48c777 53110->53126 53116 44645c 18 API calls 53111->53116 53121 48c406 6D167ED0 53112->53121 53123 4464b8 18 API calls 53114->53123 53481 48b6dc 9 API calls 53115->53481 53117 48c5f5 53116->53117 53120 48b608 4 API calls 53117->53120 53127 48c600 53120->53127 53479 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53121->53479 53122 48c54d 53138 42dc54 6D167FA0 53122->53138 53129 48c4f8 53123->53129 53124 48c499 53482 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53124->53482 53131 44645c 18 API calls 53125->53131 53140 48c78a 53126->53140 53141 48c896 53126->53141 53132 4464b8 18 API calls 53127->53132 53483 48b6dc 9 API calls 53129->53483 53136 48c6b7 53131->53136 53137 48c60f 53132->53137 53133 48c41e 6D167B60 53133->52872 53135 48c4a4 53135->52872 53142 48b608 4 API calls 53136->53142 53154 42dc54 6D167FA0 53137->53154 53144 48c56a 53138->53144 53139 48c506 53484 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53139->53484 53146 44645c 18 API calls 53140->53146 53152 48c8a9 53141->53152 53153 48c9ad 53141->53153 53143 48c6c2 53142->53143 53147 4464b8 18 API calls 53143->53147 53148 48c5c8 53144->53148 53149 48c56e 53144->53149 53150 48c794 53146->53150 53151 48c6d1 53147->53151 53487 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53148->53487 53156 4464b8 18 API calls 53149->53156 53157 48b608 4 API calls 53150->53157 53168 42dc54 6D167FA0 53151->53168 53158 44645c 18 API calls 53152->53158 53172 48ca8e 53153->53172 53173 48c9c0 53153->53173 53159 48c62c 53154->53159 53160 48c57d 53156->53160 53161 48c79f 53157->53161 53163 48c8b3 53158->53163 53164 48c68a 53159->53164 53165 48c630 53159->53165 53166 4464b8 18 API calls 53160->53166 53162 4464b8 18 API calls 53161->53162 53167 48c7ae 53162->53167 53170 48b608 4 API calls 53163->53170 53491 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53164->53491 53171 4464b8 18 API calls 53165->53171 53174 48c58e 53166->53174 53185 42dc54 6D167FA0 53167->53185 53175 48c6ee 53168->53175 53176 48c8be 53170->53176 53177 48c63f 53171->53177 53190 48cb98 53172->53190 53191 48caa1 53172->53191 53178 44645c 18 API calls 53173->53178 53184 42db84 6 API calls 53174->53184 53179 48c6f2 53175->53179 53180 48c767 53175->53180 53181 4464b8 18 API calls 53176->53181 53182 4464b8 18 API calls 53177->53182 53183 48c9ca 53178->53183 53187 4464b8 18 API calls 53179->53187 53495 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53180->53495 53188 48c8cd 53181->53188 53189 48c650 53182->53189 53192 48b608 4 API calls 53183->53192 53193 48c5a3 53184->53193 53194 48c7cb 53185->53194 53195 48c701 53187->53195 53501 42dc1c 6D167C60 53188->53501 53488 42db90 6 API calls 53189->53488 53208 48cbab 53190->53208 53209 48cc6c 53190->53209 53196 44645c 18 API calls 53191->53196 53197 48c9d5 53192->53197 53485 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53193->53485 53200 48c7d3 53194->53200 53201 48c886 53194->53201 53211 48c71e RegQueryValueExA 53195->53211 53202 48caab 53196->53202 53198 4464b8 18 API calls 53197->53198 53206 48c9e4 53198->53206 53210 4464b8 18 API calls 53200->53210 53500 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53201->53500 53205 48b608 4 API calls 53202->53205 53214 48cab6 53205->53214 53505 42dc1c 6D167C60 53206->53505 53207 48c5ae 53486 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53207->53486 53216 44645c 18 API calls 53208->53216 53232 48cd4c 53209->53232 53233 48cc7f 53209->53233 53217 48c7e2 53210->53217 53218 48c72c 53211->53218 53219 48c74e 53211->53219 53213 48c665 53489 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53213->53489 53224 4464b8 18 API calls 53214->53224 53227 48cbb5 53216->53227 53238 48c7f6 RegQueryValueExA 53217->53238 53218->53219 53228 48c732 53218->53228 53494 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53219->53494 53220 48c8f2 53221 48c8fa 53220->53221 53222 48c99d 53220->53222 53229 4464b8 18 API calls 53221->53229 53504 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53222->53504 53231 48cac5 53224->53231 53226 48c5ba 6D167B60 53226->52872 53237 48b608 4 API calls 53227->53237 53492 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53228->53492 53240 48c909 53229->53240 53230 48c670 53490 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53230->53490 53509 42dc1c 6D167C60 53231->53509 53259 48cd5b 53232->53259 53260 48cd70 53232->53260 53242 44645c 18 API calls 53233->53242 53235 48c759 6D167B60 53235->52872 53244 48cbc0 53237->53244 53245 48c86d 53238->53245 53246 48c804 53238->53246 53249 4464b8 18 API calls 53240->53249 53251 48cc89 53242->53251 53243 48ca09 53252 48ca0d 53243->53252 53253 48ca7e 53243->53253 53254 4464b8 18 API calls 53244->53254 53499 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53245->53499 53246->53245 53255 48c80a 53246->53255 53247 48c741 53493 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53247->53493 53258 48c918 53249->53258 53250 48c67c 6D167B60 53250->52872 53262 48b608 4 API calls 53251->53262 53263 4464b8 18 API calls 53252->53263 53508 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53253->53508 53265 48cbcf 53254->53265 53266 4038a4 4 API calls 53255->53266 53257 48c74c 53257->53235 53273 48c92a RegQueryValueExA 53258->53273 53268 42e0d8 19 API calls 53259->53268 53285 48cd7f 53260->53285 53286 48cd94 53260->53286 53270 48cc94 53262->53270 53271 48ca1c 53263->53271 53513 42dc1c 6D167C60 53265->53513 53272 48c815 53266->53272 53267 48c878 6D167B60 53267->52872 53274 48cd60 53268->53274 53269 48caea 53275 48cb88 53269->53275 53276 48caf2 53269->53276 53277 4464b8 18 API calls 53270->53277 53278 4464b8 18 API calls 53271->53278 53279 403744 4 API calls 53272->53279 53302 48c93a 53273->53302 53522 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53274->53522 53512 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53275->53512 53283 4464b8 18 API calls 53276->53283 53284 48cca3 53277->53284 53304 48ca2b 53278->53304 53281 48c821 53279->53281 53293 48c830 RegQueryValueExA 53281->53293 53288 48cb01 53283->53288 53517 42dc1c 6D167C60 53284->53517 53523 42e0e4 19 API calls 53285->53523 53300 48cdc8 53286->53300 53301 48cda3 53286->53301 53294 4464b8 18 API calls 53288->53294 53290 48cbf4 53291 48cbf8 53290->53291 53292 48cc5c 53290->53292 53297 4464b8 18 API calls 53291->53297 53516 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53292->53516 53298 48c83e 53293->53298 53299 48c860 53293->53299 53330 48cb10 53294->53330 53295 48cd84 53524 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53295->53524 53306 48cc07 53297->53306 53298->53299 53307 48c844 53298->53307 53498 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53299->53498 53323 48cded 53300->53323 53324 48cdd7 53300->53324 53308 4464b8 18 API calls 53301->53308 53315 48c962 6D168150 53302->53315 53319 48ca4a 6D168150 53304->53319 53311 44645c 18 API calls 53306->53311 53496 48a61c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53307->53496 53313 48cdb0 53308->53313 53310 48ccc8 53316 48cd3c 53310->53316 53317 48cccc 53310->53317 53320 48cc13 53311->53320 53525 42e13c 73F7A570 EnumFontsA 73F7A480 53313->53525 53314 48c85e 53314->53267 53325 48c984 53315->53325 53326 48c977 53315->53326 53521 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53316->53521 53327 4464b8 18 API calls 53317->53327 53332 48ca58 53319->53332 53333 48ca65 53319->53333 53345 48cc28 6D168150 53320->53345 53321 48c853 53497 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53321->53497 53351 48cdfc 53323->53351 53352 48ce25 53323->53352 53527 42e238 11 API calls 53324->53527 53503 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53325->53503 53502 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53326->53502 53331 48ccdb 53327->53331 53335 48cb35 53330->53335 53340 40357c 4 API calls 53330->53340 53518 48a604 18 API calls 53331->53518 53506 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53332->53506 53507 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53333->53507 53357 48cb54 6D168150 53335->53357 53337 48cdb8 53526 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53337->53526 53338 48cddc 53528 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53338->53528 53339 48c982 53343 48c98f 6D167B60 53339->53343 53340->53335 53343->52872 53353 48cc43 53345->53353 53354 48cc36 53345->53354 53348 48ccea 53366 403744 4 API calls 53348->53366 53349 48ca63 53350 48ca70 6D167B60 53349->53350 53350->52872 53355 4464b8 18 API calls 53351->53355 53365 48ce34 53352->53365 53378 48ce66 53352->53378 53515 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53353->53515 53514 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53354->53514 53359 48ce09 53355->53359 53361 48cb6f 53357->53361 53362 48cb62 53357->53362 53529 42e4cc LocalAlloc TlsSetValue TlsGetValue TlsGetValue CharPrevA 53359->53529 53360 48cc41 53363 48cc4e 6D167B60 53360->53363 53511 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53361->53511 53510 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53362->53510 53363->52872 53369 4464b8 18 API calls 53365->53369 53370 48ccfb 53366->53370 53375 48ce41 53369->53375 53377 48cd08 6D168150 53370->53377 53371 48ce14 53530 44680c LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53371->53530 53372 48cb6d 53373 48cb7a 6D167B60 53372->53373 53373->52872 53376 44645c 18 API calls 53375->53376 53379 48ce51 53376->53379 53380 48cd23 53377->53380 53381 48cd16 53377->53381 53378->52872 53382 4464b8 18 API calls 53378->53382 53531 42c3b4 IsDBCSLeadByte 53379->53531 53520 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53380->53520 53519 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53381->53519 53386 48ce82 53382->53386 53533 446410 18 API calls 53386->53533 53388 48ce59 53532 446738 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53388->53532 53389 48cd21 53390 48cd2e 6D167B60 53389->53390 53390->52872 53391 48ce92 53534 4520ec 9 API calls 53391->53534 53394 48ce9f 53535 446590 LocalAlloc TlsSetValue TlsGetValue TlsGetValue VariantClear 53394->53535 53397 446460 53396->53397 53536 43545c 53397->53536 53399 44647a 53400 48b608 53399->53400 53401 48b619 53400->53401 53404 48b631 53401->53404 53550 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53401->53550 53403 48b639 53406 4464b8 53403->53406 53404->53403 53551 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53404->53551 53407 4464c0 53406->53407 53552 435538 53407->53552 53409 4464df 53409->53122 53410->52743 53411->52872 53412->52749 53413->52872 53414->52872 53415->52789 53416->52872 53417->52821 53418->52872 53419->52807 53420->52817 53421->52872 53422->52820 53423->52872 53424->52825 53425->52872 53426->52851 53427->52872 53428->52863 53429->52872 53430->52871 53431->52878 53432->52872 53433->52872 53434->52872 53435->52872 53436->52891 53437->52872 53438->52872 53439->52872 53440->52872 53441->52920 53442->52872 53443->52872 53444->52933 53445->52872 53446->52941 53447->52872 53448->52947 53449->52872 53450->52872 53451->52872 53452->52872 53453->52872 53454->52985 53455->52992 53456->52872 53457->52982 53458->53001 53459->53011 53460->52872 53461->52872 53462->53002 53463->53016 53464->53030 53465->52872 53466->52872 53467->53017 53468->53021 53469->52872 53470->53061 53471->52872 53472->53092 53473->53101 53474->52872 53475->53079 53476->52872 53477->53089 53478->52872 53479->53133 53480->52872 53481->53124 53482->53135 53483->53139 53484->53135 53485->53207 53486->53226 53487->52872 53488->53213 53489->53230 53490->53250 53491->52872 53492->53247 53493->53257 53494->53235 53495->52872 53496->53321 53497->53314 53498->53314 53499->53267 53500->52872 53501->53220 53502->53339 53503->53343 53504->52872 53505->53243 53506->53349 53507->53350 53508->52872 53509->53269 53510->53372 53511->53373 53512->52872 53513->53290 53514->53360 53515->53363 53516->52872 53517->53310 53518->53348 53519->53389 53520->53390 53521->52872 53522->52872 53523->53295 53524->52872 53525->53337 53526->52872 53527->53338 53528->53135 53529->53371 53530->52872 53531->53388 53532->52872 53533->53391 53534->53394 53535->52872 53538 435487 53536->53538 53539 435465 53536->53539 53537 435506 53549 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53537->53549 53538->53537 53540 4354da 53538->53540 53541 4354fd 53538->53541 53539->53538 53547 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53539->53547 53540->53399 53548 403f90 18 API calls 53541->53548 53545 435517 53545->53399 53546 435504 53546->53399 53547->53538 53548->53546 53549->53545 53550->53404 53551->53403 53553 435544 53552->53553 53570 435566 53552->53570 53553->53570 53572 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53553->53572 53554 4355e9 53574 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 53554->53574 53555 4355d1 53563 403494 4 API calls 53555->53563 53556 4355b9 53562 403510 4 API calls 53556->53562 53557 4355ad 53561 403510 4 API calls 53557->53561 53558 4355dd 53573 4040e8 18 API calls 53558->53573 53566 4355b6 53561->53566 53567 4355c2 53562->53567 53569 4355da 53563->53569 53565 4355e6 53565->53409 53566->53409 53567->53409 53568 4355c5 53568->53409 53569->53409 53570->53554 53570->53555 53570->53556 53570->53557 53570->53558 53570->53568 53571 4355fa 53571->53409 53572->53570 53573->53565 53574->53571 50339 404d2a 50346 404d3a 50339->50346 50340 404e07 ExitProcess 50341 404de0 50355 404cf0 50341->50355 50342 404e12 50345 404cf0 4 API calls 50347 404df4 50345->50347 50346->50340 50346->50341 50346->50342 50348 404db7 MessageBoxA 50346->50348 50349 404dcc 50346->50349 50359 401a90 50347->50359 50348->50341 50371 40500c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50349->50371 50352 404df9 50352->50340 50352->50342 50356 404cfe 50355->50356 50358 404d13 50356->50358 50372 402728 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50356->50372 50358->50345 50360 401aa1 50359->50360 50361 401b6f 50359->50361 50362 401ac2 LocalFree 50360->50362 50363 401ab8 RtlEnterCriticalSection 50360->50363 50361->50352 50364 401af5 50362->50364 50363->50362 50365 401ae3 VirtualFree 50364->50365 50366 401afd 50364->50366 50365->50364 50367 401b24 LocalFree 50366->50367 50368 401b3b 50366->50368 50367->50367 50367->50368 50369 401b53 RtlLeaveCriticalSection 50368->50369 50370 401b5d RtlDeleteCriticalSection 50368->50370 50369->50370 50370->50352 50372->50358 50373 47c00c 50374 47c257 50373->50374 50375 47c023 50373->50375 50376 403744 4 API calls 50375->50376 50377 47c042 50376->50377 50424 4506e8 50377->50424 50381 47c05a 50450 403acc 50381->50450 50384 47c0fd 50386 47c10a 50384->50386 50387 47c119 50384->50387 50385 47c082 GetACP 50385->50384 50388 47c08e 50385->50388 50389 403450 4 API calls 50386->50389 50390 403450 4 API calls 50387->50390 50388->50384 50459 42e13c 73F7A570 EnumFontsA 73F7A480 50388->50459 50391 47c117 50389->50391 50390->50391 50394 47c12f 50391->50394 50395 47c13e 50391->50395 50393 47c0a4 50393->50384 50398 403450 4 API calls 50393->50398 50396 403450 4 API calls 50394->50396 50397 403450 4 API calls 50395->50397 50399 47c13c 50396->50399 50397->50399 50402 47c0b5 50398->50402 50400 47c154 50399->50400 50401 47c163 50399->50401 50403 403450 4 API calls 50400->50403 50404 403450 4 API calls 50401->50404 50402->50384 50405 403450 4 API calls 50402->50405 50407 47c161 50403->50407 50404->50407 50406 47c0d5 50405->50406 50408 403450 4 API calls 50406->50408 50454 42ec4c 50407->50454 50409 47c0e9 50408->50409 50410 403450 4 API calls 50409->50410 50410->50384 50412 47c18e 50413 42ec4c 4 API calls 50412->50413 50414 47c1a1 50413->50414 50415 42ec4c 4 API calls 50414->50415 50416 47c1b4 50415->50416 50417 42ec4c 4 API calls 50416->50417 50418 47c1c7 50417->50418 50419 424234 5 API calls 50418->50419 50422 47c1d7 50419->50422 50420 47c238 50420->50374 50421 47c241 SendNotifyMessageA 50420->50421 50421->50374 50422->50420 50423 403450 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50422->50423 50423->50422 50425 4506f6 50424->50425 50427 45070e 50425->50427 50460 450680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50425->50460 50429 450732 50427->50429 50461 450680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50427->50461 50430 450070 InterlockedExchange 50429->50430 50431 45074d 50430->50431 50434 450760 50431->50434 50462 450680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50431->50462 50435 4034e0 4 API calls 50434->50435 50436 45078f 50434->50436 50463 450680 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50434->50463 50435->50434 50437 403ac0 50436->50437 50438 403a38 50437->50438 50439 403a5c 50438->50439 50440 403a72 50438->50440 50443 403a57 50438->50443 50444 403a8c 50438->50444 50441 403a74 50439->50441 50442 403a6d 50439->50442 50440->50381 50446 403420 4 API calls 50441->50446 50445 403400 4 API calls 50442->50445 50443->50439 50449 403aa8 50443->50449 50444->50440 50464 403a38 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50444->50464 50445->50440 50446->50440 50449->50440 50465 403a10 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50449->50465 50451 403ade 50450->50451 50453 403af0 50451->50453 50466 403b74 50451->50466 50453->50384 50453->50385 50475 4074ac 50454->50475 50458 42ec78 50458->50412 50459->50393 50460->50427 50461->50429 50462->50434 50463->50434 50464->50444 50465->50449 50467 403af4 50466->50467 50468 403b0e 50467->50468 50470 403b31 50467->50470 50472 403b22 50467->50472 50468->50472 50474 403af4 6 API calls 50468->50474 50470->50472 50473 4047e8 6 API calls 50470->50473 50472->50451 50473->50470 50474->50472 50476 4074b0 50475->50476 50477 4074ba 50475->50477 50480 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50476->50480 50477->50458 50479 407480 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50477->50479 50479->50458 50480->50477 50481 47e6eb 50482 47e6f4 50481->50482 50485 47e71f 50481->50485 50484 47e711 50482->50484 50482->50485 50483 47e75e 50486 47e771 50483->50486 50487 47e77e 50483->50487 50817 474fe4 184 API calls 50484->50817 50485->50483 50818 47d0f8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50485->50818 50490 47e775 50486->50490 50491 47e7b3 50486->50491 50493 47e787 50487->50493 50494 47e798 50487->50494 50496 47e779 50490->50496 50503 47e7f6 50490->50503 50504 47e811 50490->50504 50499 47e7d7 50491->50499 50500 47e7bc 50491->50500 50492 47e716 50492->50485 50505 408b48 5 API calls 50492->50505 50820 47d294 37 API calls 50493->50820 50821 47d304 37 API calls 50494->50821 50495 47e751 50819 47d294 37 API calls 50495->50819 50509 47e83a 50496->50509 50510 47e858 50496->50510 50823 47d304 37 API calls 50499->50823 50822 47d304 37 API calls 50500->50822 50824 47d304 37 API calls 50503->50824 50825 47d304 37 API calls 50504->50825 50505->50485 50512 47e84f 50509->50512 50826 47d294 37 API calls 50509->50826 50828 47cf90 24 API calls 50510->50828 50827 47cf90 24 API calls 50512->50827 50514 47e856 50516 47e86e 50514->50516 50517 47e868 50514->50517 50518 47e86c 50516->50518 50520 47d270 37 API calls 50516->50520 50517->50518 50522 47d270 37 API calls 50517->50522 50602 47a7b4 50518->50602 50520->50518 50522->50518 50527 47e8af 50529 47e8bf 50527->50529 50743 47d644 50527->50743 50762 47d9e4 50529->50762 50532 47e8c5 50533 47ea15 50532->50533 50767 49273c 50532->50767 50535 47d900 18 API calls 50533->50535 50537 47ea1f 50535->50537 50832 47a49c 42 API calls 50537->50832 50542 47ea34 50545 403450 4 API calls 50542->50545 50547 47ea44 50545->50547 50833 47a49c 42 API calls 50547->50833 50550 47ea54 50553 403450 4 API calls 50550->50553 50555 47ea64 50553->50555 50834 47a49c 42 API calls 50555->50834 50557 47ea74 50559 403450 4 API calls 50557->50559 50561 47ea84 50559->50561 50835 47a49c 42 API calls 50561->50835 50565 47ea94 50566 403450 4 API calls 50565->50566 50567 47eaa4 50566->50567 50836 465734 20 API calls 50567->50836 50569 47eab1 50837 42e814 GetModuleHandleA 6D166DE0 MultiByteToWideChar GetModuleHandleA 6D166DE0 50569->50837 50574 47eac4 50575 408b48 5 API calls 50574->50575 50577 47eb08 50574->50577 50838 450640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50574->50838 50839 47cc24 37 API calls 50574->50839 50840 454454 7 API calls 50574->50840 50575->50574 50579 47eb88 50577->50579 50841 4778e8 19 API calls 50577->50841 50842 474ce4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50577->50842 50578 47ef24 50581 403420 4 API calls 50578->50581 50600 47ec48 50579->50600 50843 4778e8 19 API calls 50579->50843 50844 474ce4 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50579->50844 50580 47ee59 50594 47eeaa 50580->50594 50850 47b558 19 API calls 50580->50850 50584 47ef4e 50581->50584 50586 403400 4 API calls 50584->50586 50588 47ef56 50586->50588 50589 403420 4 API calls 50588->50589 50593 47ef63 50589->50593 50592 42d328 6 API calls 50592->50600 50595 403420 4 API calls 50593->50595 50594->50578 50851 47b63c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50594->50851 50597 47ef70 50595->50597 50600->50580 50600->50592 50845 47a49c 42 API calls 50600->50845 50846 42c808 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50600->50846 50847 42c830 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50600->50847 50848 477b1c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50600->50848 50849 47da6c 13 API calls 50600->50849 50852 42d774 GetWindowsDirectoryA 50602->50852 50604 47a7d2 50605 403450 4 API calls 50604->50605 50606 47a7df 50605->50606 50854 42d7a0 GetSystemDirectoryA 50606->50854 50608 47a7e7 50609 403450 4 API calls 50608->50609 50610 47a7f4 50609->50610 50856 42d7cc 50610->50856 50612 47a7fc 50613 403450 4 API calls 50612->50613 50614 47a809 50613->50614 50615 47a812 50614->50615 50616 47a82e 50614->50616 50879 42d0e4 50615->50879 50618 403400 4 API calls 50616->50618 50619 47a82c 50618->50619 50621 47a873 50619->50621 50887 42c7a8 LocalAlloc TlsSetValue TlsGetValue TlsGetValue IsDBCSLeadByte 50619->50887 50860 47a63c 50621->50860 50622 403450 4 API calls 50622->50619 50625 47a84e 50627 403450 4 API calls 50625->50627 50629 47a85b 50627->50629 50628 403450 4 API calls 50630 47a88f 50628->50630 50629->50621 50633 403450 4 API calls 50629->50633 50631 47a8ad 50630->50631 50634 4035c0 4 API calls 50630->50634 50632 47a63c 9 API calls 50631->50632 50635 47a8bc 50632->50635 50633->50621 50634->50631 50636 403450 4 API calls 50635->50636 50637 47a8c9 50636->50637 50638 47a8f1 50637->50638 50639 42c36c 5 API calls 50637->50639 50640 47a958 50638->50640 50644 47a63c 9 API calls 50638->50644 50641 47a8df 50639->50641 50642 47a982 50640->50642 50643 47a961 50640->50643 50645 4035c0 4 API calls 50641->50645 50648 42c36c 5 API calls 50642->50648 50646 42c36c 5 API calls 50643->50646 50647 47a909 50644->50647 50645->50638 50649 47a96e 50646->50649 50650 403450 4 API calls 50647->50650 50651 47a98f 50648->50651 50653 4035c0 4 API calls 50649->50653 50654 47a916 50650->50654 50652 4035c0 4 API calls 50651->50652 50655 47a980 50652->50655 50653->50655 50656 47a929 50654->50656 50888 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50654->50888 50870 47a720 50655->50870 50657 47a63c 9 API calls 50656->50657 50660 47a938 50657->50660 50662 403450 4 API calls 50660->50662 50665 47a945 50662->50665 50663 403400 4 API calls 50664 47a9bb 50663->50664 50667 47ac10 50664->50667 50665->50640 50889 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50665->50889 50668 47ac18 50667->50668 50668->50668 50914 452c0c 50668->50914 50671 403450 4 API calls 50672 47ac45 50671->50672 50673 403494 4 API calls 50672->50673 50674 47ac52 50673->50674 50675 40357c 4 API calls 50674->50675 50676 47ac60 50675->50676 50677 4567e0 24 API calls 50676->50677 50678 47ac68 50677->50678 50679 47ac7b 50678->50679 50948 455fd4 6 API calls 50678->50948 50681 42c36c 5 API calls 50679->50681 50682 47ac88 50681->50682 50683 4035c0 4 API calls 50682->50683 50684 47ac98 50683->50684 50685 47aca2 CreateDirectoryA 50684->50685 50686 47ad08 50685->50686 50687 47acac GetLastError 50685->50687 50688 4035c0 4 API calls 50686->50688 50949 450640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50687->50949 50690 47ad1d 50688->50690 50932 47abb8 50690->50932 50691 47acc4 50950 406cd0 19 API calls 50691->50950 50694 47ad2a 50937 457408 50694->50937 50695 47acd4 50697 42e634 5 API calls 50695->50697 50699 47ace4 50697->50699 50698 47ad32 50700 47ad5b 50698->50700 50704 4035c0 4 API calls 50698->50704 50951 450610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50699->50951 50703 403420 4 API calls 50700->50703 50702 47acf9 50952 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50702->50952 50706 47ad75 50703->50706 50707 47ad48 50704->50707 50708 403420 4 API calls 50706->50708 50709 47abb8 25 API calls 50707->50709 50710 47ad82 50708->50710 50711 47ad53 50709->50711 50713 47af3c 50710->50713 50712 457474 4 API calls 50711->50712 50712->50700 50714 42c36c 5 API calls 50713->50714 50715 47af68 50714->50715 50716 4035c0 4 API calls 50715->50716 50717 47af78 50716->50717 50718 47abb8 25 API calls 50717->50718 50719 47af85 50718->50719 51106 4517c0 50719->51106 50722 47af9e 50724 4517c0 26 API calls 50722->50724 50725 47afab 50724->50725 50726 47afe4 50725->50726 50727 403494 4 API calls 50725->50727 50728 42e1b4 2 API calls 50726->50728 50727->50726 50729 47aff3 50728->50729 50730 42e1b4 2 API calls 50729->50730 50731 47b000 50730->50731 50732 47b033 6D166DE0 50731->50732 51110 40785c 19 API calls 50731->51110 50734 47b04f 50732->50734 50735 47b059 50732->50735 51112 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50734->51112 50738 403400 4 API calls 50735->50738 50736 47b02b 51111 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50736->51111 50740 47b06e 50738->50740 50741 403400 4 API calls 50740->50741 50742 47b076 50741->50742 50742->50527 50829 47d4ac 31 API calls 50742->50829 50744 42c36c 5 API calls 50743->50744 50745 47d670 50744->50745 50746 4035c0 4 API calls 50745->50746 50747 47d680 50746->50747 50748 47aadc 21 API calls 50747->50748 50749 47d68e 50748->50749 50750 42e1b4 2 API calls 50749->50750 50751 47d6a6 50750->50751 50752 47d6d9 50751->50752 51130 40785c 19 API calls 50751->51130 51128 45c0f4 6D166DE0 6D166DE0 6D166DE0 50752->51128 50755 47d6d1 51131 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50755->51131 50758 47d6f1 50760 403420 4 API calls 50758->50760 50761 47d70b 50760->50761 50761->50529 50763 47d9f5 50762->50763 50764 47da20 50763->50764 50766 47da30 50763->50766 51133 47c3ac 6 API calls 50764->51133 50766->50532 50768 492746 50767->50768 51134 44791c 50768->51134 50817->50492 50818->50495 50819->50483 50820->50496 50821->50496 50822->50496 50823->50496 50824->50496 50825->50496 50826->50512 50827->50514 50828->50514 50829->50527 50832->50542 50833->50550 50834->50557 50835->50565 50836->50569 50837->50574 50838->50574 50839->50574 50840->50574 50841->50577 50842->50577 50843->50579 50844->50579 50845->50600 50846->50600 50847->50600 50848->50600 50849->50600 50850->50580 50851->50594 50853 42d795 50852->50853 50853->50604 50855 42d7c1 50854->50855 50855->50608 50857 403400 4 API calls 50856->50857 50858 42d7dc GetModuleHandleA 6D166DE0 50857->50858 50859 42d7f5 50858->50859 50859->50612 50890 42dc54 50860->50890 50862 47a662 50863 47a688 50862->50863 50893 42db84 50862->50893 50864 403400 4 API calls 50863->50864 50866 47a68f 50864->50866 50866->50628 50868 47a67d 6D167B60 RegCloseKey 50868->50863 50869 403400 4 API calls 50869->50868 50871 47a72e 50870->50871 50872 42dc54 6D167FA0 50871->50872 50873 47a756 50872->50873 50874 47a787 50873->50874 50875 42db84 6 API calls 50873->50875 50874->50663 50876 47a76c 50875->50876 50877 42db84 6 API calls 50876->50877 50878 47a77e 6D167B60 50877->50878 50878->50874 50880 4038a4 4 API calls 50879->50880 50881 42d0f7 50880->50881 50882 42d10e GetEnvironmentVariableA 50881->50882 50886 42d121 50881->50886 50913 42da08 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50881->50913 50882->50881 50883 42d11a 50882->50883 50884 403400 4 API calls 50883->50884 50884->50886 50886->50622 50887->50625 50888->50656 50889->50640 50891 42dc65 6D167FA0 50890->50891 50892 42dc5f 50890->50892 50891->50862 50892->50891 50896 42da38 50893->50896 50897 42da5e RegQueryValueExA 50896->50897 50898 42daa3 50897->50898 50904 42da81 50897->50904 50899 403400 4 API calls 50898->50899 50901 42db6f 50899->50901 50900 42da9b 50902 403400 4 API calls 50900->50902 50901->50868 50901->50869 50902->50898 50903 4034e0 4 API calls 50903->50904 50904->50898 50904->50900 50904->50903 50905 403744 4 API calls 50904->50905 50906 42dad8 RegQueryValueExA 50905->50906 50906->50897 50907 42daf4 50906->50907 50907->50898 50908 4038a4 4 API calls 50907->50908 50909 42db36 50908->50909 50910 42db48 50909->50910 50912 403744 4 API calls 50909->50912 50911 403450 4 API calls 50910->50911 50911->50898 50912->50910 50913->50881 50917 452c2c 50914->50917 50918 452c51 CreateDirectoryA 50917->50918 50929 42e634 5 API calls 50917->50929 50953 42d850 50917->50953 50976 452998 50917->50976 50995 450640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50917->50995 50996 406cd0 19 API calls 50917->50996 50997 450610 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50917->50997 50998 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50917->50998 50919 452cc9 50918->50919 50920 452c5b GetLastError 50918->50920 50921 403494 4 API calls 50919->50921 50920->50917 50922 452cd3 50921->50922 50924 403420 4 API calls 50922->50924 50925 452ced 50924->50925 50927 403420 4 API calls 50925->50927 50928 452cfa 50927->50928 50928->50671 50929->50917 51056 40d0ac 50932->51056 50936 47abef 50936->50694 50938 457414 50937->50938 50939 45741a 50937->50939 50940 457428 50938->50940 50941 457418 50938->50941 50942 403494 4 API calls 50939->50942 50944 403494 4 API calls 50940->50944 50946 403400 4 API calls 50941->50946 50943 457426 50942->50943 50943->50698 50945 457434 50944->50945 50945->50698 50947 45743d 50946->50947 50947->50698 50948->50679 50949->50691 50950->50695 50951->50702 50952->50686 50954 42d0e4 5 API calls 50953->50954 50955 42d876 50954->50955 50956 42d882 50955->50956 51008 42cc24 50955->51008 50958 42d0e4 5 API calls 50956->50958 50961 42d8ce 50956->50961 50959 42d892 50958->50959 50960 42d89e 50959->50960 50962 42cc24 7 API calls 50959->50962 50960->50961 50964 42d0e4 5 API calls 50960->50964 50973 42d8c3 50960->50973 50999 42c6e0 50961->50999 50962->50960 50968 42d8b7 50964->50968 50965 42d774 GetWindowsDirectoryA 50965->50961 50967 42c36c 5 API calls 50969 42d8e3 50967->50969 50971 42cc24 7 API calls 50968->50971 50968->50973 50970 403494 4 API calls 50969->50970 50972 42d8ed 50970->50972 50971->50973 50974 403420 4 API calls 50972->50974 50973->50961 50973->50965 50975 42d907 50974->50975 50975->50917 50977 4529b8 50976->50977 50978 42c36c 5 API calls 50977->50978 50979 4529d1 50978->50979 50980 403494 4 API calls 50979->50980 50983 4529dc 50980->50983 50982 42ca9c 6 API calls 50982->50983 50983->50982 50984 403634 4 API calls 50983->50984 50988 452a58 50983->50988 51028 452924 50983->51028 51036 451bd8 50983->51036 51044 450640 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50983->51044 51045 408b74 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 50983->51045 50984->50983 50989 403494 4 API calls 50988->50989 50990 452a63 50989->50990 50991 403420 4 API calls 50990->50991 50992 452a7d 50991->50992 50993 403400 4 API calls 50992->50993 50994 452a85 50993->50994 50994->50917 50995->50917 50996->50917 50997->50917 50998->50917 51000 403738 50999->51000 51001 42c703 GetFullPathNameA 51000->51001 51002 42c726 51001->51002 51003 42c70f 51001->51003 51005 403494 4 API calls 51002->51005 51003->51002 51004 42c717 51003->51004 51006 4034e0 4 API calls 51004->51006 51007 42c724 51005->51007 51006->51007 51007->50967 51011 42cba8 51008->51011 51017 42ca9c 51011->51017 51013 42cbca 51014 42cbd2 GetFileAttributesA 51013->51014 51015 403400 4 API calls 51014->51015 51016 42cbef 51015->51016 51016->50956 51018 42c59c IsDBCSLeadByte 51017->51018 51019 42caad 51018->51019 51020 42cad4 51019->51020 51027 42ca20 CharPrevA 51019->51027 51022 42caea 51020->51022 51023 42cadf 51020->51023 51025 403778 4 API calls 51022->51025 51024 403494 4 API calls 51023->51024 51026 42cae8 51024->51026 51025->51026 51026->51013 51027->51019 51029 403400 4 API calls 51028->51029 51031 452945 51029->51031 51033 452972 51031->51033 51046 403510 51031->51046 51049 403800 51031->51049 51034 403400 4 API calls 51033->51034 51035 452987 51034->51035 51035->50983 51037 45190c 2 API calls 51036->51037 51038 451bee 51037->51038 51039 451bf2 51038->51039 51053 42cc38 51038->51053 51039->50983 51042 451948 Wow64RevertWow64FsRedirection 51043 451c2d 51042->51043 51043->50983 51044->50983 51045->50983 51047 4034e0 4 API calls 51046->51047 51048 40351d 51047->51048 51048->51031 51050 403804 51049->51050 51052 40382f 51049->51052 51051 4038a4 4 API calls 51050->51051 51051->51052 51052->51031 51054 42cba8 7 API calls 51053->51054 51055 42cc42 GetLastError 51054->51055 51055->51042 51057 40d0b6 51056->51057 51067 40d170 FindResourceA 51057->51067 51059 40d0e4 51060 47aadc 51059->51060 51079 40cf00 51060->51079 51062 47ab11 51063 403420 4 API calls 51062->51063 51064 47aba1 51063->51064 51065 403400 4 API calls 51064->51065 51066 47aba9 51065->51066 51066->50936 51068 40d195 51067->51068 51069 40d19c LoadResource 51067->51069 51077 40d0fc 19 API calls 51068->51077 51071 40d1b6 SizeofResource LockResource 51069->51071 51072 40d1af 51069->51072 51075 40d1d4 51071->51075 51078 40d0fc 19 API calls 51072->51078 51073 40d19b 51073->51069 51075->51059 51076 40d1b5 51076->51071 51077->51073 51078->51076 51084 40cdb0 51079->51084 51081 40cf1a 51095 40cee8 51081->51095 51083 40cf35 51083->51062 51085 40cdbd 51084->51085 51086 40cdd9 51085->51086 51087 40ce0e 51085->51087 51099 406e28 51086->51099 51103 406de8 6D1674B0 51087->51103 51090 40cde0 51092 40ce07 51090->51092 51102 408c94 19 API calls 51090->51102 51091 40ce18 51091->51092 51104 408c94 19 API calls 51091->51104 51092->51081 51096 40cef0 51095->51096 51097 40cefc 51095->51097 51105 40cc18 LocalAlloc TlsSetValue TlsGetValue TlsGetValue LoadStringA 51096->51105 51097->51083 51100 403738 51099->51100 51101 406e44 6D1674B0 51100->51101 51101->51090 51102->51092 51103->51091 51104->51092 51105->51097 51113 4516f8 51106->51113 51108 4517cd 51108->50722 51109 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51108->51109 51109->50722 51110->50736 51111->50732 51112->50735 51114 403738 51113->51114 51115 451715 752A1520 51114->51115 51116 451723 51115->51116 51117 45179a 51115->51117 51118 402648 4 API calls 51116->51118 51123 4517ad 51117->51123 51127 45151c 23 API calls 51117->51127 51119 45172a 752A1500 51118->51119 51121 451768 51119->51121 51122 45174e 752A1540 51119->51122 51126 402660 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51121->51126 51122->51121 51123->51108 51125 451792 51125->51108 51126->51125 51127->51123 51129 45c130 51128->51129 51129->50758 51132 45252c LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51129->51132 51130->50755 51131->50752 51132->50758 51133->50766 51135 447922 51134->51135 51339 446ec0 51135->51339 51138 43d0a8 51562 403b80 51138->51562 51140 43d0c5 51141 403450 4 API calls 51140->51141 51142 43d0d6 51141->51142 51143 431160 4 API calls 51142->51143 51144 43d0f1 51143->51144 51145 448038 51144->51145 51146 448052 51145->51146 51147 44803f 51145->51147 51149 43399c 4 API calls 51146->51149 51148 43d0a8 4 API calls 51147->51148 51148->51146 51150 448067 51149->51150 51151 43399c 4 API calls 51150->51151 51152 44807c 51151->51152 51153 4863a8 51152->51153 51565 44563c 51153->51565 51340 446ec6 51339->51340 51351 43342c 51340->51351 51343 403400 4 API calls 51344 446efe 51343->51344 51383 431090 51344->51383 51349 43132c 4 API calls 51350 446f3e 51349->51350 51350->51138 51352 433433 51351->51352 51353 431090 4 API calls 51352->51353 51354 433454 51353->51354 51355 431090 4 API calls 51354->51355 51356 433463 51355->51356 51357 431090 4 API calls 51356->51357 51358 433476 51357->51358 51359 431090 4 API calls 51358->51359 51360 433485 51359->51360 51361 431090 4 API calls 51360->51361 51362 433494 51361->51362 51391 44635c 51362->51391 51365 44635c 4 API calls 51366 4334b2 51365->51366 51367 431090 4 API calls 51366->51367 51368 4334ca 51367->51368 51369 431090 4 API calls 51368->51369 51370 4334d9 51369->51370 51371 431090 4 API calls 51370->51371 51372 4334e8 51371->51372 51397 43ff44 51372->51397 51377 432d4c 4 API calls 51378 43351d 51377->51378 51379 432d4c 4 API calls 51378->51379 51380 43353a 51379->51380 51381 44635c 4 API calls 51380->51381 51382 43355e 51381->51382 51382->51343 51384 431096 51383->51384 51385 402648 4 API calls 51384->51385 51386 4310c6 51385->51386 51387 43132c 51386->51387 51388 431332 51387->51388 51389 431090 4 API calls 51388->51389 51390 431353 51389->51390 51390->51349 51392 446362 51391->51392 51393 431090 4 API calls 51392->51393 51394 446377 51393->51394 51395 402648 4 API calls 51394->51395 51396 4334a3 51395->51396 51396->51365 51504 43399c 51397->51504 51400 43399c 4 API calls 51401 43ff71 51400->51401 51402 43399c 4 API calls 51401->51402 51403 43ff86 51402->51403 51404 43399c 4 API calls 51403->51404 51405 43ff9b 51404->51405 51406 43399c 4 API calls 51405->51406 51407 43ffb0 51406->51407 51408 43399c 4 API calls 51407->51408 51409 43ffc5 51408->51409 51410 43399c 4 API calls 51409->51410 51411 43ffda 51410->51411 51412 43399c 4 API calls 51411->51412 51413 43ffef 51412->51413 51414 43399c 4 API calls 51413->51414 51415 440004 51414->51415 51416 43399c 4 API calls 51415->51416 51417 440019 51416->51417 51418 43399c 4 API calls 51417->51418 51419 44002e 51418->51419 51420 43399c 4 API calls 51419->51420 51421 440043 51420->51421 51422 43399c 4 API calls 51421->51422 51423 440058 51422->51423 51424 43399c 4 API calls 51423->51424 51425 44006d 51424->51425 51426 43399c 4 API calls 51425->51426 51427 440082 51426->51427 51428 43399c 4 API calls 51427->51428 51429 440097 51428->51429 51430 43399c 4 API calls 51429->51430 51431 4400ac 51430->51431 51432 43399c 4 API calls 51431->51432 51433 4400c1 51432->51433 51434 43399c 4 API calls 51433->51434 51435 4400d6 51434->51435 51436 43399c 4 API calls 51435->51436 51437 4400eb 51436->51437 51438 43399c 4 API calls 51437->51438 51439 440100 51438->51439 51440 43399c 4 API calls 51439->51440 51441 440115 51440->51441 51442 43399c 4 API calls 51441->51442 51443 44012a 51442->51443 51444 43399c 4 API calls 51443->51444 51445 44013f 51444->51445 51446 43399c 4 API calls 51445->51446 51447 440154 51446->51447 51448 43399c 4 API calls 51447->51448 51449 440169 51448->51449 51450 43399c 4 API calls 51449->51450 51451 44017e 51450->51451 51452 43399c 4 API calls 51451->51452 51453 440193 51452->51453 51454 43399c 4 API calls 51453->51454 51455 4401a8 51454->51455 51456 43399c 4 API calls 51455->51456 51457 4401bd 51456->51457 51458 43399c 4 API calls 51457->51458 51459 4401d2 51458->51459 51460 43399c 4 API calls 51459->51460 51461 4401e7 51460->51461 51513 445f94 51461->51513 51464 445f94 4 API calls 51465 44020d 51464->51465 51466 445f94 4 API calls 51465->51466 51467 440220 51466->51467 51468 445f94 4 API calls 51467->51468 51469 440233 51468->51469 51470 445f94 4 API calls 51469->51470 51471 440246 51470->51471 51472 445f94 4 API calls 51471->51472 51473 440259 51472->51473 51474 43399c 4 API calls 51473->51474 51475 44026e 51474->51475 51476 43399c 4 API calls 51475->51476 51477 440283 51476->51477 51478 43399c 4 API calls 51477->51478 51479 440298 51478->51479 51480 43399c 4 API calls 51479->51480 51481 4402ad 51480->51481 51482 43399c 4 API calls 51481->51482 51483 4402c2 51482->51483 51484 43399c 4 API calls 51483->51484 51485 4402d7 51484->51485 51486 43399c 4 API calls 51485->51486 51487 4402ec 51486->51487 51488 43399c 4 API calls 51487->51488 51489 440301 51488->51489 51490 43399c 4 API calls 51489->51490 51491 440316 51490->51491 51492 43399c 4 API calls 51491->51492 51493 44032b 51492->51493 51494 43399c 4 API calls 51493->51494 51495 440340 51494->51495 51496 43399c 4 API calls 51495->51496 51497 440355 51496->51497 51520 43fef8 51497->51520 51500 432d4c 51501 432d53 51500->51501 51558 4461a4 51501->51558 51523 4313ac 51504->51523 51507 402648 4 API calls 51508 4339cc 51507->51508 51528 431160 51508->51528 51511 403400 4 API calls 51512 433a2a 51511->51512 51512->51400 51514 4313ac 4 API calls 51513->51514 51515 445fba 51514->51515 51536 445ff4 51515->51536 51518 403400 4 API calls 51519 4401fa 51518->51519 51519->51464 51521 43d0a8 4 API calls 51520->51521 51522 4334f2 51521->51522 51522->51500 51524 403494 4 API calls 51523->51524 51526 4313bb 51524->51526 51525 4313e5 51525->51507 51526->51525 51527 403744 4 API calls 51526->51527 51527->51526 51529 431180 51528->51529 51530 43116e 51528->51530 51532 4311a2 51529->51532 51535 431100 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51529->51535 51534 402678 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 51530->51534 51532->51511 51534->51529 51535->51532 51537 446017 51536->51537 51538 446023 51536->51538 51539 446041 51537->51539 51540 446019 51537->51540 51541 4313ac 4 API calls 51538->51541 51543 4313ac 4 API calls 51539->51543 51544 44607d 51540->51544 51545 44601d 51540->51545 51542 446030 51541->51542 51546 43399c 4 API calls 51542->51546 51547 44604e 51543->51547 51548 4313ac 4 API calls 51544->51548 51550 4313ac 4 API calls 51545->51550 51557 446021 51545->51557 51546->51557 51549 43399c 4 API calls 51547->51549 51551 44608a 51548->51551 51549->51557 51554 44606c 51550->51554 51552 43399c 4 API calls 51551->51552 51552->51557 51553 403400 4 API calls 51555 445fcd 51553->51555 51556 43399c 4 API calls 51554->51556 51555->51518 51556->51557 51557->51553 51559 4461ab 51558->51559 51560 431090 4 API calls 51559->51560 51561 432d78 51560->51561 51561->51377 51563 402648 4 API calls 51562->51563 51564 403b86 51563->51564 51564->51140 51566 445642 51565->51566 51567 431090 4 API calls 51566->51567 51568 445663 51567->51568 51569 4480b8 51568->51569 52371 445564 51569->52371 51576 44810c 51577 445564 4 API calls 51576->51577 51578 448116 51577->51578 52409 445440 51578->52409 51581 44819c 51582 445564 4 API calls 51581->51582 51583 4481a7 51582->51583 51584 445294 4 API calls 51583->51584 51585 4481ba 51584->51585 52420 4453ac 51585->52420 51590 445294 4 API calls 51591 4481ef 51590->51591 51592 44531c 4 API calls 51591->51592 51593 448202 51592->51593 51594 44531c 4 API calls 51593->51594 51595 448215 51594->51595 51596 44531c 4 API calls 51595->51596 51597 44822b 51596->51597 51598 44531c 4 API calls 51597->51598 51599 44823e 51598->51599 51600 44531c 4 API calls 51599->51600 51601 448254 51600->51601 51602 4488b0 51601->51602 51603 445564 4 API calls 51602->51603 51604 4488bb 51603->51604 52442 4451ac 51604->52442 51607 4451ac 4 API calls 51608 4488e9 51607->51608 51609 4451ac 4 API calls 51608->51609 51610 4488ff 51609->51610 51611 445294 4 API calls 51610->51611 51612 448910 51611->51612 51613 445294 4 API calls 51612->51613 51614 448921 51613->51614 51615 445294 4 API calls 51614->51615 51616 448932 51615->51616 51617 44531c 4 API calls 51616->51617 51618 448948 51617->51618 51619 44531c 4 API calls 51618->51619 51620 44895b 51619->51620 51621 448510 51620->51621 51622 445564 4 API calls 51621->51622 51623 44851e 51622->51623 51624 445440 4 API calls 51623->51624 51625 448531 51624->51625 51626 445294 4 API calls 51625->51626 51627 448542 51626->51627 51628 445440 4 API calls 51627->51628 51629 448553 51628->51629 51630 4451ac 4 API calls 51629->51630 51631 448569 51630->51631 51632 4451ac 4 API calls 51631->51632 51633 44857f 51632->51633 51634 445440 4 API calls 51633->51634 51635 448590 51634->51635 51636 4451ac 4 API calls 51635->51636 51637 4485a6 51636->51637 51638 44531c 4 API calls 51637->51638 51639 4485b9 51638->51639 51640 44531c 4 API calls 51639->51640 51641 4485cf 51640->51641 51642 44531c 4 API calls 51641->51642 51643 4485e5 51642->51643 51644 44860b 51643->51644 51645 445440 4 API calls 51643->51645 51646 44531c 4 API calls 51644->51646 51647 4485fa 51645->51647 51648 448621 51646->51648 51649 445440 4 API calls 51647->51649 51650 44531c 4 API calls 51648->51650 51649->51644 51651 448637 51650->51651 51652 448788 51651->51652 51653 445564 4 API calls 51652->51653 51654 448793 51653->51654 51655 445440 4 API calls 51654->51655 51656 4487a6 51655->51656 51657 445440 4 API calls 51656->51657 51658 4487b7 51657->51658 51659 44531c 4 API calls 51658->51659 51660 4487cd 51659->51660 51661 44531c 4 API calls 51660->51661 51662 4487e3 51661->51662 52449 4454d4 51662->52449 51665 4454d4 4 API calls 51666 44880f 51665->51666 51667 4489f8 51666->51667 52372 445597 52371->52372 52405 403520 52372->52405 52375 4313ac 4 API calls 52376 4455b0 52375->52376 52377 4455dc 52376->52377 52408 445060 LocalAlloc TlsSetValue TlsGetValue TlsGetValue 52376->52408 52379 403420 4 API calls 52377->52379 52381 4455f6 52379->52381 52380 4455d0 52382 431160 4 API calls 52380->52382 52383 44520c 52381->52383 52382->52377 52384 403b80 4 API calls 52383->52384 52385 44523e 52384->52385 52386 4313ac 4 API calls 52385->52386 52387 44524b 52386->52387 52388 403450 4 API calls 52387->52388 52389 445255 52388->52389 52390 431160 4 API calls 52389->52390 52391 445270 52390->52391 52392 403400 4 API calls 52391->52392 52393 445285 52392->52393 52394 445294 52393->52394 52395 403b80 4 API calls 52394->52395 52396 4452c6 52395->52396 52397 4313ac 4 API calls 52396->52397 52398 4452d3 52397->52398 52399 403450 4 API calls 52398->52399 52400 4452dd 52399->52400 52401 431160 4 API calls 52400->52401 52402 4452f8 52401->52402 52403 403400 4 API calls 52402->52403 52404 44530d 52403->52404 52404->51576 52406 4034e0 4 API calls 52405->52406 52407 40352a 52406->52407 52407->52375 52408->52380 52410 403b80 4 API calls 52409->52410 52411 445472 52410->52411 52412 4313ac 4 API calls 52411->52412 52413 44547f 52412->52413 52414 403450 4 API calls 52413->52414 52415 445489 52414->52415 52416 431160 4 API calls 52415->52416 52417 4454b0 52416->52417 52418 403400 4 API calls 52417->52418 52419 4454c5 52418->52419 52419->51581 52421 403b80 4 API calls 52420->52421 52422 4453de 52421->52422 52423 4313ac 4 API calls 52422->52423 52424 4453eb 52423->52424 52425 403450 4 API calls 52424->52425 52426 4453f5 52425->52426 52427 431160 4 API calls 52426->52427 52428 44541c 52427->52428 52429 403400 4 API calls 52428->52429 52430 445431 52429->52430 52431 44531c 52430->52431 52432 403b80 4 API calls 52431->52432 52433 44534e 52432->52433 52434 4313ac 4 API calls 52433->52434 52435 44535b 52434->52435 52436 403450 4 API calls 52435->52436 52437 445365 52436->52437 52438 431160 4 API calls 52437->52438 52439 445386 52438->52439 52440 403400 4 API calls 52439->52440 52441 44539b 52440->52441 52441->51590 52443 403b80 4 API calls 52442->52443 52444 4451cf 52443->52444 52445 403450 4 API calls 52444->52445 52446 4451da 52445->52446 52447 431160 4 API calls 52446->52447 52448 445202 52447->52448 52448->51607 52450 403b80 4 API calls 52449->52450 52451 445506 52450->52451 52452 4313ac 4 API calls 52451->52452 52453 445513 52452->52453 52454 403450 4 API calls 52453->52454 52455 44551d 52454->52455 52456 431160 4 API calls 52455->52456 52457 44553e 52456->52457 52458 403400 4 API calls 52457->52458 52459 445553 52458->52459 52459->51665 52572 42e20f SetErrorMode 52573 41f30c 52577 423b7c 52573->52577 52671 4239f4 52573->52671 52574 41f322 52580 423bb2 52577->52580 52596 423bd3 52580->52596 52678 423ad8 52580->52678 52581 423c5c 52583 423c63 52581->52583 52584 423c97 52581->52584 52582 423bfd 52585 423c03 52582->52585 52586 423cc0 52582->52586 52591 423c69 52583->52591 52629 423f21 52583->52629 52587 423ca2 52584->52587 52588 42400a IsIconic 52584->52588 52592 423c35 52585->52592 52593 423c08 52585->52593 52589 423cd2 52586->52589 52590 423cdb 52586->52590 52594 424046 52587->52594 52595 423cab 52587->52595 52588->52596 52600 42401e GetFocus 52588->52600 52597 423ce8 52589->52597 52598 423cd9 52589->52598 52684 424104 11 API calls 52590->52684 52601 423e83 SendMessageA 52591->52601 52602 423c77 52591->52602 52592->52596 52620 423c4e 52592->52620 52621 423daf 52592->52621 52603 423d66 52593->52603 52604 423c0e 52593->52604 52702 4247c0 WinHelpA PostMessageA 52594->52702 52606 42405d 52595->52606 52630 423c30 52595->52630 52596->52574 52685 42414c 11 API calls 52597->52685 52686 423af4 NtdllDefWindowProc_A 52598->52686 52600->52596 52608 42402f 52600->52608 52601->52596 52602->52596 52602->52630 52651 423ec6 52602->52651 52690 423af4 NtdllDefWindowProc_A 52603->52690 52609 423c17 52604->52609 52610 423d8e PostMessageA 52604->52610 52618 424066 52606->52618 52619 42407b 52606->52619 52701 41ef64 GetCurrentThreadId 73F85940 52608->52701 52615 423c20 52609->52615 52616 423e15 52609->52616 52691 423af4 NtdllDefWindowProc_A 52610->52691 52624 423c29 52615->52624 52625 423d3e IsIconic 52615->52625 52626 423e1e 52616->52626 52627 423e4f 52616->52627 52617 423da9 52617->52596 52628 424444 5 API calls 52618->52628 52703 42449c LocalAlloc TlsSetValue TlsGetValue TlsGetValue SendMessageA 52619->52703 52620->52630 52631 423d7b 52620->52631 52682 423af4 NtdllDefWindowProc_A 52621->52682 52623 424036 52623->52596 52635 42403e SetFocus 52623->52635 52624->52630 52636 423d01 52624->52636 52638 423d5a 52625->52638 52639 423d4e 52625->52639 52693 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52626->52693 52696 423af4 NtdllDefWindowProc_A 52627->52696 52628->52596 52629->52596 52645 423f47 IsWindowEnabled 52629->52645 52630->52596 52683 423af4 NtdllDefWindowProc_A 52630->52683 52633 4240e8 12 API calls 52631->52633 52633->52596 52634 423db5 52642 423df3 52634->52642 52643 423dd1 52634->52643 52635->52596 52636->52596 52687 422bbc ShowWindow PostMessageA PostQuitMessage 52636->52687 52689 423af4 NtdllDefWindowProc_A 52638->52689 52688 423b30 15 API calls 52639->52688 52652 4239f4 6 API calls 52642->52652 52692 423a84 LocalAlloc TlsSetValue TlsGetValue TlsGetValue SetWindowPos 52643->52692 52644 423e26 52654 423e38 52644->52654 52694 41eec8 6 API calls 52644->52694 52645->52596 52655 423f55 52645->52655 52648 423e55 52649 423e6d 52648->52649 52697 41ee14 GetCurrentThreadId 73F85940 52648->52697 52657 4239f4 6 API calls 52649->52657 52651->52596 52659 423ee8 IsWindowEnabled 52651->52659 52660 423dfb PostMessageA 52652->52660 52695 423af4 NtdllDefWindowProc_A 52654->52695 52664 423f5c IsWindowVisible 52655->52664 52657->52596 52658 423dd9 PostMessageA 52658->52596 52659->52596 52663 423ef6 52659->52663 52660->52596 52698 412280 7 API calls 52663->52698 52664->52596 52666 423f6a GetFocus 52664->52666 52699 418150 52666->52699 52668 423f7f SetFocus 52700 4151b0 52668->52700 52670 423f9e SetFocus 52670->52596 52672 423a7d 52671->52672 52673 423a04 52671->52673 52672->52574 52673->52672 52674 423a0a EnumWindows 52673->52674 52674->52672 52675 423a26 GetWindow GetWindowLongA 52674->52675 52704 42398c GetWindow 52674->52704 52676 423a45 52675->52676 52676->52672 52677 423a71 SetWindowPos 52676->52677 52677->52672 52677->52676 52679 423ae2 52678->52679 52680 423aed 52678->52680 52679->52680 52681 408688 7 API calls 52679->52681 52680->52581 52680->52582 52681->52680 52682->52634 52683->52596 52684->52596 52685->52596 52686->52596 52687->52596 52688->52596 52689->52596 52690->52596 52691->52617 52692->52658 52693->52644 52694->52654 52695->52596 52696->52648 52697->52649 52698->52596 52699->52668 52700->52670 52701->52623 52702->52617 52703->52617 52705 4239ad GetWindowLongA 52704->52705 52706 4239b9 52704->52706 52705->52706
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ADDBACKSLASH$ADDPERIOD$ADDQUOTES$CHARLENGTH$CONVERTPERCENTSTR$DELETEINIENTRY$DELETEINISECTION$DIREXISTS$FILECOPY$FILEEXISTS$FILEORDIREXISTS$FONTEXISTS$GETCMDTAIL$GETENV$GETINIBOOL$GETINIINT$GETINISTRING$GETSHORTNAME$GETSYSTEMDIR$GETSYSWOW64DIR$GETTEMPDIR$GETUILANGUAGE$GETWINDIR$INIKEYEXISTS$ISADMINLOGGEDON$ISINISECTIONEMPTY$ISPOWERUSERLOGGEDON$PARAMCOUNT$PARAMSTR$REGDELETEKEYIFEMPTY$REGDELETEKEYINCLUDINGSUBKEYS$REGDELETEVALUE$REGGETSUBKEYNAMES$REGGETVALUENAMES$REGKEYEXISTS$REGQUERYBINARYVALUE$REGQUERYDWORDVALUE$REGQUERYMULTISTRINGVALUE$REGQUERYSTRINGVALUE$REGVALUEEXISTS$REGWRITEBINARYVALUE$REGWRITEDWORDVALUE$REGWRITEEXPANDSTRINGVALUE$REGWRITEMULTISTRINGVALUE$REGWRITESTRINGVALUE$REMOVEBACKSLASH$REMOVEBACKSLASHUNLESSROOT$REMOVEQUOTES$SETINIBOOL$SETINIINT$SETINISTRING$SETNTFSCOMPRESSION$STRINGCHANGE$STRINGCHANGEEX$USINGWINNT
                                  • API String ID: 0-948651152
                                  • Opcode ID: 1d1db12cd46013362a47805e6ba9d68d80aae8febe31137ad0331960414a684c
                                  • Instruction ID: 69d56f8011f8ecca944051e3708884fad6064d0099524071a57294257ef19ca1
                                  • Opcode Fuzzy Hash: 1d1db12cd46013362a47805e6ba9d68d80aae8febe31137ad0331960414a684c
                                  • Instruction Fuzzy Hash: EBD21F70B001155BDB10FF7ADC825AEA7A6AF59704F50883FB501A7386DE3CED0687A9

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1238 423b7c-423bb0 1239 423bb2-423bb3 1238->1239 1240 423be4-423bfb call 423ad8 1238->1240 1241 423bb5-423bd1 call 40b3ac 1239->1241 1246 423c5c-423c61 1240->1246 1247 423bfd 1240->1247 1267 423bd3-423bdb 1241->1267 1268 423be0-423be2 1241->1268 1248 423c63 1246->1248 1249 423c97-423c9c 1246->1249 1250 423c03-423c06 1247->1250 1251 423cc0-423cd0 1247->1251 1257 423f21-423f29 1248->1257 1258 423c69-423c71 1248->1258 1252 423ca2-423ca5 1249->1252 1253 42400a-424018 IsIconic 1249->1253 1259 423c35-423c38 1250->1259 1260 423c08 1250->1260 1255 423cd2-423cd7 1251->1255 1256 423cdb-423ce3 call 424104 1251->1256 1261 424046-42405b call 4247c0 1252->1261 1262 423cab-423cac 1252->1262 1263 4240c2-4240ca 1253->1263 1272 42401e-424029 GetFocus 1253->1272 1269 423ce8-423cf0 call 42414c 1255->1269 1270 423cd9-423cfc call 423af4 1255->1270 1256->1263 1257->1263 1264 423f2f-423f3a call 418150 1257->1264 1273 423e83-423eaa SendMessageA 1258->1273 1274 423c77-423c7c 1258->1274 1265 423d19-423d20 1259->1265 1266 423c3e-423c3f 1259->1266 1275 423d66-423d76 call 423af4 1260->1275 1276 423c0e-423c11 1260->1276 1261->1263 1279 423cb2-423cb5 1262->1279 1280 42405d-424064 1262->1280 1277 4240e1-4240e7 1263->1277 1264->1263 1326 423f40-423f4f call 418150 IsWindowEnabled 1264->1326 1265->1263 1289 423d26-423d2d 1265->1289 1290 423c45-423c48 1266->1290 1291 423eaf-423eb6 1266->1291 1267->1277 1268->1240 1268->1241 1269->1263 1270->1263 1272->1263 1284 42402f-424038 call 41ef64 1272->1284 1273->1263 1292 423c82-423c83 1274->1292 1293 423fba-423fc5 1274->1293 1275->1263 1285 423c17-423c1a 1276->1285 1286 423d8e-423daa PostMessageA call 423af4 1276->1286 1295 424090-424097 1279->1295 1296 423cbb 1279->1296 1306 424066-424079 call 424444 1280->1306 1307 42407b-42408e call 42449c 1280->1307 1284->1263 1339 42403e-424044 SetFocus 1284->1339 1303 423c20-423c23 1285->1303 1304 423e15-423e1c 1285->1304 1286->1263 1289->1263 1309 423d33-423d39 1289->1309 1310 423c4e-423c51 1290->1310 1311 423daf-423dcf call 423af4 1290->1311 1291->1263 1299 423ebc-423ec1 call 404e54 1291->1299 1312 423fe2-423fed 1292->1312 1313 423c89-423c8c 1292->1313 1293->1263 1297 423fcb-423fdd 1293->1297 1330 4240aa-4240b9 1295->1330 1331 424099-4240a8 1295->1331 1314 4240bb-4240bc call 423af4 1296->1314 1297->1263 1299->1263 1321 423c29-423c2a 1303->1321 1322 423d3e-423d4c IsIconic 1303->1322 1323 423e1e-423e31 call 423a84 1304->1323 1324 423e4f-423e60 call 423af4 1304->1324 1306->1263 1307->1263 1309->1263 1327 423c57 1310->1327 1328 423d7b-423d89 call 4240e8 1310->1328 1354 423df3-423e10 call 4239f4 PostMessageA 1311->1354 1355 423dd1-423dee call 423a84 PostMessageA 1311->1355 1312->1263 1315 423ff3-424005 1312->1315 1332 423c92 1313->1332 1333 423ec6-423ece 1313->1333 1351 4240c1 1314->1351 1315->1263 1340 423c30 1321->1340 1341 423d01-423d09 1321->1341 1347 423d5a-423d61 call 423af4 1322->1347 1348 423d4e-423d55 call 423b30 1322->1348 1370 423e43-423e4a call 423af4 1323->1370 1371 423e33-423e3d call 41eec8 1323->1371 1364 423e62-423e70 call 41ee14 1324->1364 1365 423e76-423e7e call 4239f4 1324->1365 1326->1263 1372 423f55-423f64 call 418150 IsWindowVisible 1326->1372 1327->1314 1328->1263 1330->1263 1331->1263 1332->1314 1333->1263 1338 423ed4-423edb 1333->1338 1338->1263 1356 423ee1-423ef0 call 418150 IsWindowEnabled 1338->1356 1339->1263 1340->1314 1341->1263 1357 423d0f-423d14 call 422bbc 1341->1357 1347->1263 1348->1263 1351->1263 1354->1263 1355->1263 1356->1263 1385 423ef6-423f0c call 412280 1356->1385 1357->1263 1364->1365 1365->1263 1370->1263 1371->1370 1372->1263 1390 423f6a-423fb5 GetFocus call 418150 SetFocus call 4151b0 SetFocus 1372->1390 1385->1263 1394 423f12-423f1c 1385->1394 1390->1263 1394->1263
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6b2f13614f49997398129d75232017c1e0aeac01b17bc2213285dcafd92c03c3
                                  • Instruction ID: eb590f941f7570ce9330ca46e378813a91b16e024a0b8130a17817d45558a203
                                  • Opcode Fuzzy Hash: 6b2f13614f49997398129d75232017c1e0aeac01b17bc2213285dcafd92c03c3
                                  • Instruction Fuzzy Hash: F0E1AB30B00124EBC710DF69E585A5EB7B0FF48704FA441AAE645AB752CB7DEE81DB08
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00451CAB,?,?,-00000001,00000000), ref: 00451C85
                                  • GetLastError.KERNEL32(00000000,?,00000000,00451CAB,?,?,-00000001,00000000), ref: 00451C8D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorFileFindFirstLast
                                  • String ID:
                                  • API String ID: 873889042-0
                                  • Opcode ID: 030d8343478b2397c3fcae2acb12cfe7b45e8aea45dc1486f49e42fb222fb72e
                                  • Instruction ID: a4017119f4984bba3ca52e8ac1f0d93096c019048ff404e61f528f4693a1bbb6
                                  • Opcode Fuzzy Hash: 030d8343478b2397c3fcae2acb12cfe7b45e8aea45dc1486f49e42fb222fb72e
                                  • Instruction Fuzzy Hash: ECF04971A00204AB8B11DBAA9C4199EB7ECEB457317504ABBFC14D3292DA394D048458
                                  APIs
                                  • GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004994C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                  • Instruction ID: 1ce02aaae6ec4ade8b295bae84213e8e13784b7c216e354617812bc232f4da8b
                                  • Opcode Fuzzy Hash: db4c94cdf382ee3399fd393310c0d3b07f3e4771964ce669c16d021a31866df8
                                  • Instruction Fuzzy Hash: 59E0D87170021467D711E95A9C869F7B35CA758314F00427FB949EB3C2EDB8DE4046ED
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,?,004240C1,?,00000000,004240CC), ref: 00423B1E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: 391c0b4f01ace9dc11d42018e655f54e16c96b41035a00a65e5cff4b20b2374c
                                  • Instruction ID: 62037174fb3a4e63d39f4d80a9d1e591ad15120c94b51c82d4663250cb3dbf53
                                  • Opcode Fuzzy Hash: 391c0b4f01ace9dc11d42018e655f54e16c96b41035a00a65e5cff4b20b2374c
                                  • Instruction Fuzzy Hash: A0F0C579205608AFCB40DF9DC588D4AFBE8FB4C260B158295B988CB321C234FE808F94

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1217 4813a4-4813c9 GetModuleHandleA 6D166DE0 1218 4813cb-4813e1 GetNativeSystemInfo 6D166DE0 1217->1218 1219 481430-481435 GetSystemInfo 1217->1219 1220 48143a-481443 1218->1220 1221 4813e3-4813ee GetCurrentProcess 1218->1221 1219->1220 1222 481453-48145a 1220->1222 1223 481445-481449 1220->1223 1221->1220 1230 4813f0-4813f4 1221->1230 1226 481475-48147a 1222->1226 1224 48144b-48144f 1223->1224 1225 48145c-481463 1223->1225 1228 481451-48146e 1224->1228 1229 481465-48146c 1224->1229 1225->1226 1228->1226 1229->1226 1230->1220 1232 4813f6-4813fd call 451904 1230->1232 1232->1220 1235 4813ff-48140c 6D166DE0 1232->1235 1235->1220 1236 48140e-481425 GetModuleHandleA 6D166DE0 1235->1236 1236->1220 1237 481427-48142e 1236->1237 1237->1220
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 004813B5
                                  • 6D166DE0.KERNEL32(00000000,GetNativeSystemInfo,kernel32.dll), ref: 004813C2
                                  • GetNativeSystemInfo.KERNELBASE(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 004813D0
                                  • 6D166DE0.KERNEL32(00000000,IsWow64Process), ref: 004813D8
                                  • GetCurrentProcess.KERNEL32(?,00000000,IsWow64Process), ref: 004813E4
                                  • 6D166DE0.KERNEL32(00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00481405
                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 00481418
                                  • 6D166DE0.KERNEL32(00000000,advapi32.dll,RegDeleteKeyExA,00000000,GetSystemWow64DirectoryA,?,00000000,IsWow64Process), ref: 0048141E
                                  • GetSystemInfo.KERNEL32(?,00000000,GetNativeSystemInfo,kernel32.dll), ref: 00481435
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$HandleInfoModuleSystem$CurrentNativeProcess
                                  • String ID: GetNativeSystemInfo$GetSystemWow64DirectoryA$IsWow64Process$RegDeleteKeyExA$advapi32.dll$kernel32.dll
                                  • API String ID: 1452695977-2623177817
                                  • Opcode ID: 39fa01ddfccae76feb3adcea83eb66da20e12e98a8c1b71c8ab6a98d6124cbf6
                                  • Instruction ID: 8e02f12f484013a28ff2341a02192a7bbb37b0de4bdff9f6500997299b828f27
                                  • Opcode Fuzzy Hash: 39fa01ddfccae76feb3adcea83eb66da20e12e98a8c1b71c8ab6a98d6124cbf6
                                  • Instruction Fuzzy Hash: 88119095148745A4DA21737A4C46F6F168C8B10F5DF588C3B7881AA2F3DABC88478F6F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1397 4237e4-4237ee 1398 423917-42391b 1397->1398 1399 4237f4-423816 call 41f334 GetClassInfoA 1397->1399 1402 423847-423850 GetSystemMetrics 1399->1402 1403 423818-42382f RegisterClassA 1399->1403 1405 423852 1402->1405 1406 423855-42385f GetSystemMetrics 1402->1406 1403->1402 1404 423831-423842 call 408c24 call 40311c 1403->1404 1404->1402 1405->1406 1408 423861 1406->1408 1409 423864-4238c0 call 403738 call 406300 call 403400 call 4235bc SetWindowLongA 1406->1409 1408->1409 1420 4238c2-4238d5 call 4240e8 SendMessageA 1409->1420 1421 4238da-423908 GetSystemMenu DeleteMenu * 2 1409->1421 1420->1421 1421->1398 1423 42390a-423912 DeleteMenu 1421->1423 1423->1398
                                  APIs
                                    • Part of subcall function 0041F334: VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                  • GetClassInfoA.USER32(00400000,004235EC), ref: 0042380F
                                  • RegisterClassA.USER32(00497630), ref: 00423827
                                  • GetSystemMetrics.USER32(00000000), ref: 00423849
                                  • GetSystemMetrics.USER32(00000001), ref: 00423858
                                  • SetWindowLongA.USER32(004105C0,000000FC,004235FC), ref: 004238B4
                                  • SendMessageA.USER32(004105C0,00000080,00000001,00000000), ref: 004238D5
                                  • GetSystemMenu.USER32(004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238E0
                                  • DeleteMenu.USER32(00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C,0041ED14), ref: 004238EF
                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001), ref: 004238FC
                                  • DeleteMenu.USER32(00000000,0000F010,00000000,00000000,0000F000,00000000,00000000,0000F030,00000000,004105C0,00000000,00000000,00400000,00000000,00000000,00000000), ref: 00423912
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Menu$DeleteSystem$ClassMetrics$AllocInfoLongMessageRegisterSendVirtualWindow
                                  • String ID: 5B
                                  • API String ID: 183575631-3738334870
                                  • Opcode ID: 44db8bd5710692da4d941872787ce0ff9892f94fd12c5b7ab8c6c5f64580aa91
                                  • Instruction ID: 16a3b782757fe380e741b78a30b35dddd299cc4c15753c014368db923682a048
                                  • Opcode Fuzzy Hash: 44db8bd5710692da4d941872787ce0ff9892f94fd12c5b7ab8c6c5f64580aa91
                                  • Instruction Fuzzy Hash: 6E3161B17406106AEB20AF699C82F6B36989718709F10017BBA41AF2D7D67DED00876C

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1425 47af3c-47af92 call 42c36c call 4035c0 call 47abb8 call 4517c0 1434 47af94-47af99 call 45252c 1425->1434 1435 47af9e-47afad call 4517c0 1425->1435 1434->1435 1439 47afc7-47afcd 1435->1439 1440 47afaf-47afb5 1435->1440 1443 47afe4-47b00c call 42e1b4 * 2 1439->1443 1444 47afcf-47afd5 1439->1444 1441 47afd7-47afdf call 403494 1440->1441 1442 47afb7-47afbd 1440->1442 1441->1443 1442->1439 1445 47afbf-47afc5 1442->1445 1451 47b033-47b04d 6D166DE0 1443->1451 1452 47b00e-47b02e call 40785c call 45252c 1443->1452 1444->1441 1444->1443 1445->1439 1445->1441 1454 47b04f-47b054 call 45252c 1451->1454 1455 47b059-47b076 call 403400 * 2 1451->1455 1452->1451 1454->1455
                                  APIs
                                  • 6D166DE0.KERNEL32(00000000,SHGetFolderPathA,00000000,0047B077), ref: 0047B03E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166
                                  • String ID: Failed to get address of SHGetFolderPath function$Failed to get version numbers of _shfoldr.dll$Failed to load DLL "%s"$SHFOLDERDLL$SHGetFolderPathA$_isetup\_shfoldr.dll$nUI$shell32.dll$shfolder.dll
                                  • API String ID: 1446878013-1488726181
                                  • Opcode ID: fcf33c47a224d227a97f9e908a15a7a1d70a81c8d563635d53f9f401c17e5de2
                                  • Instruction ID: 661024a6fcd326dbe58571742653adf7f30ba97f8e4a7a3e7e0d87374a7e660b
                                  • Opcode Fuzzy Hash: fcf33c47a224d227a97f9e908a15a7a1d70a81c8d563635d53f9f401c17e5de2
                                  • Instruction Fuzzy Hash: B3312C70A001499BCB00EBA5C882ADEB7B5EB44308F50C47BE414E7341D7789E54CBAE

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1463 47f47c-47f4ab call 4567e0 1466 47f4b1-47f4b3 1463->1466 1467 47f578-47f587 1463->1467 1468 47f517-47f573 call 4928d8 call 42e1a4 1466->1468 1469 47f4b5-47f4f5 call 492a5c 1466->1469 1473 47f5ba-47f5d4 1467->1473 1474 47f589-47f58a 1467->1474 1468->1467 1469->1468 1483 47f606-47f61c call 46bc88 1473->1483 1484 47f5d6-47f604 call 451ff8 1473->1484 1477 47f58c-47f5b8 call 451af0 1474->1477 1477->1473 1494 47f61e-47f624 FreeLibrary 1483->1494 1495 47f629-47f630 1483->1495 1484->1483 1494->1495 1497 47f632-47f638 FreeLibrary 1495->1497 1498 47f63d-47f642 call 47b190 call 47ae64 1495->1498 1497->1498 1502 47f647-47f64e 1498->1502 1503 47f650-47f657 1502->1503 1504 47f66a-47f683 call 455d60 call 42e8c0 1502->1504 1503->1504 1505 47f659-47f663 call 4567e0 1503->1505 1512 47f6b6-47f6cb call 403400 1504->1512 1513 47f685-47f696 call 4567e0 1504->1513 1505->1504 1518 47f6b1 call 47cd18 1513->1518 1519 47f698-47f6af SendNotifyMessageA 1513->1519 1518->1512 1519->1512
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000), ref: 0047F624
                                  • FreeLibrary.KERNEL32(00000000), ref: 0047F638
                                  • SendNotifyMessageA.USER32(00020468,00000496,00002710,00000000), ref: 0047F6AA
                                  Strings
                                  • Deinitializing Setup., xrefs: 0047F49A
                                  • Not restarting Windows because Setup is being run from the debugger., xrefs: 0047F659
                                  • Restarting Windows., xrefs: 0047F685
                                  • DeinitializeSetup, xrefs: 0047F535
                                  • GetCustomSetupExitCode, xrefs: 0047F4D9
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FreeLibrary$MessageNotifySend
                                  • String ID: DeinitializeSetup$Deinitializing Setup.$GetCustomSetupExitCode$Not restarting Windows because Setup is being run from the debugger.$Restarting Windows.
                                  • API String ID: 3817813901-1884538726
                                  • Opcode ID: f08e3f154d16099124dcd7ac202c01bfc89482097effeb4aa7c7c7489186b70c
                                  • Instruction ID: fc05c62f001f6c3c60b8b7fec0a41231a682c41b7fca8660be104cc12ee3811c
                                  • Opcode Fuzzy Hash: f08e3f154d16099124dcd7ac202c01bfc89482097effeb4aa7c7c7489186b70c
                                  • Instruction Fuzzy Hash: 33518F34600200AFD725DF79D945B9A7BA4EB59318F61807BE808C73A1DB389C59CB9E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1521 4523d8-452429 GetModuleHandleA 6D166DE0 GetModuleHandleA 6D166DE0 1522 452434-452436 1521->1522 1523 45242b-452432 1521->1523 1525 45243a-452470 call 42e1b4 call 42e634 call 403400 1522->1525 1523->1522 1524 452438 1523->1524 1524->1525
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 004523F8
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 004523FE
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 00452412
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 00452418
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32.dll$shell32.dll
                                  • API String ID: 439651959-2130885113
                                  • Opcode ID: a292bf531193ab1ead2b16e2bc7bde0c7d0ba96a21d25e7d8119ef621ddc6c74
                                  • Instruction ID: e771d96ce4879ca63704c8b476013a76c59fe1e2fafe43d37d62f38e469d7341
                                  • Opcode Fuzzy Hash: a292bf531193ab1ead2b16e2bc7bde0c7d0ba96a21d25e7d8119ef621ddc6c74
                                  • Instruction Fuzzy Hash: A9017170201600AEDB01AB669D53B677A58D727B29FA1443FF804A6183D6BC5C49CA2D

                                  Control-flow Graph

                                  APIs
                                  • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,0047AD83,?,?,00000000,00499628,00000000,00000000,?,00496201,00000000,004963AA,?,00000000), ref: 0047ACA3
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,0047AD83,?,?,00000000,00499628,00000000,00000000,?,00496201,00000000,004963AA,?,00000000), ref: 0047ACAC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: Created temporary directory: $REGDLL_EXE$\_RegDLL.tmp$\_setup64.tmp$_isetup
                                  • API String ID: 1375471231-1421604804
                                  • Opcode ID: 22ff0ccac170d185012c4e90730d0b524bbaef21bfd3bcbbf8a35ae577e700ab
                                  • Instruction ID: 454f73def42b3ef3d873a84fb08c748bbf507ca2bd9f15b46ff89584d00f75b5
                                  • Opcode Fuzzy Hash: 22ff0ccac170d185012c4e90730d0b524bbaef21bfd3bcbbf8a35ae577e700ab
                                  • Instruction Fuzzy Hash: B9414974A001099FCB01EF95D8829DEB7B5EF84305F50847BE81577392D73C9E158BA9

                                  Control-flow Graph

                                  APIs
                                  • RegisterClipboardFormatA.USER32(commdlg_help), ref: 00430428
                                  • RegisterClipboardFormatA.USER32(commdlg_FindReplace), ref: 00430437
                                  • GetCurrentThreadId.KERNEL32 ref: 00430451
                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00430472
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ClipboardFormatRegister$AtomCurrentGlobalThread
                                  • String ID: WndProcPtr%.8X%.8X$commdlg_FindReplace$commdlg_help
                                  • API String ID: 4130936913-2943970505
                                  • Opcode ID: 9fa228cc881c4cb0ee3ad5d29ee6b9fbbaa7526082c5147ac8ab62f476fd5ac8
                                  • Instruction ID: 037928bc7e060fe4f6d43156c3d06346d0e5c9b3eeefcd58f5058e009fc46478
                                  • Opcode Fuzzy Hash: 9fa228cc881c4cb0ee3ad5d29ee6b9fbbaa7526082c5147ac8ab62f476fd5ac8
                                  • Instruction Fuzzy Hash: 1EF082704483408ED700EB65C802B197AE0EB68318F004A7FB598A62E1D73A9A00CB1F

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1661 4235fc-423609 1662 423613-4236e0 call 410190 call 402b30 * 2 call 41d984 LoadIconA call 41dd10 GetModuleFileNameA OemToCharA call 407428 1661->1662 1663 42360b-42360e call 402d30 1661->1663 1677 4236e2-4236eb call 407290 1662->1677 1678 4236f0-4236ff call 407408 1662->1678 1663->1662 1677->1678 1682 423701 1678->1682 1683 423704-42372b CharLowerA call 40355c 1678->1683 1682->1683 1686 423734-423740 1683->1686 1687 42372d-42372f call 4237e4 1683->1687 1688 423742-423749 1686->1688 1689 42374c-423753 1686->1689 1687->1686 1688->1689
                                  APIs
                                  • LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                  • OemToCharA.USER32(?,?), ref: 004236CC
                                  • CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Char$FileIconLoadLowerModuleName
                                  • String ID: 2$MAINICON
                                  • API String ID: 3935243913-3181700818
                                  • Opcode ID: 1b0db4e38410ed08fd43d1227139983cff85abc5e858e568c57dc875fee80bda
                                  • Instruction ID: e164940f732d968ba99c163f3fcc12ffe833d184b7498653a3684ef3d7b221e9
                                  • Opcode Fuzzy Hash: 1b0db4e38410ed08fd43d1227139983cff85abc5e858e568c57dc875fee80bda
                                  • Instruction Fuzzy Hash: CE31A2B0A042559ADF10EF29D8C57C67BE8AF14308F4441BAE844DB393D7BED988CB65

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcessId.KERNEL32(00000000), ref: 00418EAD
                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418ECE
                                  • GetCurrentThreadId.KERNEL32 ref: 00418EE9
                                  • GlobalAddAtomA.KERNEL32(00000000), ref: 00418F0A
                                    • Part of subcall function 00423038: 73F7A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                    • Part of subcall function 00423038: EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                    • Part of subcall function 00423038: 73F84620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                    • Part of subcall function 00423038: 73F7A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                    • Part of subcall function 004235FC: LoadIconA.USER32(00400000,MAINICON), ref: 0042368C
                                    • Part of subcall function 004235FC: GetModuleFileNameA.KERNEL32(00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 004236B9
                                    • Part of subcall function 004235FC: OemToCharA.USER32(?,?), ref: 004236CC
                                    • Part of subcall function 004235FC: CharLowerA.USER32(?,00400000,?,00000100,00400000,MAINICON,?,?,?,00418F56,00000000,?,?,?,00000001), ref: 0042370C
                                    • Part of subcall function 0041F088: GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                    • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                    • Part of subcall function 0041F088: LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                    • Part of subcall function 0041F088: SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dRegister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0FC
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F125
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F13A
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F14F
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F164
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000), ref: 0041F179
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000), ref: 0041F18E
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60), ref: 0041F1A3
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister), ref: 0041F1B8
                                    • Part of subcall function 0041F088: 6D166DE0.KERNEL32(00000001,BtnWndProc3d,00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl), ref: 0041F1CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$AtomCharCurrentErrorGlobalLoadMode$A480A570EnumF84620FileFontsIconLibraryLowerModuleNameProcessThreadVersion
                                  • String ID: ControlOfs%.8X%.8X$Delphi%.8X
                                  • API String ID: 2612956653-2767913252
                                  • Opcode ID: c9b0b8fe052b9af97da400281df92fa4da10c125a858bc4a98441331311cec09
                                  • Instruction ID: 06f349b975f9f6609891f47be69bfb04565190a1809ca848505239c89b9e556c
                                  • Opcode Fuzzy Hash: c9b0b8fe052b9af97da400281df92fa4da10c125a858bc4a98441331311cec09
                                  • Instruction Fuzzy Hash: 801160B06142409AC700FF2A984278A76E0EB68309F40843FF448DB2A1DB3D9D45CB5E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1712 401a90-401a9b 1713 401aa1-401ab6 1712->1713 1714 401b6f-401b71 1712->1714 1715 401ac2-401ae1 LocalFree 1713->1715 1716 401ab8-401abd RtlEnterCriticalSection 1713->1716 1717 401af5-401afb 1715->1717 1716->1715 1718 401ae3-401af3 VirtualFree 1717->1718 1719 401afd-401b22 call 401390 * 3 1717->1719 1718->1717 1726 401b24-401b39 LocalFree 1719->1726 1727 401b3b-401b51 1719->1727 1726->1726 1726->1727 1729 401b53-401b58 RtlLeaveCriticalSection 1727->1729 1730 401b5d-401b67 RtlDeleteCriticalSection 1727->1730 1729->1730
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(00499420,00000000,00401B68), ref: 00401ABD
                                  • LocalFree.KERNEL32(00000000,00000000,00401B68), ref: 00401ACF
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401AEE
                                  • LocalFree.KERNEL32(00000000,00000000,00000000,00008000,00000000,00000000,00401B68), ref: 00401B2D
                                  • RtlLeaveCriticalSection.KERNEL32(00499420,00401B6F), ref: 00401B58
                                  • RtlDeleteCriticalSection.KERNEL32(00499420,00401B6F), ref: 00401B62
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CriticalFreeSection$Local$DeleteEnterLeaveVirtual
                                  • String ID:
                                  • API String ID: 3782394904-0
                                  • Opcode ID: 40e8469341dc02a848a614798ee280fe3f503ecf0a0d2c59bf0d54f75b59c03b
                                  • Instruction ID: 88ad7e4fdbf6aceacb786a6f84fb2b7d2924a751ca222c4daed3c4176217cff4
                                  • Opcode Fuzzy Hash: 40e8469341dc02a848a614798ee280fe3f503ecf0a0d2c59bf0d54f75b59c03b
                                  • Instruction Fuzzy Hash: 53116D30A483405AEB16AB7DAC82B2A3BE5A761708F54407FF40067AF1D67C9C52C76E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1992 4516f8-451721 call 403738 752A1520 1995 451723-45174c call 402648 752A1500 1992->1995 1996 45179a-4517a1 1992->1996 2002 45177d-451792 call 402660 1995->2002 2003 45174e-451766 752A1540 1995->2003 1998 4517b0-4517b9 1996->1998 1999 4517a3-4517ad call 45151c 1996->1999 1999->1998 2003->2002 2005 451768-451779 2003->2005 2005->2002
                                  APIs
                                  • 752A1520.VERSION(00000000,?,?,?,nUI), ref: 00451718
                                  • 752A1500.VERSION(00000000,?,00000000,?,00000000,00451793,?,00000000,?,?,?,nUI), ref: 00451745
                                  • 752A1540.VERSION(?,004517BC,?,?,00000000,?,00000000,?,00000000,00451793,?,00000000,?,?,?,nUI), ref: 0045175F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: A1500A1520A1540
                                  • String ID: nUI
                                  • API String ID: 2563864905-1975807773
                                  • Opcode ID: df9f9219f7fff4aeeb43b9a694070a9ed6eb1772c9747d7333f0a708b5b56bcc
                                  • Instruction ID: a0cc86cd750d7bc438b8a734fe0c9faa2ab770da79c61762bd653917837db10d
                                  • Opcode Fuzzy Hash: df9f9219f7fff4aeeb43b9a694070a9ed6eb1772c9747d7333f0a708b5b56bcc
                                  • Instruction Fuzzy Hash: C7219535A006086FDB01DAA98C41EBFB7FCEB49340F55447AF900E3352D6799E048B69
                                  APIs
                                  • MessageBoxA.USER32(00000000,Runtime error at 00000000,Error,00000000), ref: 00404DC5
                                  • ExitProcess.KERNEL32 ref: 00404E0D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ExitMessageProcess
                                  • String ID: Error$Runtime error at 00000000
                                  • API String ID: 1220098344-2970929446
                                  • Opcode ID: db7b4c9d9482e5cce4f0e5c0c3c3777e0797bc8f5be78d8ec4822a82c67e7230
                                  • Instruction ID: 28ca0cdaec19d645d4e1f18e2455a365a19f54fbea1ec5e445dcbec99b00087c
                                  • Opcode Fuzzy Hash: db7b4c9d9482e5cce4f0e5c0c3c3777e0797bc8f5be78d8ec4822a82c67e7230
                                  • Instruction Fuzzy Hash: 3B21D670A581418AEB15A77DAC8175A3B8097E9308F04817FE710B73E2C67C8C45C7AE
                                  APIs
                                  • EnumWindows.USER32(0042398C), ref: 00423A18
                                  • GetWindow.USER32(?,00000003), ref: 00423A2D
                                  • GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                  • SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$EnumLongWindows
                                  • String ID:
                                  • API String ID: 4191631535-0
                                  • Opcode ID: eafe3f331526a6a31f611ca39f5089d9185a68953368bb2c12f81ff4d04719ff
                                  • Instruction ID: 5110e990e8ffff35c2de00358165aba50110dec7380c1ea9fe09c5d3861ee13e
                                  • Opcode Fuzzy Hash: eafe3f331526a6a31f611ca39f5089d9185a68953368bb2c12f81ff4d04719ff
                                  • Instruction Fuzzy Hash: CA115A70700610ABDB10EF68DC85F5A77E8EB08725F10026AF9A4AB2E2C37CDC40CB58
                                  APIs
                                  • 73F7A570.USER32(00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 0042308E
                                  • EnumFontsA.GDI32(00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000,?,?,?,00000001), ref: 004230A1
                                  • 73F84620.GDI32(00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230A9
                                  • 73F7A480.USER32(00000000,00000000,00000000,0000005A,00000000,00000000,00422FD8,004105C0,00000000,?,?,00000000,?,00418F43,00000000), ref: 004230B4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: A480A570EnumF84620Fonts
                                  • String ID:
                                  • API String ID: 3798320768-0
                                  • Opcode ID: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                  • Instruction ID: 4d68480f6d607538855b0f171b38ffa839f5ce6e0578d669e72114bdc8101102
                                  • Opcode Fuzzy Hash: 0130a543140e80f2b9f86b8e83a342749db33d5760528b3305e50fe7c2cc1c24
                                  • Instruction Fuzzy Hash: 0601D2616053002AE700BF6A5C82B9B37649F00709F40027BF804AF2C7D6BE9805476E
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CountSleepTick
                                  • String ID:
                                  • API String ID: 2227064392-0
                                  • Opcode ID: b44c33a29de9a8c844e9a6553cf55176c4cddbdca444f94af6998752a11768b7
                                  • Instruction ID: d879743ae8108a8121560a73ec1d8c4f30d4de314ac1b159a8407a382103bc90
                                  • Opcode Fuzzy Hash: b44c33a29de9a8c844e9a6553cf55176c4cddbdca444f94af6998752a11768b7
                                  • Instruction Fuzzy Hash: 7CE0ED36389A4045CA2131AE2CD66AF4A98CAC5B64B28453FE089E6282C8184C56A53B
                                  APIs
                                    • Part of subcall function 00403344: GetModuleHandleA.KERNEL32(00000000,00496836), ref: 0040334B
                                    • Part of subcall function 00403344: GetCommandLineA.KERNEL32(00000000,00496836), ref: 00403356
                                    • Part of subcall function 00409AE8: 6FAA1CD0.COMCTL32(00496845), ref: 00409AE8
                                    • Part of subcall function 004108C4: GetCurrentThreadId.KERNEL32 ref: 00410912
                                    • Part of subcall function 00418FB0: GetVersion.KERNEL32(00496859), ref: 00418FB0
                                    • Part of subcall function 0044EC04: GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049686D), ref: 0044EC3F
                                    • Part of subcall function 0044EC04: 6D166DE0.KERNEL32(00000000,user32.dll,NotifyWinEvent,0049686D), ref: 0044EC45
                                    • Part of subcall function 0044EFE8: GetVersionExA.KERNEL32(00499788,00496872), ref: 0044EFF7
                                    • Part of subcall function 004523D8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 004523F8
                                    • Part of subcall function 004523D8: 6D166DE0.KERNEL32(00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 004523FE
                                    • Part of subcall function 004523D8: GetModuleHandleA.KERNEL32(kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 00452412
                                    • Part of subcall function 004523D8: 6D166DE0.KERNEL32(00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000,00452471,?,?,?,?,00000000,?,0049687C), ref: 00452418
                                    • Part of subcall function 00455B80: 6D166DE0.KERNEL32(00000000,SHCreateItemFromParsingName,00496881), ref: 00455BA4
                                    • Part of subcall function 0046354C: LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00496890), ref: 0046355B
                                    • Part of subcall function 0046354C: 6D166DE0.KERNEL32(00000000,shell32.dll,SHPathPrepareForWriteA,00496890), ref: 00463561
                                    • Part of subcall function 0046B630: 6D166DE0.KERNEL32(00000000,SHPathPrepareForWriteA,00496895), ref: 0046B645
                                    • Part of subcall function 00476ED8: GetModuleHandleA.KERNEL32(kernel32.dll,?,0049689A), ref: 00476EDE
                                    • Part of subcall function 00476ED8: 6D166DE0.KERNEL32(00000000,VerSetConditionMask,kernel32.dll,?,0049689A), ref: 00476EEB
                                    • Part of subcall function 00476ED8: 6D166DE0.KERNEL32(00000000,VerifyVersionInfoW,00000000,VerSetConditionMask,kernel32.dll,?,0049689A), ref: 00476EFB
                                    • Part of subcall function 00493818: RegisterClipboardFormatA.USER32(QueryCancelAutoPlay), ref: 00493831
                                  • SetErrorMode.KERNEL32(00000001,00000000,004968E2), ref: 004968B4
                                    • Part of subcall function 00496630: GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,004968BE,00000001,00000000,004968E2), ref: 0049663A
                                    • Part of subcall function 00496630: 6D166DE0.KERNEL32(00000000,user32.dll,DisableProcessWindowsGhosting,004968BE,00000001,00000000,004968E2), ref: 00496640
                                    • Part of subcall function 00424444: SendMessageA.USER32(?,0000B020,00000000,?), ref: 00424463
                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                  • ShowWindow.USER32(?,00000005,00000000,004968E2), ref: 00496925
                                    • Part of subcall function 004801DC: SetActiveWindow.USER32(?), ref: 0048028A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$HandleModule$Window$Version$ActiveClipboardCommandCurrentErrorFormatLibraryLineLoadMessageModeRegisterSendShowTextThread
                                  • String ID: Setup
                                  • API String ID: 4046210471-3839654196
                                  • Opcode ID: 73a81bb03c58a98a0c311fce55a738d31ee3a4c73fe4b2ca1ff9d9df4fd80119
                                  • Instruction ID: 08f32f8c0adc8737cdde50bb8cd195f1613ad4d5b7d3ce09845598c59d9094fd
                                  • Opcode Fuzzy Hash: 73a81bb03c58a98a0c311fce55a738d31ee3a4c73fe4b2ca1ff9d9df4fd80119
                                  • Instruction Fuzzy Hash: CA311D712046509FD601BBBBEC1395D3BA8EB89718793443FF40492553CE3D5C158A7E
                                  APIs
                                  • CreateDirectoryA.KERNEL32(00000000,00000000,?,00000000,00452CFB,?,?,00000000,00499628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452C52
                                  • GetLastError.KERNEL32(00000000,00000000,?,00000000,00452CFB,?,?,00000000,00499628,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00452C5B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID: .tmp
                                  • API String ID: 1375471231-2986845003
                                  • Opcode ID: c48ee4a9931f16bc4209ac78fdb486b8a3c15f53af04f62b51f5911c534421c6
                                  • Instruction ID: 92c1dba87803f6619e7bc88fa20badbeceb41b656d093e84a639742799fd4c34
                                  • Opcode Fuzzy Hash: c48ee4a9931f16bc4209ac78fdb486b8a3c15f53af04f62b51f5911c534421c6
                                  • Instruction Fuzzy Hash: E3214775A002089BDB01EFA5C9829DFB7B9EF58305F50457BFC01B7342DA7C9E058AA5
                                  APIs
                                  • 6D167B60.ADVAPI32(?,?,00000001,00000000,?,?,?,0047A9A6,00000000,0047A9BC,?,?,?,?,00000000), ref: 0047A782
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: RegisteredOrganization$RegisteredOwner
                                  • API String ID: 557493163-1113070880
                                  • Opcode ID: c1a54a052928fa71b87a357a451ff90e2e2aa6c3d29355afdd483e4de5049ccf
                                  • Instruction ID: 6a336bb24ca2ab860578fd3cd55d0358beaadaf3102226a605461b288e735e79
                                  • Opcode Fuzzy Hash: c1a54a052928fa71b87a357a451ff90e2e2aa6c3d29355afdd483e4de5049ccf
                                  • Instruction Fuzzy Hash: 63F0B434704244AFDB08DA659C53B9F37A9E781308F24807BA1049B341D67DEE11CB9E
                                  APIs
                                    • Part of subcall function 00455B10: CoInitialize.OLE32(00000000), ref: 00455B16
                                    • Part of subcall function 0042E1B4: SetErrorMode.KERNEL32(00008000), ref: 0042E1BE
                                    • Part of subcall function 0042E1B4: LoadLibraryA.KERNEL32(00000000,00000000,0042E208,?,00000000,0042E226,?,00008000), ref: 0042E1ED
                                  • 6D166DE0.KERNEL32(00000000,SHCreateItemFromParsingName,00496881), ref: 00455BA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166ErrorInitializeLibraryLoadMode
                                  • String ID: SHCreateItemFromParsingName$shell32.dll
                                  • API String ID: 3497985204-2320870614
                                  • Opcode ID: ec250839ddc40d0a736ec8c9589f77cfaeff432978d092a6a1bac2f451eea00c
                                  • Instruction ID: a0fbb172c42ed79366dca91357488a0e93138e5875a7ee0513f1a474ff437a71
                                  • Opcode Fuzzy Hash: ec250839ddc40d0a736ec8c9589f77cfaeff432978d092a6a1bac2f451eea00c
                                  • Instruction Fuzzy Hash: 8AC012B0711900568A0033B6042672E2004874031AB50803F7440AA187DD7DA408076E
                                  APIs
                                    • Part of subcall function 0042E1B4: SetErrorMode.KERNEL32(00008000), ref: 0042E1BE
                                    • Part of subcall function 0042E1B4: LoadLibraryA.KERNEL32(00000000,00000000,0042E208,?,00000000,0042E226,?,00008000), ref: 0042E1ED
                                  • 6D166DE0.KERNEL32(00000000,SHPathPrepareForWriteA,00496895), ref: 0046B645
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166ErrorLibraryLoadMode
                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                  • API String ID: 2964704918-2683653824
                                  • Opcode ID: 3b470e072a7483ebb8d94bc7f1f44bae315de2b863f1529f45e1d4f3fa464d11
                                  • Instruction ID: 9aff7ad3c568a22a2b4f1a5d030331c7f0412ae4b913a0e6a544d5f2fe6b64ba
                                  • Opcode Fuzzy Hash: 3b470e072a7483ebb8d94bc7f1f44bae315de2b863f1529f45e1d4f3fa464d11
                                  • Instruction Fuzzy Hash: CFB092F064060482CA00AFB298437171244E760708B24C43BB488EA286FB3D88A84BEF
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,0040867A), ref: 00408563
                                    • Part of subcall function 00406D54: LoadStringA.USER32(00400000,0000FF87,?,00000400), ref: 00406D71
                                    • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004994C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: DefaultInfoLoadLocaleStringSystem
                                  • String ID: @hI
                                  • API String ID: 1658689577-771705929
                                  • Opcode ID: 92a93adff60a03b40d2107b586362a2d213e9cc7dbb7d19789056de0a3a44930
                                  • Instruction ID: 2fdd9022aa0b4064c992ef58ec6fabf139125d4ee277b25021975313a4f1d1d2
                                  • Opcode Fuzzy Hash: 92a93adff60a03b40d2107b586362a2d213e9cc7dbb7d19789056de0a3a44930
                                  • Instruction Fuzzy Hash: A7315275E00109ABCF01EF55C8819EEB7B9EF84314F11857BE815AB285E738AE058B94
                                  APIs
                                  Strings
                                  • Failed to remove temporary directory: , xrefs: 0047AEC5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CountTick
                                  • String ID: Failed to remove temporary directory:
                                  • API String ID: 536389180-3544197614
                                  • Opcode ID: 318f7e34e458934a0add632f83d789e43d8b0d0d0db99e8a8827eb9571e6c707
                                  • Instruction ID: 21e0c25a62b5ef995e74ac43d3b8a18367c873fc1ecf67cae48e6da10c40cfb4
                                  • Opcode Fuzzy Hash: 318f7e34e458934a0add632f83d789e43d8b0d0d0db99e8a8827eb9571e6c707
                                  • Instruction Fuzzy Hash: 2801F570244204AAEB11EB32DC07F9F7B98D785B09F608437F804A6193D77C9E24865E
                                  APIs
                                  • RtlUnwind.KERNEL32(?,?,Function_00002E70,00000000,?,?,Function_00002E70,?), ref: 00402EDC
                                    • Part of subcall function 00402D90: RaiseException.KERNEL32(0EEDFAD4,00000000,00000002), ref: 00402DA6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ExceptionRaiseUnwind
                                  • String ID: /@
                                  • API String ID: 478881706-2472096700
                                  • Opcode ID: f23111f4d6e81841eae0d97d4a064f450bad3e8c03756356cf3c83b9ecda70cb
                                  • Instruction ID: 44f7335f82d65d747696bde5430e8942b292ab2e2e3f8fc3da9f32fa67a3d4f2
                                  • Opcode Fuzzy Hash: f23111f4d6e81841eae0d97d4a064f450bad3e8c03756356cf3c83b9ecda70cb
                                  • Instruction Fuzzy Hash: 3301F7B0200201AFD710DB55CA89F27B7E9EF88754F15C5A9B508672E1C774EC44DA65
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(?,?,00000001,00000000,?,?,?,?,?,0047A882,00000000,0047A9BC), ref: 0047A681
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 0047A651
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: Software\Microsoft\Windows\CurrentVersion
                                  • API String ID: 557493163-1019749484
                                  • Opcode ID: 59cb38cb6bfcf1c18ff106d3ff2ae4b10be3c127c9185a49efd7297f5cdac4d2
                                  • Instruction ID: 8e945ff0c1cfc9845514684e1936b43eb0425cd50799034a588753f995eb2c03
                                  • Opcode Fuzzy Hash: 59cb38cb6bfcf1c18ff106d3ff2ae4b10be3c127c9185a49efd7297f5cdac4d2
                                  • Instruction Fuzzy Hash: 05F0A7317041146BDA00A65A9C42BAFA7DDCBC4758F24403BF608EB342D9BD9E0243AE
                                  APIs
                                  • 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  Strings
                                  • System\CurrentControlSet\Control\Windows, xrefs: 0042DC6E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: System\CurrentControlSet\Control\Windows
                                  • API String ID: 557493163-1109719901
                                  • Opcode ID: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                  • Instruction ID: fabb803f5ff523eeab3b7a035bb747b9213277980d9d81731b2bf545c5070290
                                  • Opcode Fuzzy Hash: cac79e148e5d1637301d0cd401e0a8768c8b40d51dfb76d9d00be79e5a4099f3
                                  • Instruction Fuzzy Hash: EDD0C772910128BBDB10DA89DC41DF7775DDB59760F54401AFD0497141C1B4EC5197F4
                                  APIs
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,004533F7,?,00000000,00453461,?,?,-00000001,00000000,?,0047AEC1,00000000,0047AE10,00000000), ref: 004533D3
                                  • FindClose.KERNEL32(000000FF,004533FE,004533F7,?,00000000,00453461,?,?,-00000001,00000000,?,0047AEC1,00000000,0047AE10,00000000,00000001), ref: 004533F1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileNext
                                  • String ID:
                                  • API String ID: 2066263336-0
                                  • Opcode ID: b92dacf6038d044d926ce71e29c1c4d3ef9512044cf767a795ddb841458c8e77
                                  • Instruction ID: 59662298388fd7d6b549a2e3b295ee96dcce014c506f44d390d76b8ec2f57b38
                                  • Opcode Fuzzy Hash: b92dacf6038d044d926ce71e29c1c4d3ef9512044cf767a795ddb841458c8e77
                                  • Instruction Fuzzy Hash: F6817F3090424DABCF12DFA5C8457EFBB74AF49346F5040AAEC4467392D7399B4ACB58
                                  APIs
                                  • GetACP.KERNEL32(00000000,?,00000001,00000000,0047C397,?,?,00000001,00000000,0047E2FD,-00000010,?,00000005,00000019,00000000,0047E64A), ref: 0047C082
                                    • Part of subcall function 0042E13C: 73F7A570.USER32(00000000,00000000,00000000,0047E6B1,?,?,00000001,00000000,00000002,00000000,0047EF71), ref: 0042E14B
                                    • Part of subcall function 0042E13C: EnumFontsA.GDI32(?,00000000,0042E128,00000000,00000000,0042E194,?,00000000,00000000,00000000,0047E6B1,?,?,00000001,00000000,00000002), ref: 0042E176
                                    • Part of subcall function 0042E13C: 73F7A480.USER32(00000000,?,0042E19B,00000000,00000000,0042E194,?,00000000,00000000,00000000,0047E6B1,?,?,00000001,00000000,00000002), ref: 0042E18E
                                  • SendNotifyMessageA.USER32(00020468,00000496,00002711,00000000), ref: 0047C252
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: A480A570EnumFontsMessageNotifySend
                                  • String ID:
                                  • API String ID: 2685184028-0
                                  • Opcode ID: ea0f2fd48d3aa1a8db12279c074cd8226564fb4f1d21c8c8305e3363a29b5b38
                                  • Instruction ID: 890f667201552ce9ce62703cff0ed3a10e3c6cb05070994abca7e25aa8646fd5
                                  • Opcode Fuzzy Hash: ea0f2fd48d3aa1a8db12279c074cd8226564fb4f1d21c8c8305e3363a29b5b38
                                  • Instruction Fuzzy Hash: 5D5163346001008BD711FF66D8C168A7BA9EB55309B90C57FA8489B3A7CB3CDD46CB9E
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DA74
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,70000000,?,?,00000000,?,00000000,?,00000000,0042DB70), ref: 0042DAE4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: QueryValue
                                  • String ID:
                                  • API String ID: 3660427363-0
                                  • Opcode ID: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                  • Instruction ID: de7305fe23da407263f6a21fe748e6d6d926aae016943a7179aec9e2dd5a457b
                                  • Opcode Fuzzy Hash: fe899f6043c7f770a4508ac600d0d0e70af19fa3b1a52c17f713553a047210da
                                  • Instruction Fuzzy Hash: 4F417171E04129AFDF10DF91D891BAFBBB8EB01704F918466E810B7240D778BE04CB99
                                  APIs
                                  • 6D167770.KERNEL32(00000000,00000000,00451B4D,?,-00000001,?), ref: 00451B27
                                  • GetLastError.KERNEL32(00000000,00000000,00451B4D,?,-00000001,?), ref: 00451B2F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167770ErrorLast
                                  • String ID:
                                  • API String ID: 4081035853-0
                                  • Opcode ID: e83c550b839dcf0bd10dc7b1a97466b50f67bca7ed30c71f0d67f765a3da39ca
                                  • Instruction ID: a5da00447ae79fac22184f4da0cf652e5006ca8770c95073f8daf701d0717375
                                  • Opcode Fuzzy Hash: e83c550b839dcf0bd10dc7b1a97466b50f67bca7ed30c71f0d67f765a3da39ca
                                  • Instruction Fuzzy Hash: 6EF0C875A04608ABCB00EFB59C4199EB7E8DB0931575145B7FC14E3252F6786E188598
                                  APIs
                                  • RemoveDirectoryA.KERNEL32(00000000,00000000,00452055,?,-00000001,00000000), ref: 0045202F
                                  • GetLastError.KERNEL32(00000000,00000000,00452055,?,-00000001,00000000), ref: 00452037
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: DirectoryErrorLastRemove
                                  • String ID:
                                  • API String ID: 377330604-0
                                  • Opcode ID: 3258773c82f0d91a1afb79f79dac9d98153e36b8b3101c951e5ad34bae757af7
                                  • Instruction ID: f6838928fafbffd6dc9857e8452c835fbb8909989936119e3dca391091342d7a
                                  • Opcode Fuzzy Hash: 3258773c82f0d91a1afb79f79dac9d98153e36b8b3101c951e5ad34bae757af7
                                  • Instruction Fuzzy Hash: BDF02871A05208ABCF00DFB5AC4159EB7E8EB0A72571049B7FC04E3282EA785E04C598
                                  APIs
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004231B9
                                  • LoadCursorA.USER32(00000000,00000000), ref: 004231E3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CursorLoad
                                  • String ID:
                                  • API String ID: 3238433803-0
                                  • Opcode ID: 41eb8a1f3e1dc0d79877118b4796d5d9dbc495b655fa4abac9d6a83b162566f4
                                  • Instruction ID: 676ecd95b1ef36bc0223dd9a2f1ee322795c0d070bb5feb1993450ed68447b4a
                                  • Opcode Fuzzy Hash: 41eb8a1f3e1dc0d79877118b4796d5d9dbc495b655fa4abac9d6a83b162566f4
                                  • Instruction Fuzzy Hash: 53F0A7117001145BD660593E6CC193A72688F86736B61033BFE3AD72D1C62E2D51426D
                                  APIs
                                  • SetErrorMode.KERNEL32(00008000), ref: 0042E1BE
                                  • LoadLibraryA.KERNEL32(00000000,00000000,0042E208,?,00000000,0042E226,?,00008000), ref: 0042E1ED
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLibraryLoadMode
                                  • String ID:
                                  • API String ID: 2987862817-0
                                  • Opcode ID: 26e788730e3cbe96319a03b17e5e53d01e76f45806d8ea66fac71578cd018f2a
                                  • Instruction ID: b03bd68b0133cfb85c2b49f6daf1a90f00f582e3dd9511e38abcea9ad9b5a4f7
                                  • Opcode Fuzzy Hash: 26e788730e3cbe96319a03b17e5e53d01e76f45806d8ea66fac71578cd018f2a
                                  • Instruction Fuzzy Hash: 50F08270B14744BEDB119F77DC6282BBBECE74DB1079249B6F810A3691E63C5810C938
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,?,00002000,00000001,?,?,?,004017ED), ref: 00401513
                                  • VirtualFree.KERNEL32(00000000,00000000,00008000,00000000,?,00002000,00000001,?,?,?,004017ED), ref: 0040153A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Virtual$AllocFree
                                  • String ID:
                                  • API String ID: 2087232378-0
                                  • Opcode ID: 09dc17e0e6f2c5ebec2ebd809ac261a530bb5b580bbbfd9be0bab5fb96dc63b8
                                  • Instruction ID: 776eaf39b9d1a5f47234cbc0ed7aa96ab08d9c17dfa6ea1fba8a1158cce01b25
                                  • Opcode Fuzzy Hash: 09dc17e0e6f2c5ebec2ebd809ac261a530bb5b580bbbfd9be0bab5fb96dc63b8
                                  • Instruction Fuzzy Hash: 3EF08272A0063067EB61596A4C81B535A849BC5794F15407AFD09FF3E9D6B58C0142A9
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,00000000,0042CBF0,?,00000001,?,?,00000000,?,0042CC42,00000000,00451C0D,00000000,00451C2E,?,00000000), ref: 0042CBD3
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                  • Instruction ID: dfed850972a7f4cfed0b3d6ce6ead54829112a593105f6481b619d55be1254e6
                                  • Opcode Fuzzy Hash: fb728ae1967c572744be537d183b1c2397660519459ab9e6793d4da77068addf
                                  • Instruction Fuzzy Hash: 1AE06571304708BFD701EB62AC93E5EBBACD745714B914876B400A7651D5B8AE00845C
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,?,?,00000000,?,00000080,00000000), ref: 0044F9EC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D1674
                                  • String ID:
                                  • API String ID: 2996001779-0
                                  • Opcode ID: bae66bead66b5e07b83a80faf3efd662bcbb4a6bd163ce373dfa7ef137d5942d
                                  • Instruction ID: 242651817cd6b5fd4bb01c3afb7b2e3ec9c275dde43622d2897e753039f2a7bc
                                  • Opcode Fuzzy Hash: bae66bead66b5e07b83a80faf3efd662bcbb4a6bd163ce373dfa7ef137d5942d
                                  • Instruction Fuzzy Hash: E3E012A53641483EE340EEAC7C52F9777DCD71A754F008033F998D7241D4619D158BA8
                                  APIs
                                  • FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045245B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E653
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FormatMessage
                                  • String ID:
                                  • API String ID: 1306739567-0
                                  • Opcode ID: 1e35d6990590c6e50af99b1e8368dee699bbd3b64eed18c8552a5533455f4f95
                                  • Instruction ID: 6dc52a3738478b360af1f37268f932a47e6ce6d9338a48a593b8bc47814fb21e
                                  • Opcode Fuzzy Hash: 1e35d6990590c6e50af99b1e8368dee699bbd3b64eed18c8552a5533455f4f95
                                  • Instruction Fuzzy Hash: 7AE0D86178431119F62514166C53B7B110E8390B44FD080267A109D3C3C6AE990D429E
                                  APIs
                                  • CreateWindowExA.USER32(00000000,004235EC,00000000,94CA0000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 00406329
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                  • Instruction ID: 1d12608fc0467a25e6c73015cc4d191371d7057fe5102c86e19c90aa3d4ae925
                                  • Opcode Fuzzy Hash: ff94722aa4050723ad3f6c96c0112c9f8192a5aa4540eb1f1ae13447e7542d04
                                  • Instruction Fuzzy Hash: 4CE002B2204309BFDB00DE8ADDC1DABB7ACFB4C654F844105BB1C972428275AD608BB1
                                  APIs
                                  • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 00406E8C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: f93223040538cb60598dc4cf3010d2a684b40fa1b5059103e17c9242f0e749d0
                                  • Instruction ID: 5e9ef0cb41ef517b54198f539e7e4457f1ce254f1207c5e451c0fee893fabf4d
                                  • Opcode Fuzzy Hash: f93223040538cb60598dc4cf3010d2a684b40fa1b5059103e17c9242f0e749d0
                                  • Instruction Fuzzy Hash: 3DD05B763082107AD620A55BAC44DA76BDCCFC5770F11063EB558C71C1D6309C01C675
                                  APIs
                                    • Part of subcall function 00423568: SystemParametersInfoA.USER32(00000048,00000000,00000000,00000000), ref: 0042357D
                                  • ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                    • Part of subcall function 00423598: SystemParametersInfoA.USER32(00000049,00000000,00000000,00000000), ref: 004235B4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: InfoParametersSystem$ShowWindow
                                  • String ID:
                                  • API String ID: 3202724764-0
                                  • Opcode ID: 5307962b8b56938e5b235cb39c89fdcb6647a00241a7e7f9a79480617f51b824
                                  • Instruction ID: 6e8deb3ed7ffb4c54c7bf11bddd21d475954711d807402a63cfbe74293682e9f
                                  • Opcode Fuzzy Hash: 5307962b8b56938e5b235cb39c89fdcb6647a00241a7e7f9a79480617f51b824
                                  • Instruction Fuzzy Hash: 03D05E123812743102107ABB280998B42A84D862AB388043BB54CDB202E91E8A81A1AC
                                  APIs
                                  • SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: TextWindow
                                  • String ID:
                                  • API String ID: 530164218-0
                                  • Opcode ID: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                  • Instruction ID: a3b20f4c882213fa23ff33249cd178fa67041ba6f44abe22b1f00704e939aabb
                                  • Opcode Fuzzy Hash: c34688b727229efcedc1f2997f44e421d28f5fd8d0fc977b3f59e8ef08dab085
                                  • Instruction Fuzzy Hash: 4CD05EE27011702BCB01BBED54C4AC667CC8B8829AB1940BBF918EF257C638CE448398
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,?,00451E3D,00000000,00451E56,?,-00000001,00000000), ref: 0042CC53
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 82f5dea6b02cc0f726bbe4c909810c4d52a47932f104f8a95c7157b85414663c
                                  • Instruction ID: fb3bcb19fe042810799c60ac9426d807c03ae468120a660d59a80632ebfc0af6
                                  • Opcode Fuzzy Hash: 82f5dea6b02cc0f726bbe4c909810c4d52a47932f104f8a95c7157b85414663c
                                  • Instruction Fuzzy Hash: 04D012D030121015DA1475BF2ACD75F42884FA5735BB41B37B96DE23E2D23D8956101C
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,0040A834,0040CDE0,?,00000000,?), ref: 00406E45
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D1674
                                  • String ID:
                                  • API String ID: 2996001779-0
                                  • Opcode ID: fa9085c2757d27c9982339da6d7ec2766c2721ebbc7942d7ae8461916205f344
                                  • Instruction ID: fbce42704b7dd2fd8be74a622cf743b4adaa06f64be9adac3ea2875d17ee2119
                                  • Opcode Fuzzy Hash: fa9085c2757d27c9982339da6d7ec2766c2721ebbc7942d7ae8461916205f344
                                  • Instruction Fuzzy Hash: EAC048A13C130032F92035A60C87F16008C5754F0AE60C43AB740BF1C2D8E9A818022C
                                  APIs
                                  • SetErrorMode.KERNEL32(?,0042E22D), ref: 0042E220
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorMode
                                  • String ID:
                                  • API String ID: 2340568224-0
                                  • Opcode ID: 5cb12245fe54509065a79bb868ac9e2c98d4f3c192dc6fa753926c2ceb3ff8f1
                                  • Instruction ID: f738dbc2c191c097ff54108f810fd354cf398823fcd47068a980be29c21e85c8
                                  • Opcode Fuzzy Hash: 5cb12245fe54509065a79bb868ac9e2c98d4f3c192dc6fa753926c2ceb3ff8f1
                                  • Instruction Fuzzy Hash: 91B09B76B0C6005DF705D6D5745152D63D8D7C57203E149B7F111D2581D93C58004928
                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,0047F642), ref: 0047B1A6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID:
                                  • API String ID: 3664257935-0
                                  • Opcode ID: fdad7df3e44edefcf6d6d9cc32d641229754695adfb19477cfda2e5ffcea6d1c
                                  • Instruction ID: 8b4f93e5702c9bb3706ed99b57f206b36c7f792d6e92d0bddf93f222bebf50ef
                                  • Opcode Fuzzy Hash: fdad7df3e44edefcf6d6d9cc32d641229754695adfb19477cfda2e5ffcea6d1c
                                  • Instruction Fuzzy Hash: 7FC002B15102008EC740EB79AC4C74A36E4F72C319F14487BA804C7260E7B884A4CFEF
                                  APIs
                                  • VirtualAlloc.KERNEL32(00000000,00001000,00001000,00000040,?,00000000,0041ED14,?,004237FF,00423B7C,0041ED14), ref: 0041F352
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AllocVirtual
                                  • String ID:
                                  • API String ID: 4275171209-0
                                  • Opcode ID: bc77a4876f1d895ef1045a47d34a5924c616e63536ec74810147f8327a0b6243
                                  • Instruction ID: 08e83a65a2327c8ef9f17986634245e3b79d24060420de3a4e0eeaf4dd20d018
                                  • Opcode Fuzzy Hash: bc77a4876f1d895ef1045a47d34a5924c616e63536ec74810147f8327a0b6243
                                  • Instruction Fuzzy Hash: FD111C742407059BC710DF59D881B86FBE5EB98350B10C53BE9588B385D378ED45CBA9
                                  APIs
                                  • VirtualFree.KERNEL32(00000000,00000000,00004000,?,?,?,?,?,00401973), ref: 00401766
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FreeVirtual
                                  • String ID:
                                  • API String ID: 1263568516-0
                                  • Opcode ID: 18c1eba8e1db17ab10124bb7e994193c51c3ea2d8e449add578f9bf5b72e9145
                                  • Instruction ID: 931392296a4abfdc71eaf96f3e4e5a487183569b01ba9d664ff519b7feaebb01
                                  • Opcode Fuzzy Hash: 18c1eba8e1db17ab10124bb7e994193c51c3ea2d8e449add578f9bf5b72e9145
                                  • Instruction Fuzzy Hash: FD01FC766482148FC3109E29DCC0E2677E8D794378F15453EDA85673A1D37A6C0187D8
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00457653
                                  • QueryPerformanceCounter.KERNEL32(00000000,00000000,004578E6,?,?,00000000,00000000,?,00457FE2,?,00000000,00000000), ref: 0045765C
                                  • GetSystemTimeAsFileTime.KERNEL32(00000000,00000000), ref: 00457666
                                  • GetCurrentProcessId.KERNEL32(?,00000000,00000000,004578E6,?,?,00000000,00000000,?,00457FE2,?,00000000,00000000), ref: 0045766F
                                  • CreateNamedPipeA.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000), ref: 004576E5
                                  • GetLastError.KERNEL32(00000000,40080003,00000006,00000001,00002000,00002000,00000000,00000000,?,00000000,00000000), ref: 004576F3
                                  • 6D1674B0.KERNEL32(00000000,C0000000,00000000,00497AF0,00000003,00000000,00000000,00000000,004578A2), ref: 0045773B
                                  • SetNamedPipeHandleState.KERNEL32(000000FF,00000002,00000000,00000000,00000000,00457891,?,00000000,C0000000,00000000,00497AF0,00000003,00000000,00000000,00000000,004578A2), ref: 00457774
                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                  • CreateProcessA.KERNEL32(00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045781D
                                  • CloseHandle.KERNEL32(?,00000000,00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000), ref: 00457853
                                  • CloseHandle.KERNEL32(000000FF,00457898,?,00000000,00000000,00000001,0C000000,00000000,00000000,00000044,?,000000FF,00000002,00000000,00000000,00000000), ref: 0045788B
                                    • Part of subcall function 00452684: GetLastError.KERNEL32(00000000,004530F5,00000005,00000000,0045312A,?,?,00000000,00499628,00000004,00000000,00000000,00000000,?,0049606D,00000000), ref: 00452687
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Handle$CloseCreateErrorLastNamedPipeProcessSystemTime$CountCounterCurrentD1674DirectoryFilePerformanceQueryStateTick
                                  • String ID: 64-bit helper EXE wasn't extracted$Cannot utilize 64-bit features on this version of Windows$CreateFile$CreateNamedPipe$CreateProcess$D$Helper process PID: %u$SetNamedPipeHandleState$Starting 64-bit helper process.$\\.\pipe\InnoSetup64BitHelper-%.8x-%.8x-%.8x-%.8x%.8x$helper %d 0x%x$i
                                  • API String ID: 2260430365-3271284199
                                  • Opcode ID: 1783b194f199276eba612994a805641d63c54d8f7919fbfe4a5f048a1358e5f9
                                  • Instruction ID: 5dda2180c8029377283f5e8c97df4513cffb495ec464450a2f753e82b6758bef
                                  • Opcode Fuzzy Hash: 1783b194f199276eba612994a805641d63c54d8f7919fbfe4a5f048a1358e5f9
                                  • Instruction Fuzzy Hash: 80714570E043449FDB10EB69DC45B9EBBF8AB19305F1084BAF908EB282D7785944CF69
                                  APIs
                                  • GetVersion.KERNEL32 ref: 0045BB46
                                  • GetModuleHandleA.KERNEL32(advapi32.dll), ref: 0045BB66
                                  • 6D166DE0.KERNEL32(00000000,GetNamedSecurityInfoW,advapi32.dll), ref: 0045BB73
                                  • 6D166DE0.KERNEL32(00000000,SetNamedSecurityInfoW,00000000,GetNamedSecurityInfoW,advapi32.dll), ref: 0045BB80
                                  • 6D166DE0.KERNEL32(00000000,SetEntriesInAclW,00000000,SetNamedSecurityInfoW,00000000,GetNamedSecurityInfoW,advapi32.dll), ref: 0045BB8E
                                    • Part of subcall function 0045BA34: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00000000,0045BAD3,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0045BAAD
                                  • AllocateAndInitializeSid.ADVAPI32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045BD81,?,?,00000000), ref: 0045BC47
                                  • GetLastError.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,0045BD81,?,?,00000000), ref: 0045BC50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$AllocateByteCharErrorHandleInitializeLastModuleMultiVersionWide
                                  • String ID: GetNamedSecurityInfoW$SetEntriesInAclW$SetNamedSecurityInfoW$W$advapi32.dll
                                  • API String ID: 310572366-4263478283
                                  • Opcode ID: 958e49eeb0df348717a563a094f26a8e19c2aa33f2d6f1951a388e184588486f
                                  • Instruction ID: 8e733099f29d86de2dbb2654b0efe3c2ee40efbec8090b1f800075a1b211c088
                                  • Opcode Fuzzy Hash: 958e49eeb0df348717a563a094f26a8e19c2aa33f2d6f1951a388e184588486f
                                  • Instruction Fuzzy Hash: D15172B1900608EFDB11DF99C841BEEB7B8EB48315F14846AF905B7281C7789949CFA9
                                  APIs
                                    • Part of subcall function 00476700: GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021D2BFC,?,?,?,021D2BFC,004767EC,00000000,0047690A,?,?,?,?), ref: 00476719
                                    • Part of subcall function 00476700: 6D166DE0.KERNEL32(00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BFC,?,?,?,021D2BFC,004767EC,00000000,0047690A,?,?,?,?), ref: 0047671F
                                    • Part of subcall function 00476700: 6D1674B0.KERNEL32(00000000,00000080,00000007,00000000,00000003,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BFC,?,?,?,021D2BFC,004767EC), ref: 00476741
                                    • Part of subcall function 00476700: CloseHandle.KERNEL32(00000000,?,?,?,021D2BFC,004767EC,00000000,0047690A,?,?,?,?), ref: 0047675F
                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 00476844
                                  • GetLastError.KERNEL32(00000000,0047690A,?,?,?,?), ref: 0047684D
                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0047689A
                                  • GetExitCodeProcess.KERNEL32(00000000,00000000), ref: 004768BE
                                  • CloseHandle.KERNEL32(00000000,004768EF,00000000,00000000,000000FF,000000FF,00000000,004768E8,?,00000000,0047690A,?,?,?,?), ref: 004768E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Handle$Close$CodeD166D1674DirectoryErrorExecuteExitLastModuleMultipleObjectsProcessShellSystemWait
                                  • String ID: <$GetExitCodeProcess$MsgWaitForMultipleObjects$ShellExecuteEx$ShellExecuteEx returned hProcess=0$runas
                                  • API String ID: 110906439-221126205
                                  • Opcode ID: fa1fdbb6ef41087a1d5ec77f541e807b940cc79beb18a6ca0dd9f45c97c909d0
                                  • Instruction ID: 8385799db3b80b867222ea474ac0104d49ac410ce9359fc04928196f762fb440
                                  • Opcode Fuzzy Hash: fa1fdbb6ef41087a1d5ec77f541e807b940cc79beb18a6ca0dd9f45c97c909d0
                                  • Instruction Fuzzy Hash: 0F3166B0D00608AFDB10EFA6C9416DEB6B9EF05314F52843BF508F6281D77C59048B59
                                  APIs
                                  • SendMessageA.USER32(00000000,00000223,00000000,00000000), ref: 00422964
                                  • ShowWindow.USER32(00000000,00000003,00000000,00000223,00000000,00000000,00000000,00422B2E), ref: 00422974
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MessageSendShowWindow
                                  • String ID:
                                  • API String ID: 1631623395-0
                                  • Opcode ID: f400f29292c35972605643c7420a49c437518459aae75a01a386a4deb5ab9326
                                  • Instruction ID: ce44026f944b421b325d7338e8876f8bc9f7615d7165fbb9eb6326590add080f
                                  • Opcode Fuzzy Hash: f400f29292c35972605643c7420a49c437518459aae75a01a386a4deb5ab9326
                                  • Instruction Fuzzy Hash: 89917271B04214FFD710EBA9DA86F9D77F4AB09314F5104BAF504AB3A2C778AE409B58
                                  APIs
                                  • IsIconic.USER32(?), ref: 00418303
                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00418320
                                  • GetWindowRect.USER32(?), ref: 0041833C
                                  • GetWindowLongA.USER32(?,000000F0), ref: 0041834A
                                  • GetWindowLongA.USER32(?,000000F8), ref: 0041835F
                                  • ScreenToClient.USER32(00000000), ref: 00418368
                                  • ScreenToClient.USER32(00000000,?), ref: 00418373
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$ClientLongScreen$IconicPlacementRect
                                  • String ID: ,
                                  • API String ID: 2266315723-3772416878
                                  • Opcode ID: 6e73cc248294e567c08844e3e97027ea107a04c87d830052551685df03000aaa
                                  • Instruction ID: 9cf88c6662a8b54f2d940af1896da5675c8924d24fa9a5d7825e36bf04e718ba
                                  • Opcode Fuzzy Hash: 6e73cc248294e567c08844e3e97027ea107a04c87d830052551685df03000aaa
                                  • Instruction Fuzzy Hash: 40112B71505201AFDB00DF69C885F9B77E8AF49314F18067EBD58DB286C739D900CB69
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000028), ref: 0045468F
                                  • OpenProcessToken.ADVAPI32(00000000,00000028), ref: 00454695
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,00000028), ref: 004546AE
                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000002,00000000,00000000,00000000), ref: 004546D5
                                  • GetLastError.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 004546DA
                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 004546EB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ProcessToken$AdjustCurrentErrorExitLastLookupOpenPrivilegePrivilegesValueWindows
                                  • String ID: SeShutdownPrivilege
                                  • API String ID: 107509674-3733053543
                                  • Opcode ID: 45243e81071a4d0099171459abff20c101db8c2c1ef78c9e38b53d2452503d26
                                  • Instruction ID: b7f6d46838bd3bccc4dc1746167af74d75703c36abf5067b30a583189c7acccc
                                  • Opcode Fuzzy Hash: 45243e81071a4d0099171459abff20c101db8c2c1ef78c9e38b53d2452503d26
                                  • Instruction Fuzzy Hash: 86F04470294702B5E610A6618C07F2B21D8978174DF50492ABA45EE1C3D6BD95494A6E
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00495EAA,?,?,00000000,00499628,?,00496034,00000000,00496088,?,?,00000000,00499628), ref: 00495DC3
                                  • 6D1682A0.KERNEL32(00000000,00000010), ref: 00495E46
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00495E82,?,00000000,?,00000000,00495EAA,?,?,00000000,00499628,?,00496034,00000000), ref: 00495E5E
                                  • FindClose.KERNEL32(000000FF,00495E89,00495E82,?,00000000,?,00000000,00495EAA,?,?,00000000,00499628,?,00496034,00000000,00496088), ref: 00495E7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseD1682FirstNext
                                  • String ID: isRS-$isRS-???.tmp
                                  • API String ID: 1540395035-3422211394
                                  • Opcode ID: 924c48f2dd38d885b52aa8456a45481e29b6cdafa0841f215cd12a525bbb9fe5
                                  • Instruction ID: 51b8b4b56f696a9f7b81a5499dc3405eebcd4bf6df5e4c50c2d69a2fb379c021
                                  • Opcode Fuzzy Hash: 924c48f2dd38d885b52aa8456a45481e29b6cdafa0841f215cd12a525bbb9fe5
                                  • Instruction Fuzzy Hash: C0316571901A08AFDF11EF65CC41ADEBBBCDB49314F6084B7A908A32A1D6389F458F58
                                  APIs
                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 004560DD
                                  • PostMessageA.USER32(00000000,00000000,00000000,00000000), ref: 00456104
                                  • SetForegroundWindow.USER32(?), ref: 00456115
                                  • NtdllDefWindowProc_A.USER32(00000000,?,?,?,00000000,004563F1,?,00000000,0045642D), ref: 004563DC
                                  Strings
                                  • Cannot evaluate variable because [Code] isn't running yet, xrefs: 0045625C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MessagePostWindow$ForegroundNtdllProc_
                                  • String ID: Cannot evaluate variable because [Code] isn't running yet
                                  • API String ID: 2236967946-3182603685
                                  • Opcode ID: f96bd67d6e719d7c14ff404dc9ce2902b2b73d96e31f43a70127e85161c07d86
                                  • Instruction ID: c437d9d319fdcf54711087da35e0caf05be660954f304f0fcbb6d0e5908c51c0
                                  • Opcode Fuzzy Hash: f96bd67d6e719d7c14ff404dc9ce2902b2b73d96e31f43a70127e85161c07d86
                                  • Instruction Fuzzy Hash: B591CE34604244EFDB15CF59C951F5ABBF9EB89704F6280BAFC0497792C739AE08CA19
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,0047395E,?,?,00000001,0049A160), ref: 0047384D
                                  • FindNextFileA.KERNEL32(00000000,?,00000000,?,00000000,0047395E,?,?,00000001,0049A160), ref: 0047392A
                                  • FindClose.KERNEL32(00000000,00000000,?,00000000,?,00000000,0047395E,?,?,00000001,0049A160), ref: 00473938
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseFirstNext
                                  • String ID: unins$unins???.*
                                  • API String ID: 3541575487-1009660736
                                  • Opcode ID: e220ed5e2e58537d168cca54789f9dbe2d38019618661ffbb8a4df500e75eafd
                                  • Instruction ID: 8a48721e5040b12f1de29ea0e0fb1571e59e2bbe74995f223e62527676c00a63
                                  • Opcode Fuzzy Hash: e220ed5e2e58537d168cca54789f9dbe2d38019618661ffbb8a4df500e75eafd
                                  • Instruction Fuzzy Hash: 6C3183B0600108AFCB50EF65C985ADEB7A8EF44305F5080B6A54CAB3A2DB78DF419F58
                                  APIs
                                  • IsIconic.USER32(?), ref: 00417C7F
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$Placement$Iconic
                                  • String ID: ,
                                  • API String ID: 568898626-3772416878
                                  • Opcode ID: 8175cc34318b0d3d4d46b69db781030ac140a1ffce7c62a0a6e8fdca1920ea86
                                  • Instruction ID: c7e48a005123f112bfb3c773aae920d88014dc0855fb7fe4f04d55f6c4297c8c
                                  • Opcode Fuzzy Hash: 8175cc34318b0d3d4d46b69db781030ac140a1ffce7c62a0a6e8fdca1920ea86
                                  • Instruction Fuzzy Hash: 92213E71604204ABCF00EF69D8C4ADA77B8AF48314F11456AFD18DF346D678E984CBA8
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001,00000000,00462DF1), ref: 00462C65
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00462DC4,?,00000001,00000000,00462DF1), ref: 00462CF4
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00462DA6,?,00000000,?,00000000,00462DC4,?,00000001,00000000,00462DF1), ref: 00462D86
                                  • FindClose.KERNEL32(000000FF,00462DAD,00462DA6,?,00000000,?,00000000,00462DC4,?,00000001,00000000,00462DF1), ref: 00462DA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseErrorFirstModeNext
                                  • String ID:
                                  • API String ID: 4011626565-0
                                  • Opcode ID: f547fdcbc44a8c112d4019de1d65e8a81ad1883d3f246a121560aae8052cff23
                                  • Instruction ID: 245f7c2356111990964258e8cb2593098eb52ff44e20f951769af61cb2cb26ba
                                  • Opcode Fuzzy Hash: f547fdcbc44a8c112d4019de1d65e8a81ad1883d3f246a121560aae8052cff23
                                  • Instruction Fuzzy Hash: A941BB74A00A18AFCB10EF65DD45ADEB7B8EB88305F4044BAF404E7391E77C9E488E59
                                  APIs
                                  • SetErrorMode.KERNEL32(00000001,00000000,00463297), ref: 00463125
                                  • FindFirstFileA.KERNEL32(00000000,?,00000000,00463262,?,00000001,00000000,00463297), ref: 0046316B
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00463244,?,00000000,?,00000000,00463262,?,00000001,00000000,00463297), ref: 00463220
                                  • FindClose.KERNEL32(000000FF,0046324B,00463244,?,00000000,?,00000000,00463262,?,00000001,00000000,00463297), ref: 0046323E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$File$CloseErrorFirstModeNext
                                  • String ID:
                                  • API String ID: 4011626565-0
                                  • Opcode ID: 883b117e1face215178b9a72dedaafde048cd9776df124574b792d3a23bac4fb
                                  • Instruction ID: 5843323c3d4a6ea9c1c24b6d88c46a3fcdf04d923c7410ee6712d33f4b49ef12
                                  • Opcode Fuzzy Hash: 883b117e1face215178b9a72dedaafde048cd9776df124574b792d3a23bac4fb
                                  • Instruction Fuzzy Hash: D9418334A006589BCB10EFA5CC959DEB7B8EB88306F5044EAF804A7341E7389E448E49
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452127,00000000,00452148), ref: 0042E6C2
                                  • DeviceIoControl.KERNEL32(00000000,0009C040,?,00000002,00000000,00000000,?,00000000), ref: 0042E6ED
                                  • GetLastError.KERNEL32(00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452127,00000000,00452148), ref: 0042E6FA
                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452127,00000000,00452148), ref: 0042E702
                                  • SetLastError.KERNEL32(00000000,00000000,00000000,C0000000,00000001,00000000,00000003,02000000,00000000,?,?,?,?,00452127,00000000,00452148), ref: 0042E708
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CloseControlD1674DeviceHandle
                                  • String ID:
                                  • API String ID: 1783607827-0
                                  • Opcode ID: 0e5e7c90a65406167f7898170dc945b3353e2cbee806782c6914c5c21f74b8b4
                                  • Instruction ID: 69ba716829895e5093af9d36c621d6373ea650b16a5cb4695acc15b02c1957a3
                                  • Opcode Fuzzy Hash: 0e5e7c90a65406167f7898170dc945b3353e2cbee806782c6914c5c21f74b8b4
                                  • Instruction Fuzzy Hash: AFF090713A17203AF620B1BA6C87F7B418CC7C5B68F10823ABB04FF1C1D9A85D06566D
                                  APIs
                                  • IsIconic.USER32(?), ref: 004812A2
                                  • GetWindowLongA.USER32(00000000,000000F0), ref: 004812C0
                                  • ShowWindow.USER32(00000000,00000005,00000000,000000F0,0049A03C,00480A6A,00480A9E,00000000,00480ABE,?,?,00000001,0049A03C), ref: 004812E2
                                  • ShowWindow.USER32(00000000,00000000,00000000,000000F0,0049A03C,00480A6A,00480A9E,00000000,00480ABE,?,?,00000001,0049A03C), ref: 004812F6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$Show$IconicLong
                                  • String ID:
                                  • API String ID: 2754861897-0
                                  • Opcode ID: 2db370611a20db9f75072be09b46ad1da7a5ebdcfae9fdd5b085a6149f7b7dea
                                  • Instruction ID: b09d18af8882c8ebd922b8a88fb257c9fa0d5cabb13e1bf256af569dfdd4690a
                                  • Opcode Fuzzy Hash: 2db370611a20db9f75072be09b46ad1da7a5ebdcfae9fdd5b085a6149f7b7dea
                                  • Instruction Fuzzy Hash: B40171706002009AE710FBA9DC85B5E23A86F15344F1408BBF841FB3B3CA2D9C96975D
                                  APIs
                                  • IsIconic.USER32(?), ref: 00424154
                                  • SetActiveWindow.USER32(?,?,?,0046B592), ref: 00424161
                                    • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                    • Part of subcall function 00423A84: SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013,?,021D25AC,0042417A,?,?,?,0046B592), ref: 00423ABF
                                  • SetFocus.USER32(00000000,?,?,?,0046B592), ref: 0042418E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$ActiveFocusIconicShow
                                  • String ID:
                                  • API String ID: 649377781-0
                                  • Opcode ID: d45248867ec258f00586a254dd3104dbd769442af7a587b2194b96412798c385
                                  • Instruction ID: 5fc4ce76e2fd56d68edf849e8d27c6cce982c94ba176b6555b019de7a1c50f04
                                  • Opcode Fuzzy Hash: d45248867ec258f00586a254dd3104dbd769442af7a587b2194b96412798c385
                                  • Instruction Fuzzy Hash: 76F0307170012087DB00AFA998C4B9633A8AF48304B55017BBD05DF34BC67CDC518768
                                  APIs
                                  • IsIconic.USER32(?), ref: 00417C7F
                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000014,?), ref: 00417C9D
                                  • GetWindowPlacement.USER32(?,0000002C), ref: 00417CD3
                                  • SetWindowPlacement.USER32(?,0000002C,?,0000002C), ref: 00417CFA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$Placement$Iconic
                                  • String ID:
                                  • API String ID: 568898626-0
                                  • Opcode ID: f049b6242392f3fa064e4b255df9e6ab0247290bd5849ac8a9f990d63e31907e
                                  • Instruction ID: f0313cfea0d4087130c3a657ee055cc65a4736f61d4b278e94d42609036002a6
                                  • Opcode Fuzzy Hash: f049b6242392f3fa064e4b255df9e6ab0247290bd5849ac8a9f990d63e31907e
                                  • Instruction Fuzzy Hash: 31015A31204104ABDF10EE6A98C5EEA73A8AF44324F114166FD08CF342E638EC8086A8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CaptureIconic
                                  • String ID:
                                  • API String ID: 2277910766-0
                                  • Opcode ID: a2e06a33e56df2b28c1ac7c51cd9509904dcce81530e1026fa055b848d635906
                                  • Instruction ID: 91c5476f6810031d6ba28f55d540498aeba2d497fd4f51dff2acf4b465765a2b
                                  • Opcode Fuzzy Hash: a2e06a33e56df2b28c1ac7c51cd9509904dcce81530e1026fa055b848d635906
                                  • Instruction Fuzzy Hash: FFF08171B04602A7DB20E72EC8C4AAB62B69F44394B54403BF415C7B96EA7CDCC08218
                                  APIs
                                  • IsIconic.USER32(?), ref: 0042410B
                                    • Part of subcall function 004239F4: EnumWindows.USER32(0042398C), ref: 00423A18
                                    • Part of subcall function 004239F4: GetWindow.USER32(?,00000003), ref: 00423A2D
                                    • Part of subcall function 004239F4: GetWindowLongA.USER32(?,000000EC), ref: 00423A3C
                                    • Part of subcall function 004239F4: SetWindowPos.USER32(00000000,004240CC,00000000,00000000,00000000,00000000,00000013,?,000000EC,?,?,?,0042411B,?,?,00423CE3), ref: 00423A72
                                  • SetActiveWindow.USER32(?,?,?,00423CE3,00000000,004240CC), ref: 0042411F
                                    • Part of subcall function 004235BC: ShowWindow.USER32(004105C0,00000009,?,00000000,0041ED14,004238AA,00000000,00400000,00000000,00000000,00000000,00000000,00000000,00000001,00000000,00423B7C), ref: 004235D7
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$ActiveEnumIconicLongShowWindows
                                  • String ID:
                                  • API String ID: 2671590913-0
                                  • Opcode ID: 5c58d947887613df8a1a5b004a34a5df3c7671d93cde12ce2b76e9099da7ea36
                                  • Instruction ID: b8e4b42960b6b3797255afb6d30997fccd36cf0c86298b6f3b138aeb4614201e
                                  • Opcode Fuzzy Hash: 5c58d947887613df8a1a5b004a34a5df3c7671d93cde12ce2b76e9099da7ea36
                                  • Instruction Fuzzy Hash: 76E0E5A0300100C7EB00AFAAD8C9B9672A9BB48304F5501BABC08CF24BD6B8C8948724
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?,00000000,00412745), ref: 00412733
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: 27474152015bcb4eb7b2f8a6969131eccbf80fc009b9960156e7ba565eb19cfa
                                  • Instruction ID: 84e48a5dd71b03e3ac7236ce71605b31f373ae1f90ae0861ad1c16be3c7d11b6
                                  • Opcode Fuzzy Hash: 27474152015bcb4eb7b2f8a6969131eccbf80fc009b9960156e7ba565eb19cfa
                                  • Instruction Fuzzy Hash: AD51D3356042059FD710DF5AD681A9BF3E5FF98304B3482ABE814C73A1D6B8AD92874C
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 00476EC6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: 9766044ec5c9c5551cc162b5214fc7164479d034182359d6f3940f7bbfd4ac84
                                  • Instruction ID: d332b3b291fea780df115372bad64309aad823c84261d4603bcd034d5ab83380
                                  • Opcode Fuzzy Hash: 9766044ec5c9c5551cc162b5214fc7164479d034182359d6f3940f7bbfd4ac84
                                  • Instruction Fuzzy Hash: 0F414A79604515EFCB20CF99C6808AAB7F6EB48310B36C596E84CDB715D338EE41DB64
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: NameUser
                                  • String ID:
                                  • API String ID: 2645101109-0
                                  • Opcode ID: f1f66408e8c2c1a17f1262e63008d16cb7fa0479c05ae9f4636daabb8754f5ab
                                  • Instruction ID: d556a237bff46435c21392b4e3186fec9b646bf01b8c2644f25cdf3d499efc1f
                                  • Opcode Fuzzy Hash: f1f66408e8c2c1a17f1262e63008d16cb7fa0479c05ae9f4636daabb8754f5ab
                                  • Instruction Fuzzy Hash: 9BD0127170420067D700AAA9AC82A9A758D8BC4359F00493F7CC5DE2D3EABDDA8C56A6
                                  APIs
                                  • NtdllDefWindowProc_A.USER32(?,?,?,?), ref: 0042F01C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: NtdllProc_Window
                                  • String ID:
                                  • API String ID: 4255912815-0
                                  • Opcode ID: ff2059a00e1596a3655d033c7c7c0ff7ada576643e9dcda53c8e44a3788e9446
                                  • Instruction ID: a3f2727a8225cce52aa332fac080a49b8e88e69fc98919c7d6858de85465de56
                                  • Opcode Fuzzy Hash: ff2059a00e1596a3655d033c7c7c0ff7ada576643e9dcda53c8e44a3788e9446
                                  • Instruction Fuzzy Hash: 5DD09E7121011D6B9B00DE99E840C6B33AD9B88710BA0C929F959C7246D634ED5197B9
                                  APIs
                                    • Part of subcall function 0044AAC4: GetVersionExA.KERNEL32(00000094), ref: 0044AAE1
                                  • LoadLibraryA.KERNEL32(uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB3F
                                  • 6D166DE0.KERNEL32(00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB57
                                  • 6D166DE0.KERNEL32(00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB69
                                  • 6D166DE0.KERNEL32(00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB7B
                                  • 6D166DE0.KERNEL32(00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB8D
                                  • 6D166DE0.KERNEL32(00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB9F
                                  • 6D166DE0.KERNEL32(00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044ABB1
                                  • 6D166DE0.KERNEL32(00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll), ref: 0044ABC3
                                  • 6D166DE0.KERNEL32(00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData), ref: 0044ABD5
                                  • 6D166DE0.KERNEL32(00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData), ref: 0044ABE7
                                  • 6D166DE0.KERNEL32(00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground), ref: 0044ABF9
                                  • 6D166DE0.KERNEL32(00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText), ref: 0044AC0B
                                  • 6D166DE0.KERNEL32(00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect), ref: 0044AC1D
                                  • 6D166DE0.KERNEL32(00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect), ref: 0044AC2F
                                  • 6D166DE0.KERNEL32(00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize), ref: 0044AC41
                                  • 6D166DE0.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent), ref: 0044AC53
                                  • 6D166DE0.KERNEL32(00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics), ref: 0044AC65
                                  • 6D166DE0.KERNEL32(00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion), ref: 0044AC77
                                  • 6D166DE0.KERNEL32(00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground), ref: 0044AC89
                                  • 6D166DE0.KERNEL32(00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge), ref: 0044AC9B
                                  • 6D166DE0.KERNEL32(00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon), ref: 0044ACAD
                                  • 6D166DE0.KERNEL32(00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined), ref: 0044ACBF
                                  • 6D166DE0.KERNEL32(00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent), ref: 0044ACD1
                                  • 6D166DE0.KERNEL32(00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric,00000000,GetThemeColor), ref: 0044ACE3
                                  • 6D166DE0.KERNEL32(00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString,00000000,GetThemeMetric), ref: 0044ACF5
                                  • 6D166DE0.KERNEL32(00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool,00000000,GetThemeString), ref: 0044AD07
                                  • 6D166DE0.KERNEL32(00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt,00000000,GetThemeBool), ref: 0044AD19
                                  • 6D166DE0.KERNEL32(00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue,00000000,GetThemeInt), ref: 0044AD2B
                                  • 6D166DE0.KERNEL32(00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition,00000000,GetThemeEnumValue), ref: 0044AD3D
                                  • 6D166DE0.KERNEL32(00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont,00000000,GetThemePosition), ref: 0044AD4F
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect,00000000,GetThemeFont), ref: 0044AD61
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins,00000000,GetThemeRect), ref: 0044AD73
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList,00000000,GetThemeMargins), ref: 0044AD85
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin,00000000,GetThemeIntList), ref: 0044AD97
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme,00000000,GetThemePropertyOrigin), ref: 0044ADA9
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename,00000000,SetWindowTheme), ref: 0044ADBB
                                  • 6D166DE0.KERNEL32(00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor,00000000,GetThemeFilename), ref: 0044ADCD
                                  • 6D166DE0.KERNEL32(00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush,00000000,GetThemeSysColor), ref: 0044ADDF
                                  • 6D166DE0.KERNEL32(00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool,00000000,GetThemeSysColorBrush), ref: 0044ADF1
                                  • 6D166DE0.KERNEL32(00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize,00000000,GetThemeSysBool), ref: 0044AE03
                                  • 6D166DE0.KERNEL32(00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont,00000000,GetThemeSysSize), ref: 0044AE15
                                  • 6D166DE0.KERNEL32(00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString,00000000,GetThemeSysFont), ref: 0044AE27
                                  • 6D166DE0.KERNEL32(00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt,00000000,GetThemeSysString), ref: 0044AE39
                                  • 6D166DE0.KERNEL32(00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive,00000000,GetThemeSysInt), ref: 0044AE4B
                                  • 6D166DE0.KERNEL32(00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed,00000000,IsThemeActive), ref: 0044AE5D
                                  • 6D166DE0.KERNEL32(00000000,GetThemeDocumentationProperty,00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme,00000000,IsAppThemed), ref: 0044AE6F
                                  • 6D166DE0.KERNEL32(00000000,DrawThemeParentBackground,00000000,GetThemeDocumentationProperty,00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture,00000000,GetWindowTheme), ref: 0044AE81
                                  • 6D166DE0.KERNEL32(00000000,EnableTheming,00000000,DrawThemeParentBackground,00000000,GetThemeDocumentationProperty,00000000,GetCurrentThemeName,00000000,SetThemeAppProperties,00000000,GetThemeAppProperties,00000000,IsThemeDialogTextureEnabled,00000000,EnableThemeDialogTexture), ref: 0044AE93
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$LibraryLoadVersion
                                  • String ID: CloseThemeData$DrawThemeBackground$DrawThemeEdge$DrawThemeIcon$DrawThemeParentBackground$DrawThemeText$EnableThemeDialogTexture$EnableTheming$GetCurrentThemeName$GetThemeAppProperties$GetThemeBackgroundContentRect$GetThemeBackgroundRegion$GetThemeBool$GetThemeColor$GetThemeDocumentationProperty$GetThemeEnumValue$GetThemeFilename$GetThemeFont$GetThemeInt$GetThemeIntList$GetThemeMargins$GetThemeMetric$GetThemePartSize$GetThemePosition$GetThemePropertyOrigin$GetThemeRect$GetThemeString$GetThemeSysBool$GetThemeSysColor$GetThemeSysColorBrush$GetThemeSysFont$GetThemeSysInt$GetThemeSysSize$GetThemeSysString$GetThemeTextExtent$GetThemeTextMetrics$GetWindowTheme$HitTestThemeBackground$IsAppThemed$IsThemeActive$IsThemeBackgroundPartiallyTransparent$IsThemeDialogTextureEnabled$IsThemePartDefined$OpenThemeData$SetThemeAppProperties$SetWindowTheme$uxtheme.dll
                                  • API String ID: 48091293-2910565190
                                  • Opcode ID: 1d5e7f326ef7fc7d4d80aaa0eb9f01f3f65f1c66a345f784a01a005393b3e03b
                                  • Instruction ID: 23a61038ac75b3b0b067e02792df25c67946ab2422e9ce29a72673a1f71d3a80
                                  • Opcode Fuzzy Hash: 1d5e7f326ef7fc7d4d80aaa0eb9f01f3f65f1c66a345f784a01a005393b3e03b
                                  • Instruction Fuzzy Hash: 669182B0A40B50EBEF00EFF998C6A2636A8EB15B1471445BBB444EF295D778DC04CF59
                                  APIs
                                    • Part of subcall function 0046D7C4: 6D168150.ADVAPI32(?,Inno Setup: Setup Version,00000000,00000001,00000000,00000001,?,004748B5,0049A160,?,0046DADB,?,00000000,0046E032,?,_is1), ref: 0046D7E7
                                  • 6D167B60.ADVAPI32(?,0046E039,?,_is1,?,Software\Microsoft\Windows\CurrentVersion\Uninstall\,00000000,0046E084,?,?,00000001,0049A160), ref: 0046E02C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167D168150
                                  • String ID: " /SILENT$5.3.9 (a)$Comments$Contact$DisplayIcon$DisplayName$DisplayVersion$EstimatedSize$HelpLink$HelpTelephone$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: Language$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: Setup Version$Inno Setup: User$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$InstallDate$InstallLocation$MajorVersion$MinorVersion$ModifyPath$NoModify$NoRepair$Publisher$QuietUninstallString$Readme$RegisterPreviousData$Software\Microsoft\Windows\CurrentVersion\Uninstall\$URLInfoAbout$URLUpdateInfo$UninstallString$_is1
                                  • API String ID: 2648290316-1831515863
                                  • Opcode ID: f5614a6b3879e896b481079cb84c961a5d41588f8e908e33e68097be419b31a2
                                  • Instruction ID: 5b29a30331640670f4cf9921d9108c8d1be0cec7446e1f60569eb820528e4c3a
                                  • Opcode Fuzzy Hash: f5614a6b3879e896b481079cb84c961a5d41588f8e908e33e68097be419b31a2
                                  • Instruction Fuzzy Hash: A1122334E001089FDB04EB96D885ADE73F5EB48304F20857BE8156B396EB79AD41CB5A
                                  APIs
                                  • Sleep.KERNEL32(00000000,00000000,0049090D,?,?,?,?,00000000,00000000,00000000), ref: 00490458
                                  • FindWindowA.USER32(00000000,00000000), ref: 00490489
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FindSleepWindow
                                  • String ID: CALLDLLPROC$CHARTOOEMBUFF$CREATEMUTEX$FINDWINDOWBYCLASSNAME$FINDWINDOWBYWINDOWNAME$FREEDLL$LOADDLL$OEMTOCHARBUFF$POSTBROADCASTMESSAGE$POSTMESSAGE$REGISTERWINDOWMESSAGE$SENDBROADCASTMESSAGE$SENDBROADCASTNOTIFYMESSAGE$SENDMESSAGE$SENDNOTIFYMESSAGE$SLEEP
                                  • API String ID: 3078808852-3310373309
                                  • Opcode ID: 2922215552881872f70abd2422ad2c704b71823ee53133ea12d4e3c776771d80
                                  • Instruction ID: 34c7feca907183e38f9e7e62941ef3efdf59270ea588281af32103c30a42d3d0
                                  • Opcode Fuzzy Hash: 2922215552881872f70abd2422ad2c704b71823ee53133ea12d4e3c776771d80
                                  • Instruction Fuzzy Hash: 15C140A0B002106BDF14BA3E8C5251F5A9A9F99704B11D93FB546EB78BCE3DDC05439E
                                  APIs
                                  • CreateMutexA.KERNEL32(00497AE4,00000001,00000000,00000000,0045714D,?,?,?,00000001,?,00457367,00000000,0045737D,?,00000000,00499628), ref: 00456E65
                                  • CreateFileMappingA.KERNEL32(000000FF,00497AE4,00000004,00000000,00002018,00000000), ref: 00456E9D
                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00002018,00000000,00457123,?,00497AE4,00000001,00000000,00000000,0045714D,?,?,?), ref: 00456EC4
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456FD1
                                  • ReleaseMutex.KERNEL32(00000000,00000000,00000002,00000000,00000000,00002018,00000000,00457123,?,00497AE4,00000001,00000000,00000000,0045714D), ref: 00456F29
                                    • Part of subcall function 00452684: GetLastError.KERNEL32(00000000,004530F5,00000005,00000000,0045312A,?,?,00000000,00499628,00000004,00000000,00000000,00000000,?,0049606D,00000000), ref: 00452687
                                  • CloseHandle.KERNEL32(?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00456FE8
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457021
                                  • GetLastError.KERNEL32(00000000,000000FF,?,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457033
                                  • UnmapViewOfFile.KERNEL32(00000000,0045712A,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457105
                                  • CloseHandle.KERNEL32(00000000,0045712A,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 00457114
                                  • CloseHandle.KERNEL32(00000000,0045712A,00000000,00000000,00000000,00000000,00000001,04000000,00000000,00000000,00000044,?), ref: 0045711D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle$ErrorLastMutexView$MappingObjectProcessReleaseSingleUnmapWait
                                  • String ID: CreateFileMapping$CreateMutex$CreateProcess$D$GetProcAddress$LoadLibrary$MapViewOfFile$OleInitialize$REGDLL failed with exit code 0x%x$REGDLL mutex wait failed (%d, %d)$REGDLL returned unknown result code %d$ReleaseMutex$Spawning _RegDLL.tmp$_RegDLL.tmp %u %u$_isetup\_RegDLL.tmp$gsE$}sE
                                  • API String ID: 4012871263-2567305340
                                  • Opcode ID: 2e09ef0dd6c003555dfb7aaf4f2163ebe4a730367404d00d1d95f0158be56c37
                                  • Instruction ID: be3413ed5186559677fde55407b11f62f9f9b75efdae8f043e5f2ee1d3cc33bc
                                  • Opcode Fuzzy Hash: 2e09ef0dd6c003555dfb7aaf4f2163ebe4a730367404d00d1d95f0158be56c37
                                  • Instruction Fuzzy Hash: E0918F70A042199FDB10EBA9D845B9EB7F4EB08305F50857BF814EB383DB789908CB59
                                  APIs
                                  • GetVersion.KERNEL32(?,00418F60,00000000,?,?,?,00000001), ref: 0041F096
                                  • SetErrorMode.KERNEL32(00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0B2
                                  • LoadLibraryA.KERNEL32(CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0BE
                                  • SetErrorMode.KERNEL32(00000000,CTL3D32.DLL,00008000,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0CC
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dRegister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F0FC
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F125
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F13A
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F14F
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000,?,?,?,00000001), ref: 0041F164
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000), ref: 0041F179
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60,00000000), ref: 0041F18E
                                  • 6D166DE0.KERNEL32(00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister,?,00418F60), ref: 0041F1A3
                                  • 6D166DE0.KERNEL32(00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl,00000001,Ctl3dUnregister), ref: 0041F1B8
                                  • 6D166DE0.KERNEL32(00000001,BtnWndProc3d,00000001,Ctl3DColorChange,00000001,Ctl3dUnAutoSubclass,00000001,Ctl3dAutoSubclass,00000001,Ctl3dCtlColorEx,00000001,Ctl3dDlgFramePaint,00000001,Ctl3dSubclassDlgEx,00000001,Ctl3dSubclassCtl), ref: 0041F1CD
                                  • FreeLibrary.KERNEL32(00000001,?,00418F60,00000000,?,?,?,00000001), ref: 0041F1DF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$ErrorLibraryMode$FreeLoadVersion
                                  • String ID: BtnWndProc3d$CTL3D32.DLL$Ctl3DColorChange$Ctl3dAutoSubclass$Ctl3dCtlColorEx$Ctl3dDlgFramePaint$Ctl3dRegister$Ctl3dSubclassCtl$Ctl3dSubclassDlgEx$Ctl3dUnAutoSubclass$Ctl3dUnregister
                                  • API String ID: 3037258462-3614243559
                                  • Opcode ID: 83202a5e5668af5360d98896c54bafd8752203d7ddc02880caf24378f1438677
                                  • Instruction ID: 92a9843203eddb7f9aab2fbfa73ed58fb88c7fc0ed44efda6b06a7d9d2ff7431
                                  • Opcode Fuzzy Hash: 83202a5e5668af5360d98896c54bafd8752203d7ddc02880caf24378f1438677
                                  • Instruction Fuzzy Hash: 1C311DB1614701EBDF40EBF5AC86A663394B728724B45093FB508DB5A3D77C488ACB1C
                                  APIs
                                  • 73F7A570.USER32(00000000,?,0041A8B4,?), ref: 0041C9B0
                                  • 73F84C40.GDI32(?,00000000,?,0041A8B4,?), ref: 0041C9BC
                                  • 73F86180.GDI32(0041A8B4,?,00000001,00000001,00000000,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9E0
                                  • 73F84C00.GDI32(?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4,?), ref: 0041C9F0
                                  • SelectObject.GDI32(0041CDAC,00000000), ref: 0041CA0B
                                  • FillRect.USER32(0041CDAC,?,?), ref: 0041CA46
                                  • SetTextColor.GDI32(0041CDAC,00000000), ref: 0041CA5B
                                  • SetBkColor.GDI32(0041CDAC,00000000), ref: 0041CA72
                                  • PatBlt.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00FF0062), ref: 0041CA88
                                  • 73F84C40.GDI32(?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4,?,00000000,0041CBD2,?,?,00000000,?,0041A8B4), ref: 0041CA9B
                                  • SelectObject.GDI32(00000000,00000000), ref: 0041CACC
                                  • 73F78830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?,0041A8B4), ref: 0041CAE4
                                  • 73F722A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B,?,0041CDAC,00000000,?), ref: 0041CAED
                                  • 73F78830.GDI32(0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CAFC
                                  • 73F722A0.GDI32(0041CDAC,0041CDAC,00000000,00000001,00000000,00000000,00000000,00000001,00000000,00000000,00000000,0041CB7A,?,?,00000000,0041CB8B), ref: 0041CB05
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041CB1E
                                  • SetBkColor.GDI32(00000000,00000000), ref: 0041CB35
                                  • 73F84D40.GDI32(0041CDAC,00000000,00000000,0041A8B4,?,00000000,00000000,00000000,00CC0020,00000000,00000000,00000000,0041CB7A,?,?,00000000), ref: 0041CB51
                                  • SelectObject.GDI32(00000000,?), ref: 0041CB5E
                                  • DeleteDC.GDI32(00000000), ref: 0041CB74
                                    • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Color$ObjectSelect$F722F78830Text$A570DeleteF86180FillRect
                                  • String ID:
                                  • API String ID: 4069456242-0
                                  • Opcode ID: 91f22b5f6011c81c357de1e84dc44a66cc3856cac21d8458ccd4d39da2566191
                                  • Instruction ID: 7128b10ae0d2f5501f58bad1f60f679124a592cf14607d549707b49f1954e982
                                  • Opcode Fuzzy Hash: 91f22b5f6011c81c357de1e84dc44a66cc3856cac21d8458ccd4d39da2566191
                                  • Instruction Fuzzy Hash: 5961FC71A44609ABDF10EBE5DC86FAFB7B8EF48704F10446AF504E7281C67CA9418B69
                                  APIs
                                  • AllocateAndInitializeSid.ADVAPI32(00497788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DEF6
                                  • GetVersion.KERNEL32(00000000,0042E0A0,?,00497788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF13
                                  • GetModuleHandleA.KERNEL32(advapi32.dll,CheckTokenMembership,00000000,0042E0A0,?,00497788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF2C
                                  • 6D166DE0.KERNEL32(00000000,advapi32.dll,CheckTokenMembership,00000000,0042E0A0,?,00497788,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042DF32
                                  • FreeSid.ADVAPI32(00000000,0042E0A7,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042E09A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AllocateD166FreeHandleInitializeModuleVersion
                                  • String ID: CheckTokenMembership$advapi32.dll
                                  • API String ID: 694118772-1888249752
                                  • Opcode ID: 27abd94bd871eef970cc38bdf925798c8b2615b9c2521e24353d865300782ff5
                                  • Instruction ID: dc513f8645b6afb09f6ffb8efb590dcade29d579fa2071de5649988e62e102ae
                                  • Opcode Fuzzy Hash: 27abd94bd871eef970cc38bdf925798c8b2615b9c2521e24353d865300782ff5
                                  • Instruction Fuzzy Hash: 7951B471B44629AEDB10EAE69C42FBF77ECEB09304F94447BB500E7282C5BC9805876D
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(?,00467EF2,?,?,00000001,00000000,00000000,00467F0D,?,00000000,00000000,?), ref: 00467EDB
                                  Strings
                                  • %s\%s_is1, xrefs: 00467D55
                                  • Inno Setup: User Info: Organization, xrefs: 00467EAA
                                  • Inno Setup: App Path, xrefs: 00467D9A
                                  • Inno Setup: Deselected Tasks, xrefs: 00467E69
                                  • Inno Setup: Setup Type, xrefs: 00467DEA
                                  • Inno Setup: No Icons, xrefs: 00467DC3
                                  • Inno Setup: User Info: Serial, xrefs: 00467EBD
                                  • Inno Setup: Icon Group, xrefs: 00467DB6
                                  • Inno Setup: User Info: Name, xrefs: 00467E97
                                  • Inno Setup: Deselected Components, xrefs: 00467E1C
                                  • Inno Setup: Selected Tasks, xrefs: 00467E47
                                  • Inno Setup: Selected Components, xrefs: 00467DFA
                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 00467D37
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: %s\%s_is1$Inno Setup: App Path$Inno Setup: Deselected Components$Inno Setup: Deselected Tasks$Inno Setup: Icon Group$Inno Setup: No Icons$Inno Setup: Selected Components$Inno Setup: Selected Tasks$Inno Setup: Setup Type$Inno Setup: User Info: Name$Inno Setup: User Info: Organization$Inno Setup: User Info: Serial$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                  • API String ID: 557493163-1093091907
                                  • Opcode ID: e2a28e799496d224bccfdf42ed31285894da2d8c9d7af7cea6902e25f9281dcf
                                  • Instruction ID: e5c6019ad645161c681394fc100f3765f3f925db4c14fea03ad9fce6ba1afad5
                                  • Opcode Fuzzy Hash: e2a28e799496d224bccfdf42ed31285894da2d8c9d7af7cea6902e25f9281dcf
                                  • Instruction Fuzzy Hash: 64510630A04208DFCB15DB65D891ADEBBF5EF48318F5084BAE844A7391E739AE05CB4D
                                  APIs
                                  • ShowWindow.USER32(?,00000005,00000000,00496430,?,?,00000000,?,00000000,00000000,?,004967BC,00000000,004967C6,?,00000000), ref: 0049611B
                                  • CreateMutexA.KERNEL32(00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496430,?,?,00000000,?,00000000,00000000,?,004967BC,00000000), ref: 0049612E
                                  • ShowWindow.USER32(?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496430,?,?,00000000,?,00000000,00000000), ref: 0049613E
                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 0049615F
                                  • ShowWindow.USER32(?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000,00496430,?,?,00000000,?,00000000), ref: 0049616F
                                    • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00495A8C,00000000,00495C55,?,?,00000005), ref: 0042D35D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ShowWindow$CreateFileModuleMultipleMutexNameObjectsWait
                                  • String ID: .lst$.msg$/REG$/REGU$Inno-Setup-RegSvr-Mutex$Setup
                                  • API String ID: 2000705611-3672972446
                                  • Opcode ID: 22b814efd2d416af5dc398edbcc4541f0bdcbab13d6dfeecec6cec306f084682
                                  • Instruction ID: 9f46506c941652713549f1b08c68450b6ccd64515b85c10261120fdd0c0fc2c8
                                  • Opcode Fuzzy Hash: 22b814efd2d416af5dc398edbcc4541f0bdcbab13d6dfeecec6cec306f084682
                                  • Instruction Fuzzy Hash: 16919734A042445FDF11EBA5D856BAE7FA4EB49704F5244B7F800A7692C67CAC05CB1D
                                  APIs
                                  • GetLastError.KERNEL32(00000000,00459900,?,?,?,?,?,00000006,?,00000000,004954CB,?,00000000,0049556E), ref: 004597B2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: .chm$.chw$.fts$.gid$.hlp$.lnk$Deleting file: %s$Failed to delete the file; it may be in use (%d).$Failed to strip read-only attribute.$Stripped read-only attribute.$The file appears to be in use (%d). Will delete on restart.
                                  • API String ID: 1452528299-3112430753
                                  • Opcode ID: 0e88e018359bd56ea83e9ca42840c69bb78ef335d06ecb36f793b854efb74337
                                  • Instruction ID: ae29bffe216161f3b84ec47cadcfa1b1e1b13bf6851d944a51d431fa1e6eb895
                                  • Opcode Fuzzy Hash: 0e88e018359bd56ea83e9ca42840c69bb78ef335d06ecb36f793b854efb74337
                                  • Instruction Fuzzy Hash: A1718F70B10244DBDB01EB6988927AE7BA5AB49315F50446FFC01DB383DB7C9D09C799
                                  APIs
                                  • 73F84C40.GDI32(00000000,?,00000000,?), ref: 0041B333
                                  • 73F84C40.GDI32(00000000,00000000,?,00000000,?), ref: 0041B33D
                                  • GetObjectA.GDI32(?,00000018,00000004), ref: 0041B34F
                                  • 73F86180.GDI32(0000000B,?,00000001,00000001,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B366
                                  • 73F7A570.USER32(00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B372
                                  • 73F84C00.GDI32(00000000,0000000B,?,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B39F
                                  • 73F7A480.USER32(00000000,00000000,0041B3D2,00000000,0041B3CB,?,00000000,?,00000018,00000004,00000000,00000000,?,00000000,?), ref: 0041B3C5
                                  • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                  • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                  • SelectObject.GDI32(?,00000000), ref: 0041B437
                                  • DeleteDC.GDI32(00000000), ref: 0041B440
                                  • DeleteDC.GDI32(?), ref: 0041B449
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Object$Select$Delete$A480A570F86180Stretch
                                  • String ID:
                                  • API String ID: 4017903488-0
                                  • Opcode ID: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                  • Instruction ID: ef99a8f9a6f00624a9096b2aeeb37702e3b70ceb3a8cbf3cb68c8f3869cb2bd7
                                  • Opcode Fuzzy Hash: e420a80018f5a27581da0c94fb8e2332c520fd2d58b05de39de388c6394c4d5d
                                  • Instruction Fuzzy Hash: 1541D071E40619AFDF10DAE9D846FEFB7BCEF08704F104466B614FB281C67869408BA4
                                  APIs
                                    • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 004715BF
                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 004716B6
                                  • SHChangeNotify.SHELL32(00000002,00000001,00000000,00000000), ref: 004716CC
                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 004716F1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ChangeNotify$FullNamePathPrivateProfileStringWrite
                                  • String ID: .lnk$.pif$.url$Desktop.ini$Filename: %s$target.lnk${group}\
                                  • API String ID: 971782779-3668018701
                                  • Opcode ID: 659e8c414b5663f48ca7240e38434f8f6fbc604e4898944c2aef02c753adbba7
                                  • Instruction ID: 276268ec1249541e405f117e75d64bf8d60ce4695a1b317412b56633e0787fc8
                                  • Opcode Fuzzy Hash: 659e8c414b5663f48ca7240e38434f8f6fbc604e4898944c2aef02c753adbba7
                                  • Instruction Fuzzy Hash: 50D11174A00249AFDB01EF99D885BDEBBF5AF08314F54402AF804B73A1D778AD45CB69
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • RegQueryValueExA.ADVAPI32(00459AD6,00000000,00000000,?,00000000,?,00000000,00453BB1,?,00459AD6,00000003,00000000,00000000,00453BE8), ref: 00453A31
                                    • Part of subcall function 0042E634: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045245B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E653
                                  • RegQueryValueExA.ADVAPI32(00459AD6,00000000,00000000,00000000,?,00000004,00000000,00453AFB,?,00459AD6,00000000,00000000,?,00000000,?,00000000), ref: 00453AB5
                                  • RegQueryValueExA.ADVAPI32(00459AD6,00000000,00000000,00000000,?,00000004,00000000,00453AFB,?,00459AD6,00000000,00000000,?,00000000,?,00000000), ref: 00453AE4
                                  Strings
                                  • , xrefs: 004539A2
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 00453988
                                  • RegOpenKeyEx, xrefs: 004539B4
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045394F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: QueryValue$D167FormatMessage
                                  • String ID: $RegOpenKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                  • API String ID: 357404014-1577016196
                                  • Opcode ID: 1cbd5af67d3494d897aa2e7d98341632fbcd9d204c87823e29d2013091fff2ab
                                  • Instruction ID: 905b3235484ef923a59641c26f2361d695b05d11952c9fc3648c43a13cfcc774
                                  • Opcode Fuzzy Hash: 1cbd5af67d3494d897aa2e7d98341632fbcd9d204c87823e29d2013091fff2ab
                                  • Instruction Fuzzy Hash: 46912475D04248ABDB11DF95C942BDEB7F8EB48346F50406BF900F7282D678AF098B69
                                  APIs
                                  • CloseHandle.KERNEL32(?), ref: 00457A9F
                                  • TerminateProcess.KERNEL32(?,00000001,?,00002710,?), ref: 00457ABB
                                  • WaitForSingleObject.KERNEL32(?,00002710,?), ref: 00457AC9
                                  • GetExitCodeProcess.KERNEL32(?), ref: 00457ADA
                                  • CloseHandle.KERNEL32(?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00457B21
                                  • Sleep.KERNEL32(000000FA,?,?,?,?,00002710,?,00000001,?,00002710,?), ref: 00457B3D
                                  Strings
                                  • Stopping 64-bit helper process. (PID: %u), xrefs: 00457A91
                                  • Helper process exited., xrefs: 00457AE9
                                  • Helper process exited with failure code: 0x%x, xrefs: 00457B07
                                  • Helper process exited, but failed to get exit code., xrefs: 00457B13
                                  • Helper isn't responding; killing it., xrefs: 00457AAB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseHandleProcess$CodeExitObjectSingleSleepTerminateWait
                                  • String ID: Helper isn't responding; killing it.$Helper process exited with failure code: 0x%x$Helper process exited, but failed to get exit code.$Helper process exited.$Stopping 64-bit helper process. (PID: %u)
                                  • API String ID: 3355656108-1243109208
                                  • Opcode ID: da442ae4ae1bba64dd9877b1e5d7a0867af689c3260008a97d5c2163fd06e020
                                  • Instruction ID: 0e5647b699e0e4053093b70322e0bac816875cb8c4e57f81f84cf7f0c67341ed
                                  • Opcode Fuzzy Hash: da442ae4ae1bba64dd9877b1e5d7a0867af689c3260008a97d5c2163fd06e020
                                  • Instruction Fuzzy Hash: 68214F706087009BC720EB79D445B5BB6D59F48349F04CD3FB999CB283D67CE8489B6A
                                  APIs
                                    • Part of subcall function 0042DC1C: 6D167C60.ADVAPI32(?,?,?,?,?,?,?,?,?), ref: 0042DC48
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?,00000000,004537A3,?,00000000,00453867), ref: 004536F3
                                  • 6D167B60.ADVAPI32(?,?,?,00000000,00000004,00000000,00000001,?,00000000,?,00000000,004537A3,?,00000000,00453867), ref: 0045382F
                                    • Part of subcall function 0042E634: FormatMessageA.KERNEL32(00003200,00000000,4C783AFB,00000000,?,00000400,00000000,?,0045245B,00000000,kernel32.dll,Wow64RevertWow64FsRedirection,00000000,kernel32.dll,Wow64DisableWow64FsRedirection,00000000), ref: 0042E653
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045363B
                                  • RegCreateKeyEx, xrefs: 00453667
                                  • Software\Microsoft\Windows\CurrentVersion\SharedDLLs, xrefs: 0045360B
                                  • , xrefs: 00453655
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167$FormatMessageQueryValue
                                  • String ID: $RegCreateKeyEx$Software\Microsoft\Windows\CurrentVersion\SharedDLLs$Software\Microsoft\Windows\CurrentVersion\SharedDLLs
                                  • API String ID: 2345935623-1280779767
                                  • Opcode ID: d11e5dc0a39267f542f4ad34df049df210763827f684adaf02f522aecd99ebb9
                                  • Instruction ID: f774ad500d365b47b75025b0db09daed89d271555190a36a67f99eb302bca323
                                  • Opcode Fuzzy Hash: d11e5dc0a39267f542f4ad34df049df210763827f684adaf02f522aecd99ebb9
                                  • Instruction Fuzzy Hash: C481FEB5E00209ABDB01DFD5C941BDEB7F9EB48345F50452AF900F7282D778AA09CB69
                                  APIs
                                    • Part of subcall function 00452AA4: 6D1674B0.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00494A81,_iu,?,00000000,00452BDE), ref: 00452B93
                                    • Part of subcall function 00452AA4: CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00494A81,_iu,?,00000000,00452BDE), ref: 00452BA3
                                  • 6D167310.KERNEL32(00000000,00000000,00000000,00000000,00494A81), ref: 0049492D
                                  • 6D1682A0.KERNEL32(00000000,00000080,00000000,00000000,00000000,00000000,00494A81), ref: 0049494E
                                  • CreateWindowExA.USER32(00000000,STATIC,00494A90,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 00494975
                                  • SetWindowLongA.USER32(?,000000FC,00494108), ref: 00494988
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00494A54,?,?,000000FC,00494108,00000000,STATIC,00494A90), ref: 004949B8
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00494A2C
                                  • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00494A54,?,?,000000FC,00494108,00000000), ref: 00494A38
                                    • Part of subcall function 00452DF4: WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00452EDB
                                  • 73F85CF0.USER32(?,00494A5B,00000000,00000000,00000000,00000000,00000000,00000097,00000000,00494A54,?,?,000000FC,00494108,00000000,STATIC), ref: 00494A4E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$CloseHandle$CreateD167310D1674D1682LongMultipleObjectsPrivateProfileStringWaitWrite
                                  • String ID: /SECONDPHASE="%s" /FIRSTPHASEWND=$%x $STATIC
                                  • API String ID: 3508449449-2312673372
                                  • Opcode ID: e6efb713ec31c7210c6b261dfebe5750cdbe23808931c5ab6916535af8cbbc28
                                  • Instruction ID: eacec0d7de1d34e9e6adcdbb3d70d05a742875866a1cfdb7182368b58383cd9c
                                  • Opcode Fuzzy Hash: e6efb713ec31c7210c6b261dfebe5750cdbe23808931c5ab6916535af8cbbc28
                                  • Instruction Fuzzy Hash: 6B416D70A44208AFDF00EBA5DC42F9E7BF8EB49304F20457AF500F7291D6799E018BA8
                                  APIs
                                  • GetActiveWindow.USER32 ref: 0042ECF8
                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 0042ED0C
                                  • 6D166DE0.KERNEL32(00000000,MonitorFromWindow,user32.dll), ref: 0042ED19
                                  • 6D166DE0.KERNEL32(00000000,GetMonitorInfoA,00000000,MonitorFromWindow,user32.dll), ref: 0042ED26
                                  • GetWindowRect.USER32(?,00000000), ref: 0042ED72
                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D), ref: 0042EDB0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$D166$ActiveHandleModuleRect
                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                  • API String ID: 2448073347-3407710046
                                  • Opcode ID: 329879662c10812dca0cb05d82cbdfd4deb68350b93bbe77506a2d196f0687f4
                                  • Instruction ID: 1368e4bb0062d89b761d713291631f5b8d35b0a21c23877071abab058fae4c2c
                                  • Opcode Fuzzy Hash: 329879662c10812dca0cb05d82cbdfd4deb68350b93bbe77506a2d196f0687f4
                                  • Instruction Fuzzy Hash: 3E21C2727016156BD300966ADC81F7F3299DB94714F48462EF984DB3C1EA78EC008A99
                                  APIs
                                  • GetActiveWindow.USER32 ref: 00461954
                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00461968
                                  • 6D166DE0.KERNEL32(00000000,MonitorFromWindow,user32.dll), ref: 00461975
                                  • 6D166DE0.KERNEL32(00000000,GetMonitorInfoA,00000000,MonitorFromWindow,user32.dll), ref: 00461982
                                  • GetWindowRect.USER32(?,00000000), ref: 004619CE
                                  • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,0000001D,?,00000000), ref: 00461A0C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$D166$ActiveHandleModuleRect
                                  • String ID: ($GetMonitorInfoA$MonitorFromWindow$user32.dll
                                  • API String ID: 2448073347-3407710046
                                  • Opcode ID: 31dc27c94f56a489af11cd422b56e5602cfd71b3e33833abd70379b1cbf008a6
                                  • Instruction ID: 7cbe90ee826727f72dd852f5e68c3d1e056aacaf57115fc549a8d9e6174259c1
                                  • Opcode Fuzzy Hash: 31dc27c94f56a489af11cd422b56e5602cfd71b3e33833abd70379b1cbf008a6
                                  • Instruction Fuzzy Hash: A52195757057046BD210DAA8DC82F7F7695DB84720F0D452EF984EB392EA78DC048A5A
                                  APIs
                                  • SysFreeString.OLEAUT32(?), ref: 0045551D
                                  • CoCreateInstance.OLE32(00497A68,00000000,00000001,00497774,?,00000000,00455618), ref: 0045538E
                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • CoCreateInstance.OLE32(00497764,00000000,00000001,00497774,?,00000000,00455618), ref: 004553B4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CreateInstanceString$AllocByteCharFreeMultiWide
                                  • String ID: CoCreateInstance$IPersistFile::Save$IPropertyStore::Commit$IPropertyStore::SetValue$IShellLink::QueryInterface
                                  • API String ID: 2125489766-2052886881
                                  • Opcode ID: 8edd77f535cb871ade28310fa67fdf8274502d9e5339ccef6ff14ebc3b7e00c4
                                  • Instruction ID: 4d8a2d617cb5ab9f8d815c82e8a4c5f27eb68183f32094cfae16cbf70ecffd7b
                                  • Opcode Fuzzy Hash: 8edd77f535cb871ade28310fa67fdf8274502d9e5339ccef6ff14ebc3b7e00c4
                                  • Instruction Fuzzy Hash: 90916171A00608AFDB00DFA9C895BAE77F9EF09306F544066F904EB252DB78DD48CB59
                                  APIs
                                  • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,00000000,00457E1F,?,00000000,00457E82,?,?,00000000,00000000), ref: 00457C9D
                                  • TransactNamedPipe.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00457DB4,?,00000000,00000001,00000000,00000000,00000000,00457E1F), ref: 00457CFA
                                  • GetLastError.KERNEL32(?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00457DB4,?,00000000,00000001,00000000,00000000,00000000,00457E1F), ref: 00457D07
                                  • MsgWaitForMultipleObjects.USER32(00000001,00000000,00000000,000000FF,000000FF), ref: 00457D53
                                  • GetOverlappedResult.KERNEL32(?,?,00000000,00000001,00457D8D,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00457DB4,?,00000000), ref: 00457D79
                                  • GetLastError.KERNEL32(?,?,00000000,00000001,00457D8D,?,-00000020,0000000C,-00004034,00000014,00000000,?,00000000,00457DB4,?,00000000), ref: 00457D80
                                    • Part of subcall function 00452684: GetLastError.KERNEL32(00000000,004530F5,00000005,00000000,0045312A,?,?,00000000,00499628,00000004,00000000,00000000,00000000,?,0049606D,00000000), ref: 00452687
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateEventMultipleNamedObjectsOverlappedPipeResultTransactWait
                                  • String ID: CreateEvent$TransactNamedPipe
                                  • API String ID: 2182916169-3012584893
                                  • Opcode ID: 5111e496d22884c3ca12ecfcd95f31abcce1d4242de21634e117ba1afcf575ef
                                  • Instruction ID: e325880bd487f688eb68e79077044c89764efaa974bafea4e3a097419b3f9a5b
                                  • Opcode Fuzzy Hash: 5111e496d22884c3ca12ecfcd95f31abcce1d4242de21634e117ba1afcf575ef
                                  • Instruction Fuzzy Hash: 3F418F75A04608AFDB15DF95D981FAEB7F8EF08710F1040B6F904E7292C6789E44CA68
                                  APIs
                                  • GetModuleHandleA.KERNEL32(OLEAUT32.DLL,UnRegisterTypeLib,00000000,00455951,?,?,00000031,?), ref: 00455814
                                  • 6D166DE0.KERNEL32(00000000,OLEAUT32.DLL,UnRegisterTypeLib,00000000,00455951,?,?,00000031,?), ref: 0045581A
                                  • LoadTypeLib.OLEAUT32(00000000,?), ref: 00455867
                                    • Part of subcall function 00452684: GetLastError.KERNEL32(00000000,004530F5,00000005,00000000,0045312A,?,?,00000000,00499628,00000004,00000000,00000000,00000000,?,0049606D,00000000), ref: 00452687
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166ErrorHandleLastLoadModuleType
                                  • String ID: GetProcAddress$ITypeLib::GetLibAttr$LoadTypeLib$OLEAUT32.DLL$UnRegisterTypeLib$UnRegisterTypeLib
                                  • API String ID: 3383041954-2711329623
                                  • Opcode ID: ddc6cdbc325a847e47818ebc71843f6388ff8623a08199f0cc0c2fd611c7de04
                                  • Instruction ID: 39bfa6f5bf076d792192d049135fd0b3a21c0cf7b7a83fa7e785e15512932f38
                                  • Opcode Fuzzy Hash: ddc6cdbc325a847e47818ebc71843f6388ff8623a08199f0cc0c2fd611c7de04
                                  • Instruction Fuzzy Hash: 3F3194B1A00A04EFDB01EFAACC61E6BB7A9EF897117114466BC04D7652DA3CD914C728
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetUserDefaultUILanguage,00000000,0042E33D,?,?,00000001,00000000,?,?,00000001,00000000,00000002,00000000,0047EF71), ref: 0042E261
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E33D,?,?,00000001,00000000,?,?,00000001,00000000,00000002,00000000,0047EF71), ref: 0042E267
                                  • 6D167B60.ADVAPI32(?,?,00000001,00000000,00000000,kernel32.dll,GetUserDefaultUILanguage,00000000,0042E33D,?,?,00000001,00000000,?,?,00000001), ref: 0042E2B5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166D167HandleModule
                                  • String ID: .DEFAULT\Control Panel\International$Control Panel\Desktop\ResourceLocale$GetUserDefaultUILanguage$Locale$kernel32.dll
                                  • API String ID: 1587692801-2401316094
                                  • Opcode ID: a6a0cce6eec9ec970ef843174f7b97f38140660a813487cab3674ebc7f2013c7
                                  • Instruction ID: a9e15628429a41aa903e8fd8f3b95f4c053fd787f87159220723fd4e37486eb1
                                  • Opcode Fuzzy Hash: a6a0cce6eec9ec970ef843174f7b97f38140660a813487cab3674ebc7f2013c7
                                  • Instruction Fuzzy Hash: 40211230B00229EBDB00EAA7DC51A9E77A9EB45315F90447BA901E7281D7789A05DB5C
                                  APIs
                                  • RectVisible.GDI32(?,?), ref: 00416D83
                                  • SaveDC.GDI32(?), ref: 00416D97
                                  • IntersectClipRect.GDI32(?,00000000,00000000,?,?), ref: 00416DBA
                                  • RestoreDC.GDI32(?,?), ref: 00416DD5
                                  • CreateSolidBrush.GDI32(00000000), ref: 00416E55
                                  • FrameRect.USER32(?,?,?), ref: 00416E88
                                  • DeleteObject.GDI32(?), ref: 00416E92
                                  • CreateSolidBrush.GDI32(00000000), ref: 00416EA2
                                  • FrameRect.USER32(?,?,?), ref: 00416ED5
                                  • DeleteObject.GDI32(?), ref: 00416EDF
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Rect$BrushCreateDeleteFrameObjectSolid$ClipIntersectRestoreSaveVisible
                                  • String ID:
                                  • API String ID: 375863564-0
                                  • Opcode ID: 1d5947cc6fd46d04e169061d65422b30ad9728b618146b6347ce06196b6e0963
                                  • Instruction ID: 01d81588b69ff1f480347e903aed9c185fc6c29f227380d1fa6610f1b9ad60dd
                                  • Opcode Fuzzy Hash: 1d5947cc6fd46d04e169061d65422b30ad9728b618146b6347ce06196b6e0963
                                  • Instruction Fuzzy Hash: A8513C712086449BDB50EF69C8C0B9B77E8EF48314F15566AFD48CB286C738EC81CB99
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B46
                                  • GetFileSize.KERNEL32(?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B6A
                                  • SetFilePointer.KERNEL32(?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000,00000003,00000080,00000000), ref: 00404B86
                                  • ReadFile.KERNEL32(?,?,00000080,?,00000000,00000000,?,-00000080,00000000,00000000,?,00000000,00000000,80000000,00000002,00000000), ref: 00404BA7
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000002), ref: 00404BD0
                                  • SetEndOfFile.KERNEL32(?,?,00000000,00000000,00000002), ref: 00404BDA
                                  • GetStdHandle.KERNEL32(000000F5), ref: 00404BFA
                                  • GetFileType.KERNEL32(?,000000F5), ref: 00404C11
                                  • CloseHandle.KERNEL32(?,?,000000F5), ref: 00404C2C
                                  • GetLastError.KERNEL32(000000F5), ref: 00404C46
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: File$HandlePointer$CloseD1674ErrorLastReadSizeType
                                  • String ID:
                                  • API String ID: 1365492021-0
                                  • Opcode ID: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                  • Instruction ID: 0555156f4d2a620bb114dc01d937536d57074fdea11cd86abdfeb4dd56d828b4
                                  • Opcode Fuzzy Hash: 9f56c7289f94e04900e6d065ddfea074988f08e379b72121dafcd5ad7d79337d
                                  • Instruction Fuzzy Hash: 3741B3F02093009AF7305E248905B2375E5EBC0755F208E3FE296BA6E0D7BDE8458B1D
                                  APIs
                                  • GetSystemMenu.USER32(00000000,00000000), ref: 004221A3
                                  • DeleteMenu.USER32(00000000,0000F130,00000000,00000000,00000000), ref: 004221C1
                                  • DeleteMenu.USER32(00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221CE
                                  • DeleteMenu.USER32(00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221DB
                                  • DeleteMenu.USER32(00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000,00000000), ref: 004221E8
                                  • DeleteMenu.USER32(00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000,0000F130,00000000,00000000), ref: 004221F5
                                  • DeleteMenu.USER32(00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000,00000007,00000400,00000000), ref: 00422202
                                  • DeleteMenu.USER32(00000000,0000F120,00000000,00000000,0000F000,00000000,00000000,0000F020,00000000,00000000,0000F030,00000000,00000000,00000005,00000400,00000000), ref: 0042220F
                                  • EnableMenuItem.USER32(00000000,0000F020,00000001), ref: 0042222D
                                  • EnableMenuItem.USER32(00000000,0000F030,00000001), ref: 00422249
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Menu$Delete$EnableItem$System
                                  • String ID:
                                  • API String ID: 3985193851-0
                                  • Opcode ID: 55899cff766bdbcc94ff6a86b202067e9705f8bfb40a3cb380fd1939efd9d364
                                  • Instruction ID: e98f5eede000e984507cfb68b46ad6efe0a5c83d9602cc3651cf502f29ecaa29
                                  • Opcode Fuzzy Hash: 55899cff766bdbcc94ff6a86b202067e9705f8bfb40a3cb380fd1939efd9d364
                                  • Instruction Fuzzy Hash: 23213370380744BAE720D725DD8BF9B7BD89B04708F0444A5BA487F2D7C6F9AE40869C
                                  APIs
                                    • Part of subcall function 00458388: 6D167B60.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004584BA,00000000,00458607,?,00000000,00000000,00000000), ref: 004583D5
                                  • 6D167B60.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00458607,?,00000000,00000000,00000000), ref: 00458516
                                  • 6D167B60.ADVAPI32(00000000,00000000,00000001,00000000,00000000,00458607,?,00000000,00000000,00000000), ref: 0045857C
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  Strings
                                  • .NET Framework not found, xrefs: 004585CA
                                  • v2.0.50727, xrefs: 00458508
                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v1.1, xrefs: 00458530
                                  • .NET Framework version %s not found, xrefs: 004585B6
                                  • v1.1.4322, xrefs: 0045856E
                                  • SOFTWARE\Microsoft\.NETFramework\Policy\v2.0, xrefs: 004584CA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: .NET Framework not found$.NET Framework version %s not found$SOFTWARE\Microsoft\.NETFramework\Policy\v1.1$SOFTWARE\Microsoft\.NETFramework\Policy\v2.0$v1.1.4322$v2.0.50727
                                  • API String ID: 557493163-1070292914
                                  • Opcode ID: 64d43e537c3979adf2ca0d5ecfb7cb978692e99f67eb6c8a1e00aa2a8de5be81
                                  • Instruction ID: 4e92089f5f70179fb3c8c2040c17197a0fe85497668ab66a562ec378a0f93eb8
                                  • Opcode Fuzzy Hash: 64d43e537c3979adf2ca0d5ecfb7cb978692e99f67eb6c8a1e00aa2a8de5be81
                                  • Instruction Fuzzy Hash: AF419830A04149AFCF00DF69D851BAE77A5EB55305F54447FE840EB283EF799A0ACB58
                                  APIs
                                  • GetActiveWindow.USER32 ref: 0042F06F
                                  • GetFocus.USER32 ref: 0042F077
                                  • RegisterClassA.USER32(004977AC), ref: 0042F098
                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,0042F16C,88000000,00000000,00000000,00000000,00000000,00000000,00000000,00400000,00000000), ref: 0042F0D6
                                  • CreateWindowExA.USER32(00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000), ref: 0042F11C
                                  • ShowWindow.USER32(00000000,00000008,00000000,TWindowDisabler-Window,00000000,80000000,00000000,00000000,00000000,00000000,61736944,00000000,00400000,00000000,00000000,TWindowDisabler-Window), ref: 0042F12D
                                  • SetFocus.USER32(00000000,00000000,0042F14F,?,?,?,00000001,00000000,?,0045732A,00000000,00499628), ref: 0042F134
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$CreateFocus$ActiveClassRegisterShow
                                  • String ID: TWindowDisabler-Window
                                  • API String ID: 3167913817-1824977358
                                  • Opcode ID: f8bc7c983fd01c8465ac09bea207b7373ea9913a917cdc8569d92784f7feacd9
                                  • Instruction ID: ed48fe58d8234328e3533d793c8fdf20576eb30d3f31e1ac1cfcf9dd6eb6f0ef
                                  • Opcode Fuzzy Hash: f8bc7c983fd01c8465ac09bea207b7373ea9913a917cdc8569d92784f7feacd9
                                  • Instruction Fuzzy Hash: 8921B570740710BAE221FB66DC02F2A76A4EB14B04FE1413BF604AB2D1D7B86D5487ED
                                  APIs
                                  • SHGetMalloc.SHELL32(?), ref: 0046063B
                                  • GetActiveWindow.USER32 ref: 0046069F
                                  • CoInitialize.OLE32(00000000), ref: 004606B3
                                  • SHBrowseForFolder.SHELL32(?), ref: 004606CA
                                  • CoUninitialize.OLE32(0046070B,00000000,?,?,?,?,?,00000000,0046078F), ref: 004606DF
                                  • SetActiveWindow.USER32(?,0046070B,00000000,?,?,?,?,?,00000000,0046078F), ref: 004606F5
                                  • SetActiveWindow.USER32(?,?,0046070B,00000000,?,?,?,?,?,00000000,0046078F), ref: 004606FE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ActiveWindow$BrowseFolderInitializeMallocUninitialize
                                  • String ID: A
                                  • API String ID: 2684663990-3554254475
                                  • Opcode ID: fef2655736a559b7dd391880132a7ad9026c64351a8a148270402e8fce88bda2
                                  • Instruction ID: 37c39436e97ed81eabe62aa77ef6dee9bf7a92f1429f563ab945fa2329ef4438
                                  • Opcode Fuzzy Hash: fef2655736a559b7dd391880132a7ad9026c64351a8a148270402e8fce88bda2
                                  • Instruction Fuzzy Hash: DC3110B0E00248AFDB00EFA6D886A9EBBF8EB09304F51447AF404E7251E7785A44CF59
                                  APIs
                                  • 6D166DE0.KERNEL32(00000000,inflateInit_,?,0047D55A,00000000,0047D59D), ref: 0045C229
                                  • 6D166DE0.KERNEL32(00000000,inflate,00000000,inflateInit_,?,0047D55A,00000000,0047D59D), ref: 0045C239
                                  • 6D166DE0.KERNEL32(00000000,inflateEnd,00000000,inflate,00000000,inflateInit_,?,0047D55A,00000000,0047D59D), ref: 0045C249
                                  • 6D166DE0.KERNEL32(00000000,inflateReset,00000000,inflateEnd,00000000,inflate,00000000,inflateInit_,?,0047D55A,00000000,0047D59D), ref: 0045C259
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166
                                  • String ID: inflate$inflateEnd$inflateInit_$inflateReset
                                  • API String ID: 1446878013-3516654456
                                  • Opcode ID: 826dc7834a6ddf971866aa6ddafbd67dee50fdfbd8ad58b3f36a8c771695b951
                                  • Instruction ID: 4e5389c99fc3eaedb52843568a1ec3be984baf4ccae8e4d5869d1c14776ccf34
                                  • Opcode Fuzzy Hash: 826dc7834a6ddf971866aa6ddafbd67dee50fdfbd8ad58b3f36a8c771695b951
                                  • Instruction Fuzzy Hash: FE01ECB0D00700DEDB14DFB69CC576236A5A76871EF14807BBC05652A2D77C446DCE9E
                                  APIs
                                  • SetBkColor.GDI32(?,00000000), ref: 0041A929
                                  • 73F84D40.GDI32(?,00000000,00000000,?,?,?,00000000,00000000,00CC0020,?,00000000), ref: 0041A963
                                  • SetBkColor.GDI32(?,?), ref: 0041A978
                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00CC0020), ref: 0041A9C2
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041A9CD
                                  • SetBkColor.GDI32(00000000,00FFFFFF), ref: 0041A9DD
                                  • StretchBlt.GDI32(00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,00E20746), ref: 0041AA1C
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0041AA26
                                  • SetBkColor.GDI32(00000000,?), ref: 0041AA33
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Color$StretchText
                                  • String ID:
                                  • API String ID: 2984075790-0
                                  • Opcode ID: 013a84676cdaaaf8083e8e05c083cc8ea11cd0d63c2ab0b08c49955aded63c37
                                  • Instruction ID: ed8f24b6f3e6af6789b1e3f2c2c828db1826bcf9a3605880229a579b212ac78f
                                  • Opcode Fuzzy Hash: 013a84676cdaaaf8083e8e05c083cc8ea11cd0d63c2ab0b08c49955aded63c37
                                  • Instruction Fuzzy Hash: 0561C6B5A00505EFCB40EFA9D985E9AB7F8EF08314B14816AF518DB662C734ED41CF98
                                  APIs
                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,00456D48,?, /s ",?,regsvr32.exe",?,00456D48), ref: 00456CBA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseDirectoryHandleSystem
                                  • String ID: /s "$ /u$0x%x$CreateProcess$D$Spawning 32-bit RegSvr32: $Spawning 64-bit RegSvr32: $regsvr32.exe"
                                  • API String ID: 2051275411-1862435767
                                  • Opcode ID: 69a64d497105b46139ff8da06d8f9de14067347c773c1c938f031247a6108211
                                  • Instruction ID: 7df28f0a73235eb6fbae974d173259b32973fea56a0a8878689a8f25607f735f
                                  • Opcode Fuzzy Hash: 69a64d497105b46139ff8da06d8f9de14067347c773c1c938f031247a6108211
                                  • Instruction Fuzzy Hash: 65410670A003086BDB11EFE5C841BDDB7F9EF48305F91447BA904BB292D7789A0D8B59
                                  APIs
                                  • OffsetRect.USER32(?,00000001,00000001), ref: 0044C669
                                  • GetSysColor.USER32(00000014), ref: 0044C670
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C688
                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C6B1
                                  • OffsetRect.USER32(?,000000FF,000000FF), ref: 0044C6BB
                                  • GetSysColor.USER32(00000010), ref: 0044C6C2
                                  • SetTextColor.GDI32(00000000,00000000), ref: 0044C6DA
                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C703
                                  • DrawTextA.USER32(00000000,00000000,00000000), ref: 0044C72E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Text$Color$Draw$OffsetRect
                                  • String ID:
                                  • API String ID: 1005981011-0
                                  • Opcode ID: b2bfa1e68da8afce1922186c001ae5313270e8a3b34217db5e55b2d75b458334
                                  • Instruction ID: 2127100c6141c40d7f67eededaad44c9f4776d5faed6a8b6d4067b126811640b
                                  • Opcode Fuzzy Hash: b2bfa1e68da8afce1922186c001ae5313270e8a3b34217db5e55b2d75b458334
                                  • Instruction Fuzzy Hash: A821CFB42015007FC710FB2ACD8AE8B7BECDF19319B05857AB914EB3A3C678DD408669
                                  APIs
                                  • SHGetFileInfo.SHELL32(c:\directory,00000010,?,00000160,00001010), ref: 0046615B
                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 00466181
                                    • Part of subcall function 00465FF8: DrawIconEx.USER32(00000000,00000000,00000000,00000000,00000020,00000020,00000000,00000000,00000003), ref: 00466090
                                    • Part of subcall function 00465FF8: DestroyCursor.USER32(00000000), ref: 004660A6
                                  • ExtractIconA.SHELL32(00400000,00000000,00000027), ref: 004661D8
                                  • SHGetFileInfo.SHELL32(00000000,00000000,?,00000160,00001000), ref: 00466239
                                  • ExtractIconA.SHELL32(00400000,00000000,?), ref: 0046625F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Icon$Extract$FileInfo$CursorDestroyDraw
                                  • String ID: c:\directory$shell32.dll
                                  • API String ID: 3376378930-1375355148
                                  • Opcode ID: 96e379616a8dbd5e298cab4f41576ef66587869b70909fd2e269815eae32db12
                                  • Instruction ID: 3b27be72d541a1f6ff47da91166f71464ff354dbf70f4bb694ce725078c71905
                                  • Opcode Fuzzy Hash: 96e379616a8dbd5e298cab4f41576ef66587869b70909fd2e269815eae32db12
                                  • Instruction Fuzzy Hash: 34515074600248AFDB10EF65DC8AFDEBBA8EB49304F5141A7F50497391DA38AE81CB59
                                  APIs
                                    • Part of subcall function 0044FB14: SetEndOfFile.KERNEL32(?,?,0045B2AE,00000000,0045B439,?,00000000,00000002,00000002), ref: 0044FB1B
                                    • Part of subcall function 00406EB8: 6D167770.KERNEL32(00000000,00499628,004963B9,00000000,0049640E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                  • GetWindowThreadProcessId.USER32(00000000,?), ref: 004941E5
                                  • OpenProcess.KERNEL32(00100000,00000000,?,00000000,?), ref: 004941F9
                                  • SendNotifyMessageA.USER32(00000000,0000054D,00000000,00000000), ref: 00494213
                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 0049421F
                                  • CloseHandle.KERNEL32(00000000,00000000,000000FF,00000000,0000054D,00000000,00000000,00000000,?), ref: 00494225
                                  • Sleep.KERNEL32(000001F4,00000000,0000054D,00000000,00000000,00000000,?), ref: 00494238
                                  Strings
                                  • Deleting Uninstall data files., xrefs: 0049415B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Process$CloseD167770FileHandleMessageNotifyObjectOpenSendSingleSleepThreadWaitWindow
                                  • String ID: Deleting Uninstall data files.
                                  • API String ID: 1695589687-2568741658
                                  • Opcode ID: ce04f79baa2961e921ddd5ad2c735cb47f56f986cdd70c47e60a5901f0bdd457
                                  • Instruction ID: 5f89ada4f8a7cd80069c1f31b339ddc62a3491fd6529f86a363eb007593340d3
                                  • Opcode Fuzzy Hash: ce04f79baa2961e921ddd5ad2c735cb47f56f986cdd70c47e60a5901f0bdd457
                                  • Instruction Fuzzy Hash: 532195703042446EEB10AB75EC4AF273798EB99348F10053BB5009A292DABC9C558B6E
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D168150.ADVAPI32(?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046ED79,?,?,?,?,00000000), ref: 0046ECE3
                                  • 6D167B60.ADVAPI32(?,?,00000000,00000000,00000001,00000000,00000001,?,00000002,00000000,00000000,0046ED79), ref: 0046ECFA
                                  • AddFontResourceA.GDI32(00000000), ref: 0046ED17
                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 0046ED2B
                                  Strings
                                  • AddFontResource, xrefs: 0046ED35
                                  • Failed to open Fonts registry key., xrefs: 0046ED01
                                  • Failed to set value in Fonts registry key., xrefs: 0046ECEC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167$D168150FontMessageNotifyResourceSend
                                  • String ID: AddFontResource$Failed to open Fonts registry key.$Failed to set value in Fonts registry key.
                                  • API String ID: 2631276223-649663873
                                  • Opcode ID: ce87b511589de5ea9e7d074b0292dcbe3b1408d6b3fda1ba581b925addd431d1
                                  • Instruction ID: fa558e4d504448ec01a8f8a4d00b26f6ef26fecaf6298a437289807d612c0241
                                  • Opcode Fuzzy Hash: ce87b511589de5ea9e7d074b0292dcbe3b1408d6b3fda1ba581b925addd431d1
                                  • Instruction Fuzzy Hash: 7621C1787402017BE710EA679C42F6A77ECCB04748F604437B900EB2C2EA7C9E06866E
                                  APIs
                                    • Part of subcall function 00416380: GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                    • Part of subcall function 00416380: UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                    • Part of subcall function 00416380: RegisterClassA.USER32(?), ref: 0041643E
                                  • GetVersion.KERNEL32 ref: 00461DB8
                                  • SendMessageA.USER32(00000000,0000112C,00000004,00000004), ref: 00461DF6
                                  • SHGetFileInfo.SHELL32(00461E94,00000000,?,00000160,00004011), ref: 00461E13
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00461E31
                                  • SetCursor.USER32(00000000,00000000,00007F02,00461E94,00000000,?,00000160,00004011), ref: 00461E37
                                  • SetCursor.USER32(?,00461E77,00007F02,00461E94,00000000,?,00000160,00004011), ref: 00461E6A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ClassCursor$Info$FileLoadMessageRegisterSendUnregisterVersion
                                  • String ID: Explorer
                                  • API String ID: 2594429197-512347832
                                  • Opcode ID: b24d29b21ba69f7a46faa7161770bba5e0b6b5a54cf948d678523e21185b607e
                                  • Instruction ID: 79590ed0db1f7db43664bb900e5f19b1e335256567ca3de94008b30766a17707
                                  • Opcode Fuzzy Hash: b24d29b21ba69f7a46faa7161770bba5e0b6b5a54cf948d678523e21185b607e
                                  • Instruction Fuzzy Hash: FC21B7717403046AEB10BBB99C47B9B7698DB09708F4444BFFA05EA2D3DA7D9C04866D
                                  APIs
                                  • GetLastError.KERNEL32(?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,004542D0,004542D0,?,004542D0,00000000), ref: 0045425C
                                  • CloseHandle.KERNEL32(?,?,00000044,00000000,00000000,04000000,00000000,00000000,00000000,?,COMMAND.COM" /C ,?,004542D0,004542D0,?,004542D0), ref: 00454269
                                    • Part of subcall function 00454020: WaitForInputIdle.USER32(?,00000032), ref: 0045404C
                                    • Part of subcall function 00454020: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0045406E
                                    • Part of subcall function 00454020: GetExitCodeProcess.KERNEL32(?,?), ref: 0045407D
                                    • Part of subcall function 00454020: CloseHandle.KERNEL32(?,004540AA,004540A3,?,?,?,00000000,?,?,0045427D,?,?,?,00000044,00000000,00000000), ref: 0045409D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseHandleWait$CodeErrorExitIdleInputLastMultipleObjectsProcess
                                  • String ID: .bat$.cmd$COMMAND.COM" /C $D$cmG$cmd.exe" /C "
                                  • API String ID: 854858120-1733441660
                                  • Opcode ID: 5360ad88fbd24ad73d80326545b093d84d43265a5b1b089361e9add530e1caee
                                  • Instruction ID: 0c4c0fca1003911141faeb52d746c6e08c311fc688d82d59798b106f567512d0
                                  • Opcode Fuzzy Hash: 5360ad88fbd24ad73d80326545b093d84d43265a5b1b089361e9add530e1caee
                                  • Instruction Fuzzy Hash: 37517B74600319ABCB00EF95D841B9EBBB9AF8434DF50447BBC04BB292D7789A498759
                                  APIs
                                  • GetLastError.KERNEL32(00000000,00458EFA,?,00000000,00000000,00000000,?,00000006,?,00000000,004954CB,?,00000000,0049556E), ref: 00458E3E
                                    • Part of subcall function 00453498: FindClose.KERNEL32(000000FF,0045358E), ref: 0045357D
                                  Strings
                                  • Failed to strip read-only attribute., xrefs: 00458E0C
                                  • Failed to delete directory (%d). Will retry later., xrefs: 00458E57
                                  • Stripped read-only attribute., xrefs: 00458E00
                                  • Failed to delete directory (%d)., xrefs: 00458ED4
                                  • Failed to delete directory (%d). Will delete on restart (if empty)., xrefs: 00458EB3
                                  • Deleting directory: %s, xrefs: 00458DC7
                                  • Not stripping read-only attribute because the directory does not appear to be empty., xrefs: 00458E18
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseErrorFindLast
                                  • String ID: Deleting directory: %s$Failed to delete directory (%d).$Failed to delete directory (%d). Will delete on restart (if empty).$Failed to delete directory (%d). Will retry later.$Failed to strip read-only attribute.$Not stripping read-only attribute because the directory does not appear to be empty.$Stripped read-only attribute.
                                  • API String ID: 754982922-1448842058
                                  • Opcode ID: 9e94a00b7c8aafbd64d09b7c5c661f455be3c305af9493ee55afa8b123f838c4
                                  • Instruction ID: c18bf7811258659b1d49b837fcab2845bf2e635f70014d4190d0876b95ea6ebd
                                  • Opcode Fuzzy Hash: 9e94a00b7c8aafbd64d09b7c5c661f455be3c305af9493ee55afa8b123f838c4
                                  • Instruction Fuzzy Hash: D0418331A042149ACB10DB6988427AFB6F5AB8930AF51856FAC51F7383CF7C8D0DC75A
                                  APIs
                                  • GetCapture.USER32 ref: 00422E14
                                  • GetCapture.USER32 ref: 00422E23
                                  • SendMessageA.USER32(00000000,0000001F,00000000,00000000), ref: 00422E29
                                  • ReleaseCapture.USER32 ref: 00422E2E
                                  • GetActiveWindow.USER32 ref: 00422E3D
                                  • SendMessageA.USER32(00000000,0000B000,00000000,00000000), ref: 00422EBC
                                  • SendMessageA.USER32(00000000,0000B001,00000000,00000000), ref: 00422F20
                                  • GetActiveWindow.USER32 ref: 00422F2F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CaptureMessageSend$ActiveWindow$Release
                                  • String ID:
                                  • API String ID: 862346643-0
                                  • Opcode ID: 9258177ad13ddfb732f89b4e517253646e38761d3748712f1dce8d47c2fdbf96
                                  • Instruction ID: e195ad3ef6092fcb53c7f5a5f99a3bf722a53bc0b10f849bc0219bc5d9a36e03
                                  • Opcode Fuzzy Hash: 9258177ad13ddfb732f89b4e517253646e38761d3748712f1dce8d47c2fdbf96
                                  • Instruction Fuzzy Hash: 0E414270B00254AFDB10EB69DA46B9E77F1EF04304F5540BAF404AB3A2D7B99E40DB18
                                  APIs
                                  • 73F7A570.USER32(00000000), ref: 004293FA
                                  • GetTextMetricsA.GDI32(00000000), ref: 00429403
                                    • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                  • SelectObject.GDI32(00000000,00000000), ref: 00429412
                                  • GetTextMetricsA.GDI32(00000000,?), ref: 0042941F
                                  • SelectObject.GDI32(00000000,00000000), ref: 00429426
                                  • 73F7A480.USER32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0042942E
                                  • GetSystemMetrics.USER32(00000006), ref: 00429453
                                  • GetSystemMetrics.USER32(00000006), ref: 0042946D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Metrics$ObjectSelectSystemText$A480A570CreateFontIndirect
                                  • String ID:
                                  • API String ID: 361401722-0
                                  • Opcode ID: 0466589c1e1d35fbe5ff96ce52a9832099c11fcb7759f25f5c51244f7efe9c69
                                  • Instruction ID: 1c16e140c275e32b72114e8aab6556a20745a09c5650d7ce1a79e9138ea63f74
                                  • Opcode Fuzzy Hash: 0466589c1e1d35fbe5ff96ce52a9832099c11fcb7759f25f5c51244f7efe9c69
                                  • Instruction Fuzzy Hash: 990104917087103BF710B67A9CC2F6B6188DB9835CF44003FFA469A3D3D56C8C45866A
                                  APIs
                                  • 73F7A570.USER32(00000000,?,00418FC9,00496859), ref: 0041DD97
                                  • 73F84620.GDI32(00000000,0000005A,00000000,?,00418FC9,00496859), ref: 0041DDA1
                                  • 73F7A480.USER32(00000000,00000000,00000000,0000005A,00000000,?,00418FC9,00496859), ref: 0041DDAE
                                  • MulDiv.KERNEL32(00000008,00000060,00000048), ref: 0041DDBD
                                  • GetStockObject.GDI32(00000007), ref: 0041DDCB
                                  • GetStockObject.GDI32(00000005), ref: 0041DDD7
                                  • GetStockObject.GDI32(0000000D), ref: 0041DDE3
                                  • LoadIconA.USER32(00000000,00007F00), ref: 0041DDF4
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ObjectStock$A480A570F84620IconLoad
                                  • String ID:
                                  • API String ID: 80563815-0
                                  • Opcode ID: 317499979f49fa73b385b8be1ae7cdb80e5b8471e60adc8a579b49d429647add
                                  • Instruction ID: 3a47761d36ad02bfc78df21afa9cf5b0727bd80dff73dd58f07baa36398988a3
                                  • Opcode Fuzzy Hash: 317499979f49fa73b385b8be1ae7cdb80e5b8471e60adc8a579b49d429647add
                                  • Instruction Fuzzy Hash: 7C1100706453415AEB40BF695992BAA3690DB64748F00813FF609AF2D2DB7E1C448B5E
                                  APIs
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0046229C
                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,00462331), ref: 004622A2
                                  • SetCursor.USER32(?,00462319,00007F02,00000000,00462331), ref: 0046230C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Cursor$Load
                                  • String ID: $ $Internal error: Item already expanding
                                  • API String ID: 1675784387-1948079669
                                  • Opcode ID: 2ce7a8aeb611f8e8680d3bac35d89eb1a546af4a85e588927e5d965216b18884
                                  • Instruction ID: c3b507160399384885c163df025ccdf7e0092f68cfd92cdad35cb5f243267c7a
                                  • Opcode Fuzzy Hash: 2ce7a8aeb611f8e8680d3bac35d89eb1a546af4a85e588927e5d965216b18884
                                  • Instruction Fuzzy Hash: F3B19330600A44FFD720DF69C655B9ABBF0AF04304F5484AAE8459B792E7BCED45CB1A
                                  APIs
                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00452EDB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: PrivateProfileStringWrite
                                  • String ID: .tmp$MoveFileEx$NUL$WININIT.INI$[rename]
                                  • API String ID: 390214022-3304407042
                                  • Opcode ID: faacb5120dd61607f15e43a99d6fdf512cd37292a6e7288d3bb959f7b4079db3
                                  • Instruction ID: 6742f166414d42bb53fc7f870b2ac63f599eea8e39eec4f9f047603fe75cda16
                                  • Opcode Fuzzy Hash: faacb5120dd61607f15e43a99d6fdf512cd37292a6e7288d3bb959f7b4079db3
                                  • Instruction Fuzzy Hash: 57911230E002499BDB01EFA5D982BDEB7B5EF49745F508077E800B7296D778AE09CB58
                                  APIs
                                  • GetClassInfoW.USER32(00000000,COMBOBOX,?), ref: 0047503D
                                  • 73F859E0.USER32(00000000,000000FC,00474F98,00000000,0047527C,?,00000000,004752A6), ref: 00475064
                                  • GetACP.KERNEL32(00000000,0047527C,?,00000000,004752A6), ref: 004750A1
                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 004750E7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ClassF859InfoMessageSend
                                  • String ID: COMBOBOX$Inno Setup: Language
                                  • API String ID: 1758235654-4234151509
                                  • Opcode ID: 6b130839cf11617b621cea3722220a3d04441580ed45be4d4d37919108964c35
                                  • Instruction ID: fabf997e48ae97986d7f230cd689813c7c73d3db0777660193f5721c0c0d9349
                                  • Opcode Fuzzy Hash: 6b130839cf11617b621cea3722220a3d04441580ed45be4d4d37919108964c35
                                  • Instruction Fuzzy Hash: 03813030A046059FCB10DF69C985AAAB7F1FB08304F5581BAE808EB362D778AD41CB59
                                  APIs
                                  • GetSystemDefaultLCID.KERNEL32(00000000,004088D0,?,?,?,?,00000000,00000000,00000000,?,004098D7,00000000,004098EA), ref: 004086A2
                                    • Part of subcall function 004084D0: GetLocaleInfoA.KERNEL32(?,00000044,?,00000100,004994C0,00000001,?,0040859B,?,00000000,0040867A), ref: 004084EE
                                    • Part of subcall function 0040851C: GetLocaleInfoA.KERNEL32(00000000,0000000F,?,00000002,0000002C,?,?,00000000,0040871E,?,?,?,00000000,004088D0), ref: 0040852F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: InfoLocale$DefaultSystem
                                  • String ID: AMPM$:mm$:mm:ss$m/d/yy$mmmm d, yyyy
                                  • API String ID: 1044490935-665933166
                                  • Opcode ID: a30fc41475cb844fc1d0cd96782bde6282fdc384be22a0289465391dc2abf4b9
                                  • Instruction ID: 2534e8f89ba6a18a24524fff76901190ecdb34efc2f457388f889d4d1fe01f59
                                  • Opcode Fuzzy Hash: a30fc41475cb844fc1d0cd96782bde6282fdc384be22a0289465391dc2abf4b9
                                  • Instruction Fuzzy Hash: 1F515B34B002486BDB01FBAA8941A9F7769DB98308F50D47FA141BB3C6CA3DCE06871D
                                  APIs
                                  • GetVersion.KERNEL32(00000000,00411869), ref: 004116FC
                                  • InsertMenuItemA.USER32(?,000000FF,00000001,0000002C), ref: 004117BA
                                    • Part of subcall function 00411A1C: CreatePopupMenu.USER32 ref: 00411A36
                                  • InsertMenuA.USER32(?,000000FF,?,?,00000000), ref: 00411846
                                    • Part of subcall function 00411A1C: CreateMenu.USER32 ref: 00411A40
                                  • InsertMenuA.USER32(?,000000FF,?,00000000,00000000), ref: 0041182D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Menu$Insert$Create$ItemPopupVersion
                                  • String ID: ,$?
                                  • API String ID: 2359071979-2308483597
                                  • Opcode ID: 427dcd3bd3284b7198b9ac8e2351f7ed5d652d75c1074368b86d3c51f4e1672e
                                  • Instruction ID: 9f3cd353704c6e6df4760fc9e7825bd2b36e241702b237f10a7cfd97aeeb4675
                                  • Opcode Fuzzy Hash: 427dcd3bd3284b7198b9ac8e2351f7ed5d652d75c1074368b86d3c51f4e1672e
                                  • Instruction Fuzzy Hash: 2E511474A14140ABDB10EF6ADC816DA7BF9AF09304B1585BBFA04E73A6D738C941CB5C
                                  APIs
                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BE98
                                  • GetObjectA.GDI32(?,00000018,?), ref: 0041BEA7
                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BEF8
                                  • GetBitmapBits.GDI32(?,?,?), ref: 0041BF06
                                  • DeleteObject.GDI32(?), ref: 0041BF0F
                                  • DeleteObject.GDI32(?), ref: 0041BF18
                                  • CreateIcon.USER32(00400000,?,?,?,?,?,?), ref: 0041BF35
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Object$BitmapBitsDelete$CreateIcon
                                  • String ID:
                                  • API String ID: 1030595962-0
                                  • Opcode ID: 3d797d1906e0c606487274bef3f8b6967846da0d995fd7b3f29d94f188c04d3b
                                  • Instruction ID: 6ccfe3e05be1f9361b89c498b95593dd8bbd66f2dd05af997845d9e2841d21eb
                                  • Opcode Fuzzy Hash: 3d797d1906e0c606487274bef3f8b6967846da0d995fd7b3f29d94f188c04d3b
                                  • Instruction Fuzzy Hash: 91510571E00219AFCB14DFA9D8819EEB7F9EF48314B10446AF914E7391D738AD81CB64
                                  APIs
                                  • SetStretchBltMode.GDI32(00000000,00000003), ref: 0041CE6E
                                  • 73F84620.GDI32(00000000,00000026), ref: 0041CE8D
                                  • 73F78830.GDI32(?,?,00000001,00000000,00000026), ref: 0041CEF3
                                  • 73F722A0.GDI32(?,?,?,00000001,00000000,00000026), ref: 0041CF02
                                  • StretchBlt.GDI32(00000000,?,?,?,?,?,00000000,00000000,00000000,?,?), ref: 0041CF6C
                                  • StretchDIBits.GDI32(?,?,?,?,?,00000000,00000000,00000000,?,?,?,00000000,?), ref: 0041CFAA
                                  • 73F78830.GDI32(?,?,00000001,0041CFDC,00000000,00000026), ref: 0041CFCF
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Stretch$F78830$BitsF722F84620Mode
                                  • String ID:
                                  • API String ID: 891820546-0
                                  • Opcode ID: 74297f3bd10097d01eff673f8498ce71c96219b6a5d33082056140f7efed8789
                                  • Instruction ID: 0295d75a013be80ecc2d975aeb153abe1d20fbb24d7cab5e263b7fb8805ed029
                                  • Opcode Fuzzy Hash: 74297f3bd10097d01eff673f8498ce71c96219b6a5d33082056140f7efed8789
                                  • Instruction Fuzzy Hash: 6A512970644600AFDB14DFA8C985FABBBF9AF08304F10459AF544DB292C778ED80CB58
                                  APIs
                                  • SendMessageA.USER32(00000000,?,?), ref: 00455DFA
                                    • Part of subcall function 004241EC: GetWindowTextA.USER32(?,?,00000100), ref: 0042420C
                                    • Part of subcall function 0041EE14: GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                    • Part of subcall function 0041EE14: 73F85940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042EA14,?,00000001), ref: 0041EE69
                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                  • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 00455E61
                                  • TranslateMessage.USER32(?), ref: 00455E7F
                                  • DispatchMessageA.USER32(?), ref: 00455E88
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Message$TextWindow$CurrentDispatchF85940SendThreadTranslate
                                  • String ID: [Paused]
                                  • API String ID: 4181422233-4230553315
                                  • Opcode ID: 974f50c28e7a0d06d1499ac9cc24255be8932453f55a04bd5513a218078ddf53
                                  • Instruction ID: 5631f5fef0d136326ce9ec6fe6a6c5ad4cf360b27ce0d5c9196fa0682c0395d6
                                  • Opcode Fuzzy Hash: 974f50c28e7a0d06d1499ac9cc24255be8932453f55a04bd5513a218078ddf53
                                  • Instruction Fuzzy Hash: 1C31B7319046449EDB11DBB9DC52BDEBBB8EB49314F55407BE800E7292D73C9E09CB29
                                  APIs
                                  • GetCursor.USER32(00000000,00469F77), ref: 00469EF4
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00469F02
                                  • SetCursor.USER32(00000000,00000000,00007F02,00000000,00469F77), ref: 00469F08
                                  • Sleep.KERNEL32(000002EE,00000000,00000000,00007F02,00000000,00469F77), ref: 00469F12
                                  • SetCursor.USER32(00000000,000002EE,00000000,00000000,00007F02,00000000,00469F77), ref: 00469F18
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Cursor$LoadSleep
                                  • String ID: CheckPassword
                                  • API String ID: 4023313301-1302249611
                                  • Opcode ID: 5190d1b9022a4a1901e6d2d6fd4117dbf96bdd56d7e6ea468fc9ea279eb906d8
                                  • Instruction ID: 15d1937f4172d90e864f08df21a73f22350dd5d95189fb01be908ffc385681df
                                  • Opcode Fuzzy Hash: 5190d1b9022a4a1901e6d2d6fd4117dbf96bdd56d7e6ea468fc9ea279eb906d8
                                  • Instruction Fuzzy Hash: 3931A534740204AFD711DB69C88AF9A7BE4EF48304F5580BAB8049F3E2D7B89D40CB49
                                  APIs
                                    • Part of subcall function 00475F24: GetWindowThreadProcessId.USER32(00000000), ref: 00475F2C
                                    • Part of subcall function 00475F24: GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00476023,0049A03C,00000000), ref: 00475F3F
                                    • Part of subcall function 00475F24: 6D166DE0.KERNEL32(00000000,user32.dll,AllowSetForegroundWindow,00000000,?,?,00476023,0049A03C,00000000), ref: 00475F45
                                  • SendMessageA.USER32(00000000,0000004A,00000000,004763B6), ref: 00476031
                                  • GetTickCount.KERNEL32 ref: 00476076
                                  • GetTickCount.KERNEL32 ref: 00476080
                                  • MsgWaitForMultipleObjects.USER32(00000000,00000000,00000000,0000000A,000000FF), ref: 004760D5
                                  Strings
                                  • CallSpawnServer: Unexpected status: %d, xrefs: 004760BE
                                  • CallSpawnServer: Unexpected response: $%x, xrefs: 00476066
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CountTick$D166HandleMessageModuleMultipleObjectsProcessSendThreadWaitWindow
                                  • String ID: CallSpawnServer: Unexpected response: $%x$CallSpawnServer: Unexpected status: %d
                                  • API String ID: 1874973071-3771334282
                                  • Opcode ID: d9391f7ff84f521ee5e8d0d5a8338081c105a43ec95f3db65b7eab306574c1a7
                                  • Instruction ID: 7fc3440640e0aba4a39dc3708d8047dd0d8c3a2e160d9e8c8e3136e6a7122d16
                                  • Opcode Fuzzy Hash: d9391f7ff84f521ee5e8d0d5a8338081c105a43ec95f3db65b7eab306574c1a7
                                  • Instruction Fuzzy Hash: 5931B174F006159ACB10EBB988467EEB6E5EF04304F90813AF148EB382D6BD9D05879D
                                  APIs
                                  • 6D166DE0.KERNEL32(626D6573,CreateAssemblyCache,00000000,004587F3,?,?,?,00000000), ref: 004587AB
                                  Strings
                                  • .NET Framework CreateAssemblyCache function failed, xrefs: 004587CE
                                  • Failed to get address of .NET Framework CreateAssemblyCache function, xrefs: 004587B6
                                  • Fusion.dll, xrefs: 0045874B
                                  • CreateAssemblyCache, xrefs: 004587A2
                                  • Failed to load .NET Framework DLL "%s", xrefs: 00458790
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166
                                  • String ID: .NET Framework CreateAssemblyCache function failed$CreateAssemblyCache$Failed to get address of .NET Framework CreateAssemblyCache function$Failed to load .NET Framework DLL "%s"$Fusion.dll
                                  • API String ID: 1446878013-3990135632
                                  • Opcode ID: 8bbf340b64d83b10f3ec2cabc1b3994f22f1d6da3731548a8a0c58cdda6b247c
                                  • Instruction ID: 81554f96b97ec1de94d6379c777798724e8092ba429b6bbf7826aab024c65cc6
                                  • Opcode Fuzzy Hash: 8bbf340b64d83b10f3ec2cabc1b3994f22f1d6da3731548a8a0c58cdda6b247c
                                  • Instruction Fuzzy Hash: 30316671E006096BCB11EBA5C88159FB7A5EB09315F50857FE814B7382DF389A098B99
                                  APIs
                                    • Part of subcall function 0041BFB8: GetObjectA.GDI32(?,00000018), ref: 0041BFC5
                                  • GetFocus.USER32 ref: 0041C0D8
                                  • 73F7A570.USER32(?), ref: 0041C0E4
                                  • 73F78830.GDI32(?,?,00000000,00000000,0041C163,?,?), ref: 0041C105
                                  • 73F722A0.GDI32(?,?,?,00000000,00000000,0041C163,?,?), ref: 0041C111
                                  • GetDIBits.GDI32(?,?,00000000,?,?,?,00000000), ref: 0041C128
                                  • 73F78830.GDI32(?,00000000,00000000,0041C16A,?,?), ref: 0041C150
                                  • 73F7A480.USER32(?,?,0041C16A,?,?), ref: 0041C15D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: F78830$A480A570BitsF722FocusObject
                                  • String ID:
                                  • API String ID: 3455042967-0
                                  • Opcode ID: 79a038cea31138c71b2ef77edfdeafaab103df7d1acda3a818e2678accba0093
                                  • Instruction ID: be6d8328aec04e85a436dd0cf8ae2147a44d9b66c6d411dca3268b31211d8f12
                                  • Opcode Fuzzy Hash: 79a038cea31138c71b2ef77edfdeafaab103df7d1acda3a818e2678accba0093
                                  • Instruction Fuzzy Hash: B2116A71A40618BFDB10DBA9CC86FAFB7FCEF48700F54446AB514E7281D6789D008B68
                                  APIs
                                  • GetSystemMetrics.USER32(0000000E), ref: 00418BE0
                                  • GetSystemMetrics.USER32(0000000D), ref: 00418BE8
                                  • 6FA82980.COMCTL32(00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418BEE
                                    • Part of subcall function 00409920: 6FA7C400.COMCTL32(00499628,000000FF,00000000,00418C1C,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00409924
                                  • 6FAECB00.COMCTL32(00499628,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001,00000000), ref: 00418C3E
                                  • 6FAEC740.COMCTL32(00000000,?,00499628,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E,00000001,00000001,00000001), ref: 00418C49
                                  • 6FAECB00.COMCTL32(00499628,00000001,?,?,00000000,?,00499628,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000), ref: 00418C5C
                                  • 6FA80860.COMCTL32(00499628,00418C7F,?,00000000,?,00499628,00000000,00000000,00000000,00000000,00418C78,?,00000000,0000000D,00000000,0000000E), ref: 00418C72
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$A80860A82980C400C740
                                  • String ID:
                                  • API String ID: 265698141-0
                                  • Opcode ID: e60f9813f3a55f33c9c30997bb55312e8b08414ce97b83284cdc55a22c36d154
                                  • Instruction ID: 26b891211d8d430f193af2678edb9fbe52fb5794735e9b484422d58a1dee4d18
                                  • Opcode Fuzzy Hash: e60f9813f3a55f33c9c30997bb55312e8b08414ce97b83284cdc55a22c36d154
                                  • Instruction Fuzzy Hash: D3113675744204BADB10EBF5DC82F5E73B8DB48704F5040AEB604E72D2E6799D408768
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(?,?,00000001,00000000,00000000,0048164C), ref: 00481631
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: LanmanNT$ProductType$ServerNT$System\CurrentControlSet\Control\ProductOptions$WinNT
                                  • API String ID: 557493163-2530820420
                                  • Opcode ID: 33c21e0d2e6add59f1b24b6a849ee8a96c3074c7579e45bf81f1fcf8c17d26aa
                                  • Instruction ID: 592cd06a245c4f5f2cb2cd7b4b64ace286a6c4331103c7d230e3d6d92b95bea5
                                  • Opcode Fuzzy Hash: 33c21e0d2e6add59f1b24b6a849ee8a96c3074c7579e45bf81f1fcf8c17d26aa
                                  • Instruction Fuzzy Hash: 2511D070B04204ABDB10FB6A8802B9F7BACDB11304F154877A841F72A2F7788E03975D
                                  APIs
                                  • 73F7A570.USER32(00000000,?,?,00000000), ref: 0049317D
                                    • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                  • SelectObject.GDI32(00000000,00000000), ref: 0049319F
                                  • GetTextExtentPointA.GDI32(00000000,ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz,00000034,0049371D), ref: 004931B3
                                  • GetTextMetricsA.GDI32(00000000,?), ref: 004931D5
                                  • 73F7A480.USER32(00000000,00000000,004931FF,004931F8,?,00000000,?,?,00000000), ref: 004931F2
                                  Strings
                                  • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 004931AA
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Text$A480A570CreateExtentFontIndirectMetricsObjectPointSelect
                                  • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                  • API String ID: 1435929781-222967699
                                  • Opcode ID: 00ab011a0482a4ca9d99f930a833df1ccd569561059c6994f7e4ec24a9fe92c6
                                  • Instruction ID: 4ec58355845d2b02f69284f4495f440b55ff71641bc2e0f0a28a2b12dc5a472b
                                  • Opcode Fuzzy Hash: 00ab011a0482a4ca9d99f930a833df1ccd569561059c6994f7e4ec24a9fe92c6
                                  • Instruction Fuzzy Hash: CE016176A44608BFEB00DFA9CC42E5EB7ECDB49704F51447AB604E7291D678AE008B28
                                  APIs
                                  • SelectObject.GDI32(00000000,?), ref: 0041B3E0
                                  • SelectObject.GDI32(?,00000000), ref: 0041B3EF
                                  • StretchBlt.GDI32(?,00000000,00000000,0000000B,?,00000000,00000000,00000000,?,?,00CC0020), ref: 0041B41B
                                  • SelectObject.GDI32(00000000,00000000), ref: 0041B429
                                  • SelectObject.GDI32(?,00000000), ref: 0041B437
                                  • DeleteDC.GDI32(00000000), ref: 0041B440
                                  • DeleteDC.GDI32(?), ref: 0041B449
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ObjectSelect$Delete$Stretch
                                  • String ID:
                                  • API String ID: 1458357782-0
                                  • Opcode ID: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                  • Instruction ID: 073f11bba2386bee955988a390c3df6f0cbda7ed7a331810ab0cae2060ca734e
                                  • Opcode Fuzzy Hash: 5d8119482a24acdf9dbc4f71c87d898742faec31f652e860e6f74a5bb4e0366a
                                  • Instruction Fuzzy Hash: F9114C72E40659ABDF10D6D9D985FAFB3BCEF08704F048456B614FB242C678A8418B54
                                  APIs
                                  • GetCursorPos.USER32 ref: 0042331F
                                  • WindowFromPoint.USER32(?,?), ref: 0042332C
                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0042333A
                                  • GetCurrentThreadId.KERNEL32 ref: 00423341
                                  • SendMessageA.USER32(00000000,00000084,?,?), ref: 0042335A
                                  • SendMessageA.USER32(00000000,00000020,00000000,00000000), ref: 00423371
                                  • SetCursor.USER32(00000000), ref: 00423383
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CursorMessageSendThreadWindow$CurrentFromPointProcess
                                  • String ID:
                                  • API String ID: 1770779139-0
                                  • Opcode ID: b7c3d0ed9cab098bf85e911ca9467ad0a8c32c8ca0e3c41edecca8c26dcac659
                                  • Instruction ID: 4e500bdd1cb7c406dcecfc45487f359b17b305850d12e3c552a5b3a09f906ed3
                                  • Opcode Fuzzy Hash: b7c3d0ed9cab098bf85e911ca9467ad0a8c32c8ca0e3c41edecca8c26dcac659
                                  • Instruction Fuzzy Hash: EC01D4223043103AD620BB795C86E3F26A8CFC5B55F50417FB909BE283DA3D8D0163AD
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetFinalPathNameByHandleA,021D2BFC,?,?,?,021D2BFC,004767EC,00000000,0047690A,?,?,?,?), ref: 00476719
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BFC,?,?,?,021D2BFC,004767EC,00000000,0047690A,?,?,?,?), ref: 0047671F
                                  • 6D1674B0.KERNEL32(00000000,00000080,00000007,00000000,00000003,00000000,00000000,00000000,kernel32.dll,GetFinalPathNameByHandleA,021D2BFC,?,?,?,021D2BFC,004767EC), ref: 00476741
                                  • CloseHandle.KERNEL32(00000000,?,?,?,021D2BFC,004767EC,00000000,0047690A,?,?,?,?), ref: 0047675F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Handle$CloseD166D1674Module
                                  • String ID: GetFinalPathNameByHandleA$kernel32.dll
                                  • API String ID: 730909071-2318956294
                                  • Opcode ID: 342ad769757e769c0df952a9a5769ddf6768b88966d0b427d74164e61265f34c
                                  • Instruction ID: b1273806145a63f9a8243b19b57c825c7ee45b57583113674eff970469e2f101
                                  • Opcode Fuzzy Hash: 342ad769757e769c0df952a9a5769ddf6768b88966d0b427d74164e61265f34c
                                  • Instruction Fuzzy Hash: 7B01A251741F0036E524756A0CC3FBB658D8B44BA9F25813BBA48AA2C2D9AC9D05019D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll), ref: 00492FA0
                                  • 6D166DE0.KERNEL32(00000000,MonitorFromRect,user32.dll), ref: 00492FAD
                                  • 6D166DE0.KERNEL32(00000000,GetMonitorInfoA,00000000,MonitorFromRect,user32.dll), ref: 00492FBA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$HandleModule
                                  • String ID: GetMonitorInfoA$MonitorFromRect$user32.dll
                                  • API String ID: 4215997472-2254406584
                                  • Opcode ID: 78aad8e0b9714be116a3aea95144d42542147ec8597618743bc89a8df43bfd09
                                  • Instruction ID: cea5fac38c2e36fda3f38752097ffcd25a4d7e14f24dd8c8f836c606a3de58aa
                                  • Opcode Fuzzy Hash: 78aad8e0b9714be116a3aea95144d42542147ec8597618743bc89a8df43bfd09
                                  • Instruction Fuzzy Hash: 2AF0F69274171477DE6065B61C81E7B6D9CCB85771F040037BD04F7386E99C8D0592BD
                                  APIs
                                  • 6D166DE0.KERNEL32(00000000,ISCryptGetVersion,?,0047D6E3,00000000,0047D70C), ref: 0045C0FD
                                  • 6D166DE0.KERNEL32(00000000,ArcFourInit,00000000,ISCryptGetVersion,?,0047D6E3,00000000,0047D70C), ref: 0045C10D
                                  • 6D166DE0.KERNEL32(00000000,ArcFourCrypt,00000000,ArcFourInit,00000000,ISCryptGetVersion,?,0047D6E3,00000000,0047D70C), ref: 0045C11D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166
                                  • String ID: ArcFourCrypt$ArcFourInit$ISCryptGetVersion
                                  • API String ID: 1446878013-508647305
                                  • Opcode ID: 1e4b4554fa8dc7ed0896e28cfb45fbec44cae0d49747c5ad8009963892b4c210
                                  • Instruction ID: aed6ea8d9d3c8b9440fa0c8f086378259b955efe14af5088ffa7e98f00b34660
                                  • Opcode Fuzzy Hash: 1e4b4554fa8dc7ed0896e28cfb45fbec44cae0d49747c5ad8009963892b4c210
                                  • Instruction Fuzzy Hash: 6FF0F9B0505B009EDB24DF76ACCDFA27695AB90702F14843BA444951B3D77C0668EADE
                                  APIs
                                  • 6D166DE0.KERNEL32(00000000,BZ2_bzDecompressInit,?,0047D574,00000000,0047D59D), ref: 0045C5FD
                                  • 6D166DE0.KERNEL32(00000000,BZ2_bzDecompress,00000000,BZ2_bzDecompressInit,?,0047D574,00000000,0047D59D), ref: 0045C60D
                                  • 6D166DE0.KERNEL32(00000000,BZ2_bzDecompressEnd,00000000,BZ2_bzDecompress,00000000,BZ2_bzDecompressInit,?,0047D574,00000000,0047D59D), ref: 0045C61D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166
                                  • String ID: BZ2_bzDecompress$BZ2_bzDecompressEnd$BZ2_bzDecompressInit
                                  • API String ID: 1446878013-212574377
                                  • Opcode ID: 33f842e00593cb357119dfa6f9a480721ccadad753552c0f5e582bb033676269
                                  • Instruction ID: db07a3548f1b4e2cfd50f82a9a0b282cd256409efcee8e5d658b723deb76043f
                                  • Opcode Fuzzy Hash: 33f842e00593cb357119dfa6f9a480721ccadad753552c0f5e582bb033676269
                                  • Instruction Fuzzy Hash: 0DF030B0902300DEDB04DF36ACC072632A5E76874AF14E43B9C05592A2DB7C0568CF5E
                                  APIs
                                  • LoadLibraryA.KERNEL32(oleacc.dll,?,0044E549), ref: 0044BCAB
                                  • 6D166DE0.KERNEL32(00000000,LresultFromObject,oleacc.dll,?,0044E549), ref: 0044BCBC
                                  • 6D166DE0.KERNEL32(00000000,CreateStdAccessibleObject,00000000,LresultFromObject,oleacc.dll,?,0044E549), ref: 0044BCCC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$LibraryLoad
                                  • String ID: CreateStdAccessibleObject$LresultFromObject$oleacc.dll
                                  • API String ID: 3670945825-1050967733
                                  • Opcode ID: e9e002c519eea4ea79b14f61333e405369ee6d80d36180ba86343255585cae84
                                  • Instruction ID: 198f4a53d7b827362494993b39ef16200e6ed3be4a6c00edf1fbc836726e95c8
                                  • Opcode Fuzzy Hash: e9e002c519eea4ea79b14f61333e405369ee6d80d36180ba86343255585cae84
                                  • Instruction Fuzzy Hash: 22F0FEB0660351CAFF10AFB9EDC57623694E364709F1451BFA4025A2D2CFBD8C44CA5C
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,?,0049689A), ref: 00476EDE
                                  • 6D166DE0.KERNEL32(00000000,VerSetConditionMask,kernel32.dll,?,0049689A), ref: 00476EEB
                                  • 6D166DE0.KERNEL32(00000000,VerifyVersionInfoW,00000000,VerSetConditionMask,kernel32.dll,?,0049689A), ref: 00476EFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$HandleModule
                                  • String ID: VerSetConditionMask$VerifyVersionInfoW$kernel32.dll
                                  • API String ID: 4215997472-222143506
                                  • Opcode ID: 8579039af7882282ecf87d49981187eb6e55a2056c897e057ee5ca9e035bf5af
                                  • Instruction ID: 334153fe173fcca34c6ba34e65941f511c8fcbd2c254e8132cf735f1af7427f0
                                  • Opcode Fuzzy Hash: 8579039af7882282ecf87d49981187eb6e55a2056c897e057ee5ca9e035bf5af
                                  • Instruction Fuzzy Hash: B6C012E0285B00EEEE00BFB13DC3D7B294AC590B28321843BB148791C3D6BD0C188E6E
                                  APIs
                                  • GetFocus.USER32 ref: 0041B6B5
                                  • 73F7A570.USER32(?), ref: 0041B6C1
                                  • 73F78830.GDI32(00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B6F6
                                  • 73F722A0.GDI32(00000000,00000000,?,00000000,00000000,0041B78C,?,?), ref: 0041B702
                                  • 73F86310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B730
                                  • 73F78830.GDI32(00000000,00000000,00000000,0041B771,?,?,00000000,00000000,0041B76A,?,00000000,0041B78C,?,?), ref: 0041B764
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: F78830$A570F722F86310Focus
                                  • String ID:
                                  • API String ID: 2456752540-0
                                  • Opcode ID: d29f05eb6b29070db352309e07eb4e8bfeb24327755f0d073565eec47d644615
                                  • Instruction ID: 06dd750ffd38faa4806619bbf82afcbb6c92213719a6bc319da55d16d67b79f4
                                  • Opcode Fuzzy Hash: d29f05eb6b29070db352309e07eb4e8bfeb24327755f0d073565eec47d644615
                                  • Instruction Fuzzy Hash: 8E512C70A00609AFDF11DFA9C895AEEBBB8FF49704F104466F510A7390D7789981CBA9
                                  APIs
                                  • GetFocus.USER32 ref: 0041B987
                                  • 73F7A570.USER32(?), ref: 0041B993
                                  • 73F78830.GDI32(00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9CD
                                  • 73F722A0.GDI32(00000000,00000000,?,00000000,00000000,0041BA59,?,?), ref: 0041B9D9
                                  • 73F86310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041B9FD
                                  • 73F78830.GDI32(00000000,00000000,00000000,0041BA3E,?,?,00000000,00000000,0041BA37,?,00000000,0041BA59,?,?), ref: 0041BA31
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: F78830$A570F722F86310Focus
                                  • String ID:
                                  • API String ID: 2456752540-0
                                  • Opcode ID: 7c51fc24fae23f99d30c86bebf47e6e5bb2fa1576662f29aaf30661c9bdccefa
                                  • Instruction ID: 49b1e422d63778e1935042bf56866254f806bc58ba08b8974fd4ee1451f7b7cb
                                  • Opcode Fuzzy Hash: 7c51fc24fae23f99d30c86bebf47e6e5bb2fa1576662f29aaf30661c9bdccefa
                                  • Instruction Fuzzy Hash: 4F512B74A006089FCB11DFA9C895AAEBBF9FF48700F118066F904EB750D7389D40CBA8
                                  APIs
                                  • GetFocus.USER32 ref: 0041B4EE
                                  • 73F7A570.USER32(?,00000000,0041B5C8,?,?,?,?), ref: 0041B4FA
                                  • 73F84620.GDI32(?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B516
                                  • 73FAE680.GDI32(?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8,?,?,?,?), ref: 0041B533
                                  • 73FAE680.GDI32(?,00000000,00000008,?,?,00000000,00000008,?,?,00000068,00000000,0041B59C,?,?,00000000,0041B5C8), ref: 0041B54A
                                  • 73F7A480.USER32(?,?,0041B5A3,?,?), ref: 0041B596
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: E680$A480A570F84620Focus
                                  • String ID:
                                  • API String ID: 1182602078-0
                                  • Opcode ID: 1f4298d78a2f1742154d7222e83094663d7d9fd1bb92d6f88fa0bedfa030a04b
                                  • Instruction ID: a6e4b16520c9e4bc630ca31e265eea6a5194191570467489af8bdb357d288b52
                                  • Opcode Fuzzy Hash: 1f4298d78a2f1742154d7222e83094663d7d9fd1bb92d6f88fa0bedfa030a04b
                                  • Instruction Fuzzy Hash: 2D41C571A04254AFDF10DFA9C885AAFBBB5EF49704F1484AAE900E7351D2389D10CBA5
                                  APIs
                                  • SetLastError.KERNEL32(00000057,00000000,0045C084,?,?,?,?,00000000), ref: 0045C023
                                  • SetLastError.KERNEL32(00000000,00000002,?,?,?,0045C0F0,?,00000000,0045C084,?,?,?,?,00000000), ref: 0045C062
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: CLASSES_ROOT$CURRENT_USER$MACHINE$USERS
                                  • API String ID: 1452528299-1580325520
                                  • Opcode ID: 1635db9367c3538f01df35720d1f6460fc1de285fb0027a2b8e666c186e7b59a
                                  • Instruction ID: b6cd0bec3ff09a3bb6dc86b9927888ec64e4347f774d72f3c1437a5c2b732091
                                  • Opcode Fuzzy Hash: 1635db9367c3538f01df35720d1f6460fc1de285fb0027a2b8e666c186e7b59a
                                  • Instruction Fuzzy Hash: 8F11A535204308EFD711DAE1C9C1BAF76ADDB44B1AF608077AD00A62C3D67C5F0A956A
                                  APIs
                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BD45
                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BD4F
                                  • 73F7A570.USER32(00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD59
                                  • 73F84620.GDI32(00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD80
                                  • 73F84620.GDI32(00000000,0000000C,00000000,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BD8D
                                  • 73F7A480.USER32(00000000,00000000,0041BDD3,0000000E,00000000,0041BDCC,?,00000000,0000000C,0000000B,?,?,00000000,?), ref: 0041BDC6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: F84620MetricsSystem$A480A570
                                  • String ID:
                                  • API String ID: 3949167401-0
                                  • Opcode ID: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                  • Instruction ID: 8181195c8b7ace5e518c23098daf85fccaa127339f370ed271397b7e8efdaee2
                                  • Opcode Fuzzy Hash: 1c903c0536bb10720712021bcda66a401c12054db1b22576e6386974878fa910
                                  • Instruction Fuzzy Hash: 1F212C74E046499FEB04EFA9C941BEEB7B4EB48714F10402AF514B7680D7785940CFA9
                                  APIs
                                  • SetWindowLongA.USER32(?,000000FC,?), ref: 004135D4
                                  • GetWindowLongA.USER32(?,000000F0), ref: 004135DF
                                  • GetWindowLongA.USER32(?,000000F4), ref: 004135F1
                                  • SetWindowLongA.USER32(?,000000F4,?), ref: 00413604
                                  • SetPropA.USER32(?,00000000,00000000), ref: 0041361B
                                  • SetPropA.USER32(?,00000000,00000000), ref: 00413632
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: LongWindow$Prop
                                  • String ID:
                                  • API String ID: 3887896539-0
                                  • Opcode ID: 4ddfdf6a7757ea552a82c0c4c22da95f795192ce00a0438a73c6c00e638455e2
                                  • Instruction ID: fc28b156e1f5584ed0309b3167e09f9ed1df3e03a3a700cae6e5885bbd9195fc
                                  • Opcode Fuzzy Hash: 4ddfdf6a7757ea552a82c0c4c22da95f795192ce00a0438a73c6c00e638455e2
                                  • Instruction Fuzzy Hash: 1511F976114204BFDB00DF99DC84E9A3BE8AB08364F108266B918DB2A1D738D9908B68
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EC), ref: 0047C3BA
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC,?,0046B588), ref: 0047C3E0
                                  • GetWindowLongA.USER32(?,000000EC), ref: 0047C3F0
                                  • SetWindowLongA.USER32(?,000000EC,00000000), ref: 0047C411
                                  • ShowWindow.USER32(?,00000005,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000,00000000,00000000,00000097,?,000000EC), ref: 0047C425
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000057,?,000000EC,00000000,?,000000EC,?,00000000,00000000,00000000), ref: 0047C441
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$Long$Show
                                  • String ID:
                                  • API String ID: 3609083571-0
                                  • Opcode ID: 7c432d6b7207baace45a7fec6191b6016af158ff3578d68d92032f8752a16d6c
                                  • Instruction ID: aa46c9770f5a049cfa1fc35fa8fa508e72473281f0db034a4ddf36960027aefc
                                  • Opcode Fuzzy Hash: 7c432d6b7207baace45a7fec6191b6016af158ff3578d68d92032f8752a16d6c
                                  • Instruction Fuzzy Hash: 5F010CB5651210ABE610DB68CD91FAA3798AB0D334F05466EB559DF2E3C629DC408B48
                                  APIs
                                    • Part of subcall function 0041A650: CreateBrushIndirect.GDI32 ref: 0041A6BB
                                  • UnrealizeObject.GDI32(00000000), ref: 0041B1EC
                                  • SelectObject.GDI32(?,00000000), ref: 0041B1FE
                                  • SetBkColor.GDI32(?,00000000), ref: 0041B221
                                  • SetBkMode.GDI32(?,00000002), ref: 0041B22C
                                  • SetBkColor.GDI32(?,00000000), ref: 0041B247
                                  • SetBkMode.GDI32(?,00000001), ref: 0041B252
                                    • Part of subcall function 00419FC8: GetSysColor.USER32(?), ref: 00419FD2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Color$ModeObject$BrushCreateIndirectSelectUnrealize
                                  • String ID:
                                  • API String ID: 3527656728-0
                                  • Opcode ID: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                  • Instruction ID: 2be34f36c4bf399c8fa5e8a938e63ded300dcfd20fe04f8c9e05bbd916d2a40e
                                  • Opcode Fuzzy Hash: af92fd76f0ea33d52ebd072e8e43ea1c00ff5cbe0803c9f3aa53dd55169beb2c
                                  • Instruction Fuzzy Hash: 84F0BFB1511101ABCE00FFBAD9CAE4B27A89F443097048057B944DF19BC63CDC504B3E
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(?,?,00000001,00000000,00000000,0045490B,?,00000000,0045494B), ref: 00454851
                                  Strings
                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 004547D4
                                  • PendingFileRenameOperations2, xrefs: 00454820
                                  • PendingFileRenameOperations, xrefs: 004547F0
                                  • WININIT.INI, xrefs: 00454880
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager$WININIT.INI
                                  • API String ID: 557493163-2199428270
                                  • Opcode ID: e7607ece70d0f5f5ee74137fab1a4bb6db07373ca8769939dfb7f522c0d98637
                                  • Instruction ID: e585b470d606cef0f7ff89ad470cd776915c75dff17687b4f5620fe554696a3d
                                  • Opcode Fuzzy Hash: e7607ece70d0f5f5ee74137fab1a4bb6db07373ca8769939dfb7f522c0d98637
                                  • Instruction Fuzzy Hash: E751BC74E042489FDB10EF71DC529DEB7B9EF84309F10857BE804AB292DB399E45CA18
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetDiskFreeSpaceExA,00000000,00454FDC), ref: 00454ED8
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,GetDiskFreeSpaceExA,00000000,00454FDC), ref: 00454EDE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                  • API String ID: 439651959-3712701948
                                  • Opcode ID: 1189ca3242940dc4504bc600adf4358f0779097aa4101c01e5a4aca5621140fb
                                  • Instruction ID: 6556e6f8e85692071989244b9e76e97104b9a8ec68df38102fc512f580600cd7
                                  • Opcode Fuzzy Hash: 1189ca3242940dc4504bc600adf4358f0779097aa4101c01e5a4aca5621140fb
                                  • Instruction Fuzzy Hash: D7314471A04249AFCB01DFA9C892DEFB7B8EF89705F504566F800F7292D6785D098B68
                                  APIs
                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                  • ShowWindow.USER32(?,00000005,00000000,00495C89,?,?,00000000), ref: 00495A5A
                                    • Part of subcall function 0042D7A0: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0042D7B3
                                    • Part of subcall function 00407210: SetCurrentDirectoryA.KERNEL32(00000000,?,00495A82,00000000,00495C55,?,?,00000005,00000000,00495C89,?,?,00000000), ref: 0040721B
                                    • Part of subcall function 0042D328: GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,0042D3B6,?,?,00000000,?,?,00495A8C,00000000,00495C55,?,?,00000005), ref: 0042D35D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: DirectoryWindow$CurrentFileModuleNameShowSystemText
                                  • String ID: .dat$.msg$IMsg$Uninstall
                                  • API String ID: 3312786188-1660910688
                                  • Opcode ID: a65f7f6f85c1ba76a6ecb4eec30e47d063e55d9ac03b40616d0cda4559523cf8
                                  • Instruction ID: eed15c66d0b60b6a3c4c16a6531e268fd98716f92798e373cf10e096f35d41a1
                                  • Opcode Fuzzy Hash: a65f7f6f85c1ba76a6ecb4eec30e47d063e55d9ac03b40616d0cda4559523cf8
                                  • Instruction Fuzzy Hash: 9631B634A006149FDB01FF65DC56D5E7BB5FB88308B60887AF400AB391CB79AD05CB99
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonCreate), ref: 0042E846
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042E84C
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,user32.dll,ShutdownBlockReasonCreate), ref: 0042E875
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ByteCharD166HandleModuleMultiWide
                                  • String ID: ShutdownBlockReasonCreate$user32.dll
                                  • API String ID: 3811887981-2866557904
                                  • Opcode ID: 45bf696c58fb1a06ed23ea2970b0f1bccc84676fbc05fa91be3c282395eba54e
                                  • Instruction ID: ac0542c787143ba22f0eab23c99be7939f1a28ededf3295516800ce376932e43
                                  • Opcode Fuzzy Hash: 45bf696c58fb1a06ed23ea2970b0f1bccc84676fbc05fa91be3c282395eba54e
                                  • Instruction Fuzzy Hash: 90F0F6E174072237E620B2BFACC2F6B15CC8F94766F540136B588EB2C2E96C8905426F
                                  APIs
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 00456AF8
                                  • GetExitCodeProcess.KERNEL32(?,0049640E), ref: 00456B19
                                  • CloseHandle.KERNEL32(?,00456B4C,?,?,gsE,00000000,00000000), ref: 00456B3F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseCodeExitHandleMultipleObjectsProcessWait
                                  • String ID: GetExitCodeProcess$MsgWaitForMultipleObjects
                                  • API String ID: 2573145106-3235461205
                                  • Opcode ID: e68a510a9562e6ffe4bd6e2b7f4476c54b810d57e85b6d58634b9f4cba1bde83
                                  • Instruction ID: 0967fcd1d3bdefac7bc2385a56a55f6452ec80dcafea2609c0c459e4db786005
                                  • Opcode Fuzzy Hash: e68a510a9562e6ffe4bd6e2b7f4476c54b810d57e85b6d58634b9f4cba1bde83
                                  • Instruction Fuzzy Hash: 5301AD30600214AFDB14EBA98D12A5E73E9EB49721FA24077FD10E73D3DA79AE04961C
                                  APIs
                                  • RegDeleteKeyA.ADVAPI32(00000000,?), ref: 0042DC88
                                  • GetModuleHandleA.KERNEL32(advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE0B,00000000,0042DE23,?,?,?,?,00000006,?,00000000,004954CB), ref: 0042DCA3
                                  • 6D166DE0.KERNEL32(00000000,advapi32.dll,RegDeleteKeyExA,?,00000000,0042DE0B,00000000,0042DE23,?,?,?,?,00000006,?,00000000,004954CB), ref: 0042DCA9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166DeleteHandleModule
                                  • String ID: RegDeleteKeyExA$advapi32.dll
                                  • API String ID: 529285437-1846899949
                                  • Opcode ID: 0d323e8ce3ed0a1df9cde1e38352a16ea2708c0262c31cd6209868a8e33aeb8c
                                  • Instruction ID: a8e6c3e19bf274c0ac554b71675f4f4da1622df9f0b95ac594cbb4a71638a8fc
                                  • Opcode Fuzzy Hash: 0d323e8ce3ed0a1df9cde1e38352a16ea2708c0262c31cd6209868a8e33aeb8c
                                  • Instruction Fuzzy Hash: D9E06DF0B45230AADA20676B7D4AFA327289B64725F54403BB105A619182FD4C40DE5D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilterEx,00000004,00497934,00455CBD,00456060,00455C14,00000000,00000B06,00000000,00000000,?,00000001,00000000,00000002,00000000), ref: 0042E7A1
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,ChangeWindowMessageFilterEx,00000004,00497934,00455CBD,00456060,00455C14,00000000,00000B06,00000000,00000000,?,00000001,00000000,00000002), ref: 0042E7A7
                                  • InterlockedExchange.KERNEL32(00499668,00000001), ref: 0042E7B8
                                    • Part of subcall function 0042E718: GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042E7DC,00000004,00497934,00455CBD,00456060,00455C14,00000000,00000B06,00000000,00000000,?,00000001,00000000), ref: 0042E72E
                                    • Part of subcall function 0042E718: 6D166DE0.KERNEL32(00000000,user32.dll,ChangeWindowMessageFilter,?,0042E7DC,00000004,00497934,00455CBD,00456060,00455C14,00000000,00000B06,00000000,00000000,?,00000001), ref: 0042E734
                                    • Part of subcall function 0042E718: InterlockedExchange.KERNEL32(00499660,00000001), ref: 0042E745
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166ExchangeHandleInterlockedModule
                                  • String ID: ChangeWindowMessageFilterEx$user32.dll
                                  • API String ID: 529160291-2676053874
                                  • Opcode ID: a5adeedac3879557c0600b8cab95d2a3851616d22d0594a68f65248dd121f376
                                  • Instruction ID: d327addb07fa1d34877d3082f65a6d6aa94696c7b20ac2dcfa67383fa2b4ac77
                                  • Opcode Fuzzy Hash: a5adeedac3879557c0600b8cab95d2a3851616d22d0594a68f65248dd121f376
                                  • Instruction Fuzzy Hash: 38E06DB1341720AAEA1077BA6CC6F9A225C8780769F54403FF600A61D1C2BE0C80CA5C
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,ChangeWindowMessageFilter,?,0042E7DC,00000004,00497934,00455CBD,00456060,00455C14,00000000,00000B06,00000000,00000000,?,00000001,00000000), ref: 0042E72E
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,ChangeWindowMessageFilter,?,0042E7DC,00000004,00497934,00455CBD,00456060,00455C14,00000000,00000B06,00000000,00000000,?,00000001), ref: 0042E734
                                  • InterlockedExchange.KERNEL32(00499660,00000001), ref: 0042E745
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166ExchangeHandleInterlockedModule
                                  • String ID: ChangeWindowMessageFilter$user32.dll
                                  • API String ID: 529160291-2498399450
                                  • Opcode ID: 425561683d1a582b287fd4423fac3983046a6d6a64d4090f95d0908a83494576
                                  • Instruction ID: 83b15b5d67bfb2ce210de02991b715893c24bd2fd1fcf991286e79864b3c950e
                                  • Opcode Fuzzy Hash: 425561683d1a582b287fd4423fac3983046a6d6a64d4090f95d0908a83494576
                                  • Instruction Fuzzy Hash: FBE0ECB1741314EADB107B7A6D8AF5A265CA768715F54043FF501651E2C7BD0C40C91C
                                  APIs
                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00475F2C
                                  • GetModuleHandleA.KERNEL32(user32.dll,AllowSetForegroundWindow,00000000,?,?,00476023,0049A03C,00000000), ref: 00475F3F
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,AllowSetForegroundWindow,00000000,?,?,00476023,0049A03C,00000000), ref: 00475F45
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModuleProcessThreadWindow
                                  • String ID: AllowSetForegroundWindow$user32.dll
                                  • API String ID: 3209758144-3855017861
                                  • Opcode ID: 034d89e5d93904354b17ae14d84902b50b2a6fce19bbd9290eadab28e9067b8e
                                  • Instruction ID: 93acaa5a75c3b516ac4be21c8560ff1ba3ec921bf34a9ca8d1ccf185f5b704da
                                  • Opcode Fuzzy Hash: 034d89e5d93904354b17ae14d84902b50b2a6fce19bbd9290eadab28e9067b8e
                                  • Instruction Fuzzy Hash: 9ED0A790644F0169ED10B7F14C4ED6B234C9D84714724853BB40CFE1C2CABCD809493D
                                  APIs
                                  • BeginPaint.USER32(00000000,?), ref: 00416BC2
                                  • SaveDC.GDI32(?), ref: 00416BF3
                                  • ExcludeClipRect.GDI32(?,?,?,?,?,?,00000000,00416CB5), ref: 00416C54
                                  • RestoreDC.GDI32(?,?), ref: 00416C7B
                                  • EndPaint.USER32(00000000,?,00416CBC,00000000,00416CB5), ref: 00416CAF
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Paint$BeginClipExcludeRectRestoreSave
                                  • String ID:
                                  • API String ID: 3808407030-0
                                  • Opcode ID: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                  • Instruction ID: 41fb8ea60d97978a9acdf236596d3a8a0d8a1996066437b2b943a95edf1585a8
                                  • Opcode Fuzzy Hash: c06abe95da4831753d63b9634986ca39a884699dacb8f14d7531f4240f3d7fe3
                                  • Instruction Fuzzy Hash: BF414E70A042049FDB14DB99C989FAA77F9EB48304F1580AEE4459B362D778DD40CB58
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                  • Instruction ID: 41a7722d09b35ce9ade17cd18fdec9692d257bae8bd1aa266952c484067d5cda
                                  • Opcode Fuzzy Hash: 50d6a748b1b1338860e82f27f8761871ff193d734180217a0f8d82b491afa6e7
                                  • Instruction Fuzzy Hash: D3311F746047409FC320EB69C584BABB7E8AF89714F04991EF9E5C7791D738EC818B19
                                  APIs
                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 00429778
                                  • SendMessageA.USER32(00000000,000000BB,?,00000000), ref: 004297A7
                                  • SendMessageA.USER32(00000000,000000C1,00000000,00000000), ref: 004297C3
                                  • SendMessageA.USER32(00000000,000000B1,00000000,00000000), ref: 004297EE
                                  • SendMessageA.USER32(00000000,000000C2,00000000,00000000), ref: 0042980C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: d93a833f87ba0e73dcc457bbfd04d607f88d4d221c0389d21231ca6786db581f
                                  • Instruction ID: 5c059f72bad19c8464015bcf3ba3f3fa2ba546ca9f5ab3c2e37583cf1b766786
                                  • Opcode Fuzzy Hash: d93a833f87ba0e73dcc457bbfd04d607f88d4d221c0389d21231ca6786db581f
                                  • Instruction Fuzzy Hash: 2E217F70710714BAE710ABA6DC82F5B77ACEB46708F90443EB501BB3D2DB78AD41865C
                                  APIs
                                  • GetSystemMetrics.USER32(0000000B), ref: 0041BB3A
                                  • GetSystemMetrics.USER32(0000000C), ref: 0041BB44
                                  • 73F7A570.USER32(00000000,00000001,0000000C,0000000B,?,?), ref: 0041BB82
                                  • 73F86310.GDI32(00000000,?,00000004,?,?,00000000,00000000,0041BCED,?,00000000,00000001,0000000C,0000000B,?,?), ref: 0041BBC9
                                  • DeleteObject.GDI32(00000000), ref: 0041BC0A
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MetricsSystem$A570DeleteF86310Object
                                  • String ID:
                                  • API String ID: 2606799143-0
                                  • Opcode ID: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                  • Instruction ID: e64c8cfb77975bfe1c5019289902123c5e37d94f13133d85ba8c481b6df62587
                                  • Opcode Fuzzy Hash: cb0e2adf6529593e89f90c831e9305c3e05f521d232314fc64d16b3fc11dbc77
                                  • Instruction Fuzzy Hash: 91316F74E00609EFDB00DFA5C941AAEB7F4EB48700F10846AF510AB781D7389E80DB98
                                  APIs
                                    • Part of subcall function 0045BFB8: SetLastError.KERNEL32(00000057,00000000,0045C084,?,?,?,?,00000000), ref: 0045C023
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00471F48,?,?,00000001,0049A160), ref: 00471F01
                                  • GetLastError.KERNEL32(00000000,00000000,00000000,00471F48,?,?,00000001,0049A160), ref: 00471F17
                                  Strings
                                  • Failed to set permissions on registry key (%d)., xrefs: 00471F28
                                  • Setting permissions on registry key: %s\%s, xrefs: 00471EC6
                                  • Could not set permissions on the registry key because it currently does not exist., xrefs: 00471F0B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: Could not set permissions on the registry key because it currently does not exist.$Failed to set permissions on registry key (%d).$Setting permissions on registry key: %s\%s
                                  • API String ID: 1452528299-4018462623
                                  • Opcode ID: 06b4b6b62b22b9a4bd7e9f6c553833e2a2a92df5dd6c89c033ecf3b2de3a5925
                                  • Instruction ID: ba9c69de7a70f3ceaeb13725b546c2869ccc266c25af2b357a52a6f2c4dcf2c9
                                  • Opcode Fuzzy Hash: 06b4b6b62b22b9a4bd7e9f6c553833e2a2a92df5dd6c89c033ecf3b2de3a5925
                                  • Instruction Fuzzy Hash: 0521A770A042445FCB00DBADC8426EEBBE9EB49314F50817BE408E73A2D7785D058BAD
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                  • SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000), ref: 00403CFC
                                  • SysAllocStringLen.OLEAUT32(00000000,00000000), ref: 00403D06
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00403D15
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocString
                                  • String ID:
                                  • API String ID: 262959230-0
                                  • Opcode ID: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                  • Instruction ID: 657f84db466bd1c54801a2b30447fc2084338491f8142acf58a262d5883cef98
                                  • Opcode Fuzzy Hash: bbd83879051bbb61c82a419d540aea94b1d83442c47b8cdfd9cb13069dd9a881
                                  • Instruction Fuzzy Hash: FCF0A4917442043BF21025A65C43F6B198CCB82B9BF50053FB704FA1D2D87C9D04427D
                                  APIs
                                  • 73F78830.GDI32(00000000,00000000,00000000), ref: 00414389
                                  • 73F722A0.GDI32(00000000,00000000,00000000,00000000), ref: 00414391
                                  • 73F78830.GDI32(00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143A5
                                  • 73F722A0.GDI32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143AB
                                  • 73F7A480.USER32(00000000,00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000), ref: 004143B6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: F722F78830$A480
                                  • String ID:
                                  • API String ID: 2177965545-0
                                  • Opcode ID: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                  • Instruction ID: 94861c3129a932f854b236b0087f7367a4de39103189020794ca85cb03cdcc47
                                  • Opcode Fuzzy Hash: 194e3fff164acdd9274630c615ac113e6c237e1a8584744cad8ee02aea33715e
                                  • Instruction Fuzzy Hash: 6F01DF7121C3806AD200B63E8C85A9F6BED8FCA314F15556EF498DB382CA7ACC018765
                                  APIs
                                  • SetActiveWindow.USER32(?,?,00000000,00480DE1,?,?,00000001,?), ref: 00480BDD
                                  • SHChangeNotify.SHELL32(08000000,00000000,00000000,00000000), ref: 00480C52
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ActiveChangeNotifyWindow
                                  • String ID: $Need to restart Windows? %s
                                  • API String ID: 1160245247-4200181552
                                  • Opcode ID: 393233134be75f05b4779166502c265e7d55b511039cf989b62b59604718cb6a
                                  • Instruction ID: 4aa1253117f9d220f86d454c8ebac855e08be0f9177d91d94ed259031e7b075c
                                  • Opcode Fuzzy Hash: 393233134be75f05b4779166502c265e7d55b511039cf989b62b59604718cb6a
                                  • Instruction Fuzzy Hash: 469180346002449FCB54EF69D886B9E77F1AF45308F1445BBE8009B362DB78AD09CB9E
                                  APIs
                                    • Part of subcall function 0041EFE4: GetActiveWindow.USER32 ref: 0041EFE7
                                    • Part of subcall function 0041EFE4: GetCurrentThreadId.KERNEL32 ref: 0041EFFC
                                    • Part of subcall function 0041EFE4: 73F85940.USER32(00000000,Function_0001EFC0), ref: 0041F002
                                    • Part of subcall function 00423118: GetSystemMetrics.USER32(00000000), ref: 0042311A
                                  • OffsetRect.USER32(?,?,?), ref: 00424D39
                                  • DrawTextA.USER32(00000000,00000000,000000FF,?,00000C10), ref: 00424DFC
                                  • OffsetRect.USER32(?,?,?), ref: 00424E0D
                                    • Part of subcall function 004234D4: GetCurrentThreadId.KERNEL32 ref: 004234E9
                                    • Part of subcall function 004234D4: SetWindowsHookExA.USER32(00000003,00423490,00000000,00000000), ref: 004234F9
                                    • Part of subcall function 004234D4: CreateThread.KERNEL32(00000000,000003E8,00423440,00000000,00000000), ref: 0042351D
                                    • Part of subcall function 00424A9C: SetTimer.USER32(00000000,00000001,?,00423424), ref: 00424AB7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Thread$CurrentOffsetRect$ActiveCreateDrawF85940HookMetricsSystemTextTimerWindowWindows
                                  • String ID: KB
                                  • API String ID: 1676449949-1869488878
                                  • Opcode ID: 140feffe6cce27af2a6224d3065bdd52d93ca5af5fa2531d527dd57fc9eed11e
                                  • Instruction ID: f52d481962c584d609b581bf8db91b810bad9089dae7ddb0c95d7c9dd944e9bb
                                  • Opcode Fuzzy Hash: 140feffe6cce27af2a6224d3065bdd52d93ca5af5fa2531d527dd57fc9eed11e
                                  • Instruction Fuzzy Hash: 73811771A002189FDF14DFA8D884ADEBBB5FF48314F5045AAE904AB296DB38AD45CF44
                                  APIs
                                    • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                  • GetLastError.KERNEL32(00000000,0046E615,?,?,00000001,0049A160), ref: 0046E4F2
                                  • SHChangeNotify.SHELL32(00000008,00000001,00000000,00000000), ref: 0046E56C
                                  • SHChangeNotify.SHELL32(00001000,00001001,00000000,00000000), ref: 0046E591
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ChangeNotify$ErrorFullLastNamePath
                                  • String ID: Creating directory: %s
                                  • API String ID: 2451617938-483064649
                                  • Opcode ID: c2d4aff7de63fd893b6f91d39f276edaed519ab4f4a2fb556f08066925c7a893
                                  • Instruction ID: ee391acc8c46a12a701fe7de38f12e5d0d012ca565d69bb7ed801d16d917e0e6
                                  • Opcode Fuzzy Hash: c2d4aff7de63fd893b6f91d39f276edaed519ab4f4a2fb556f08066925c7a893
                                  • Instruction Fuzzy Hash: 70512674E00258ABDB01DFA5C582BDEB7F5AF48308F50856AE841B7342D7785E04DB99
                                  APIs
                                  • WNetGetUniversalNameA.MPR(00000000,00000001,?,00000400), ref: 00406F6B
                                  • WNetOpenEnumA.MPR(00000001,00000001,00000000,00000000,?), ref: 00406FE5
                                  • WNetEnumResourceA.MPR(?,FFFFFFFF,?,?), ref: 0040703D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Enum$NameOpenResourceUniversal
                                  • String ID: Z
                                  • API String ID: 3604996873-1505515367
                                  • Opcode ID: e8dbae99a7dcba8e3fe9697e607370068dc5994f2dd1835f7b1653fcac931384
                                  • Instruction ID: c5afe0da71e31bc3c88331cc7d2fcbc5ad41680026aac5e5d837dfd1e94c86ee
                                  • Opcode Fuzzy Hash: e8dbae99a7dcba8e3fe9697e607370068dc5994f2dd1835f7b1653fcac931384
                                  • Instruction Fuzzy Hash: D7514170E042099FDB11EF55C941A9EBBB9FB09304F5041BAE540BB3D1C778AE418F5A
                                  APIs
                                  • SetRectEmpty.USER32(?), ref: 0044C50E
                                  • DrawTextA.USER32(00000000,00000000,00000000,?,00000D20), ref: 0044C539
                                  • DrawTextA.USER32(00000000,00000000,00000000,00000000,00000800), ref: 0044C5C1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: DrawText$EmptyRect
                                  • String ID:
                                  • API String ID: 182455014-2867612384
                                  • Opcode ID: a89014da5242fac794eed501f7e96c44124a9002652a303dae5d4ebba296219e
                                  • Instruction ID: 4508d5f579824a8c6f6f234c08085581b80e9f6740b97ff1de3d45831c78f32f
                                  • Opcode Fuzzy Hash: a89014da5242fac794eed501f7e96c44124a9002652a303dae5d4ebba296219e
                                  • Instruction Fuzzy Hash: 36517371900258AFDB50DFA5C8C5BDEBBF9EF49304F08847AE845EB251D738A944CB64
                                  APIs
                                  • 73F7A570.USER32(00000000,00000000,0042EC2C,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042EB02
                                    • Part of subcall function 0041A158: CreateFontIndirectA.GDI32(?), ref: 0041A217
                                  • SelectObject.GDI32(?,00000000), ref: 0042EB25
                                  • 73F7A480.USER32(00000000,?,0042EC11,00000000,0042EC0A,?,00000000,00000000,0042EC2C,?,?,?,?,00000000,00000000,00000000), ref: 0042EC04
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: A480A570CreateFontIndirectObjectSelect
                                  • String ID: ...\
                                  • API String ID: 2998766281-983595016
                                  • Opcode ID: 9547bbdf0534f10ac831ebfa93f718171ab8ca5bfe4f9870a769e3513675e216
                                  • Instruction ID: 3ea2f4fda2af0d4dbead9854f9e4c512e5c56e1bc2fe1fbb634109393928ece3
                                  • Opcode Fuzzy Hash: 9547bbdf0534f10ac831ebfa93f718171ab8ca5bfe4f9870a769e3513675e216
                                  • Instruction Fuzzy Hash: 81313370B00128AFDF11EB97D841BAEBBB9EF48304F91447BF410A7291D7786D45CA69
                                  APIs
                                  • 6D166DE0.KERNEL32(00000000,SfcIsFileProtected,00000000,00453FEC), ref: 00453F26
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000FFF,00000000,00453FEC), ref: 00453F90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ByteCharD166MultiWide
                                  • String ID: SfcIsFileProtected$sfc.dll
                                  • API String ID: 3111646875-591603554
                                  • Opcode ID: 48cd59871438a208470380f511db199473adc8dc8e8fa4cea36bd2c778173ea8
                                  • Instruction ID: 048db31cea9a49fe57b20dbb51b81541660e5ea55c147f47882b69a52e81beff
                                  • Opcode Fuzzy Hash: 48cd59871438a208470380f511db199473adc8dc8e8fa4cea36bd2c778173ea8
                                  • Instruction Fuzzy Hash: 4B419971A042189FEB10DF55DC85B9EB7B8AB04709F5041BBB908E7293D7789F48CA5C
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00494A81,_iu,?,00000000,00452BDE), ref: 00452B93
                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000002,00000080,00000000,.tmp,00494A81,_iu,?,00000000,00452BDE), ref: 00452BA3
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseD1674Handle
                                  • String ID: .tmp$_iu
                                  • API String ID: 3372331149-10593223
                                  • Opcode ID: 1fcc9553a8f684c5c7c9a0ea766f5fca7cf566c39ceade857f735b1514f9f4be
                                  • Instruction ID: 6fde55615647d4ed48ab14c0a307ffcb251606c4012a1fb284826946d44ffa3a
                                  • Opcode Fuzzy Hash: 1fcc9553a8f684c5c7c9a0ea766f5fca7cf566c39ceade857f735b1514f9f4be
                                  • Instruction Fuzzy Hash: E431B370A40209ABCB11EFA5C942B9EB7B4AF45309F20446BF800B73C2D7786E0587A8
                                  APIs
                                  • GetClassInfoA.USER32(00400000,?,?), ref: 004163EF
                                  • UnregisterClassA.USER32(?,00400000), ref: 0041641B
                                  • RegisterClassA.USER32(?), ref: 0041643E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Class$InfoRegisterUnregister
                                  • String ID: @
                                  • API String ID: 3749476976-2766056989
                                  • Opcode ID: 7bde4a9d017b37b399d712bcb3f1799561031588eacc8c0706b456525513edcb
                                  • Instruction ID: 409200c13affa244f493d0d71e2c786b6f8b5131a0ea67a27e918f437d5bfa87
                                  • Opcode Fuzzy Hash: 7bde4a9d017b37b399d712bcb3f1799561031588eacc8c0706b456525513edcb
                                  • Instruction Fuzzy Hash: E7316E706042058BD760EF68C981B9B77E5AB88308F04447FF985DB392DB39DD448B6E
                                  APIs
                                  • GetFileAttributesA.KERNEL32(00000000,004967F0,00000000,00495FCE,?,?,00000000,00499628), ref: 00495F48
                                  • 6D1682A0.KERNEL32(00000000,00000000,00000000,004967F0,00000000,00495FCE,?,?,00000000,00499628), ref: 00495F71
                                  • 6D1678C0.KERNEL32(00000000,00000000,00000001,00000000,004967F0,00000000,00495FCE,?,?,00000000,00499628), ref: 00495F8A
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: AttributesD1678D1682File
                                  • String ID: isRS-%.3u.tmp
                                  • API String ID: 3811636008-3657609586
                                  • Opcode ID: 4dda7df42beea12b38ebe66a3453a91feda8450add797991091dec449b692549
                                  • Instruction ID: 39fc4aa3b1325c5674b16a15386e220f06d470d82164ec59b5a324909a67f6b3
                                  • Opcode Fuzzy Hash: 4dda7df42beea12b38ebe66a3453a91feda8450add797991091dec449b692549
                                  • Instruction Fuzzy Hash: 4F216171E00609AFCF01EFA9C8819AFBBB8AB54324F60453BB814F72D5D6385E018B59
                                  APIs
                                  • ShellExecuteEx.SHELL32(0000003C), ref: 004543C8
                                  • GetLastError.KERNEL32(0000003C,00000000,00454411,?,?,?), ref: 004543D9
                                    • Part of subcall function 00454020: WaitForInputIdle.USER32(?,00000032), ref: 0045404C
                                    • Part of subcall function 00454020: MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0045406E
                                    • Part of subcall function 00454020: GetExitCodeProcess.KERNEL32(?,?), ref: 0045407D
                                    • Part of subcall function 00454020: CloseHandle.KERNEL32(?,004540AA,004540A3,?,?,?,00000000,?,?,0045427D,?,?,?,00000044,00000000,00000000), ref: 0045409D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Wait$CloseCodeErrorExecuteExitHandleIdleInputLastMultipleObjectsProcessShell
                                  • String ID: <$cmG
                                  • API String ID: 35504260-4292423251
                                  • Opcode ID: 55ee40c41e9ddff98899753e07bfda4df124d29e4a376b990b1a8eba7a94bb2b
                                  • Instruction ID: 6d00b500fe1a4f5c57a5d9171d2bf5619df6299d1693ef38611f843adfa964d5
                                  • Opcode Fuzzy Hash: 55ee40c41e9ddff98899753e07bfda4df124d29e4a376b990b1a8eba7a94bb2b
                                  • Instruction Fuzzy Hash: DB2186B0600219ABDB10DF65D88269E7BE8EF49349F50443AFC40EB391D7789D49CB98
                                  APIs
                                    • Part of subcall function 0042C6E0: GetFullPathNameA.KERNEL32(00000000,00001000,?), ref: 0042C704
                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • LoadTypeLib.OLEAUT32(00000000,00000000), ref: 0045571C
                                  • RegisterTypeLib.OLEAUT32(00000000,00000000,00000000), ref: 00455749
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Type$AllocByteCharFullLoadMultiNamePathRegisterStringWide
                                  • String ID: LoadTypeLib$RegisterTypeLib
                                  • API String ID: 1312246647-2435364021
                                  • Opcode ID: 5424298b63e03f5a7a6df135285e8d4bf37638db31f4934c177431c1aec250f2
                                  • Instruction ID: 9c5d3dee6c8685e3ca62ce7cd3bde038cf3e16764db62fae168a797d2c5b37cd
                                  • Opcode Fuzzy Hash: 5424298b63e03f5a7a6df135285e8d4bf37638db31f4934c177431c1aec250f2
                                  • Instruction Fuzzy Hash: 6E11B430A00A04EFDB10DFAADD61A5EBBBDDB4D701F104476BC04D3651DA389A04CA18
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,00000000,?,?,HmE,00000000,0mE,?,?,?,00000000,00451A4A,?,?,?,00000001), ref: 00451A24
                                  • GetLastError.KERNEL32(00000000,00000000,?,?,HmE,00000000,0mE,?,?,?,00000000,00451A4A,?,?,?,00000001), ref: 00451A2C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CreateErrorLastProcess
                                  • String ID: 0mE$HmE
                                  • API String ID: 2919029540-2521494901
                                  • Opcode ID: 619675bf623f8dbda08f347ef1ff45bf3db687bd4adbc65eff433dafc0cc1e86
                                  • Instruction ID: fba8dffb969e303b4de63fc0ba570861335efdf6f59496035e6af68b7fbb63d3
                                  • Opcode Fuzzy Hash: 619675bf623f8dbda08f347ef1ff45bf3db687bd4adbc65eff433dafc0cc1e86
                                  • Instruction Fuzzy Hash: 481139B2A04208AF8B41DEADDC41EEBB7ECEB4D321B114566FD08D3251D678ED14CBA4
                                  APIs
                                  • SendMessageA.USER32(00000000,00000B06,00000000,00000000), ref: 00455C3A
                                  • SendMessageA.USER32(00000000,00000B00,00000000,00000000), ref: 00455CD7
                                  Strings
                                  • Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x), xrefs: 00455C66
                                  • Failed to create DebugClientWnd, xrefs: 00455CA0
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID: Cannot debug. Debugger version ($%.8x) does not match Setup version ($%.8x)$Failed to create DebugClientWnd
                                  • API String ID: 3850602802-3720027226
                                  • Opcode ID: 0914801d72e3a8c31c53756c2e8b01d028722194d10330e31a4a693caee6127a
                                  • Instruction ID: 93f24d929eafa933d6a1dec800f788ec7668c19fe5f9afbdabdb8c6272a63917
                                  • Opcode Fuzzy Hash: 0914801d72e3a8c31c53756c2e8b01d028722194d10330e31a4a693caee6127a
                                  • Instruction Fuzzy Hash: 50119DB16043505EE301AB2C8891BABBA989B95309F15407AF985DB383D3798C08C7AA
                                  APIs
                                    • Part of subcall function 00424234: SetWindowTextA.USER32(?,00000000), ref: 0042424C
                                  • GetFocus.USER32 ref: 00476A0F
                                  • GetKeyState.USER32(0000007A), ref: 00476A21
                                  • WaitMessage.USER32(?,00000000,00476A48,?,00000000,00476A6F,?,?,00000001,00000000,?,?,?,?,0047E0FF,00000000), ref: 00476A2B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: FocusMessageStateTextWaitWindow
                                  • String ID: Wnd=$%x
                                  • API String ID: 1381870634-2927251529
                                  • Opcode ID: 2a2725b69fb386ccad8cf45c0e8c202c421051f06f46427955794b178fcc7fb4
                                  • Instruction ID: c47d8b81a3f89e4d9f305e8958344f99b85f65a22a562f943514e929f638a567
                                  • Opcode Fuzzy Hash: 2a2725b69fb386ccad8cf45c0e8c202c421051f06f46427955794b178fcc7fb4
                                  • Instruction Fuzzy Hash: 85117730604605AFC701FF69DC51ADE7BFAEB4A714B52C4BAF408E3641D7386D008A6D
                                  APIs
                                  • FileTimeToLocalFileTime.KERNEL32(?), ref: 0046CF98
                                  • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 0046CFA7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Time$File$LocalSystem
                                  • String ID: %.4u-%.2u-%.2u %.2u:%.2u:%.2u.%.3u$(invalid)
                                  • API String ID: 1748579591-1013271723
                                  • Opcode ID: 7c8e18e794b06d15e90a5dadea8765798a5493bfebc67ba29a9805845c59dadc
                                  • Instruction ID: f0a6dd1d8ce8d87e863054ef8fae022cb88d972da5a78582b75138adf414e1ed
                                  • Opcode Fuzzy Hash: 7c8e18e794b06d15e90a5dadea8765798a5493bfebc67ba29a9805845c59dadc
                                  • Instruction Fuzzy Hash: 21112EA090C3919ED340DF26C44032BBAE4AB89708F04492EF9C4C6381E379C849DB77
                                  APIs
                                  • 6D1682A0.KERNEL32(00000000,00000020), ref: 00453047
                                    • Part of subcall function 00406EB8: 6D167770.KERNEL32(00000000,00499628,004963B9,00000000,0049640E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                  • 6D167830.KERNEL32(00000000,00000000,00000000,00000020), ref: 0045306C
                                    • Part of subcall function 00452684: GetLastError.KERNEL32(00000000,004530F5,00000005,00000000,0045312A,?,?,00000000,00499628,00000004,00000000,00000000,00000000,?,0049606D,00000000), ref: 00452687
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167770D167830D1682ErrorLast
                                  • String ID: DeleteFile$MoveFile
                                  • API String ID: 12618126-139070271
                                  • Opcode ID: c39cb627dc2ac0eeb819a9784302370d9ddbd57153aecb2ad7e4817e6583de82
                                  • Instruction ID: aa365475a2a04e12f65dacb09188f13895f7dda552768fa7ebf74221350b1b82
                                  • Opcode Fuzzy Hash: c39cb627dc2ac0eeb819a9784302370d9ddbd57153aecb2ad7e4817e6583de82
                                  • Instruction Fuzzy Hash: 80F06D752042055BEB04FEB6D94266FA3ECEB4434BFA1403BB800B76C7DA3C8E094929
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(?,00454B17,?,00000001,00000000), ref: 00454B0A
                                  Strings
                                  • PendingFileRenameOperations2, xrefs: 00454AEB
                                  • SYSTEM\CurrentControlSet\Control\Session Manager, xrefs: 00454AB8
                                  • PendingFileRenameOperations, xrefs: 00454ADC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: PendingFileRenameOperations$PendingFileRenameOperations2$SYSTEM\CurrentControlSet\Control\Session Manager
                                  • API String ID: 557493163-2115312317
                                  • Opcode ID: e1ba571f496d43fd120299fc58e1da5f08dc4d1c6c4e27a2b7d368f985733f8d
                                  • Instruction ID: e818f9f29e18ec6221192f3c1b5ee660968d1a720cb36d9e55705c43ae0854d0
                                  • Opcode Fuzzy Hash: e1ba571f496d43fd120299fc58e1da5f08dc4d1c6c4e27a2b7d368f985733f8d
                                  • Instruction Fuzzy Hash: 50F09071704204AFE704D6A6EC13F5BB3ACD7C4759FA0446BF8009B682EA79FD54962C
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(00000000,00000000,00000001,00000000,?,00000000,?,00000002,004584BA,00000000,00458607,?,00000000,00000000,00000000), ref: 004583D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: .NET Framework not found$InstallRoot$SOFTWARE\Microsoft\.NETFramework
                                  • API String ID: 557493163-2631785700
                                  • Opcode ID: 8fd23e478814a874b9220d2ded310c003ac97ba78d12d4552293bb4c637d5cbf
                                  • Instruction ID: ea3a45bed5edc2ba876fa1f084c84d8c5f80d8fbd4465fa42c84833bd08a17ce
                                  • Opcode Fuzzy Hash: 8fd23e478814a874b9220d2ded310c003ac97ba78d12d4552293bb4c637d5cbf
                                  • Instruction Fuzzy Hash: 83F0A4323041115BC710DB5A9845B4E6689DB91356F54503FFD80E7257DE79CC09C619
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • RegQueryValueExA.ADVAPI32(?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 0048152D
                                  • 6D167B60.ADVAPI32(?,?,CSDVersion,00000000,?,?,?,?,00000001,00000000), ref: 00481550
                                  Strings
                                  • System\CurrentControlSet\Control\Windows, xrefs: 004814FA
                                  • CSDVersion, xrefs: 00481524
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167$QueryValue
                                  • String ID: CSDVersion$System\CurrentControlSet\Control\Windows
                                  • API String ID: 1765961986-1910633163
                                  • Opcode ID: 190be3375aeb142d0155381d0867c6ef1911cb9197c08fb1e2fab0832a9d60d6
                                  • Instruction ID: e24f9e339270721fa73cfd358d02fba8345311e4b2ef2f3849d45b3fd657234f
                                  • Opcode Fuzzy Hash: 190be3375aeb142d0155381d0867c6ef1911cb9197c08fb1e2fab0832a9d60d6
                                  • Instruction Fuzzy Hash: B5F044B9E40208BADF10EAD58C45BDF73BCAB44704F104967E916E7290E778DA05CB5D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(kernel32.dll,GetSystemWow64DirectoryA,?,00452D42,00000000,00452DE5,?,?,00000000,00000000,00000000,00000000,00000000,?,004530B1,00000000), ref: 0042D7E6
                                  • 6D166DE0.KERNEL32(00000000,kernel32.dll,GetSystemWow64DirectoryA,?,00452D42,00000000,00452DE5,?,?,00000000,00000000,00000000,00000000,00000000,?,004530B1), ref: 0042D7EC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: GetSystemWow64DirectoryA$kernel32.dll
                                  • API String ID: 439651959-4063490227
                                  • Opcode ID: 62870b4d965a73d26b664e348fa178bf2b253222eec6b6ddec63d9f2b08f2550
                                  • Instruction ID: 4db8f333c9a0d948aa4d288d669557f69a64c6eaa67e0ad6c3f7b03414b73d9c
                                  • Opcode Fuzzy Hash: 62870b4d965a73d26b664e348fa178bf2b253222eec6b6ddec63d9f2b08f2550
                                  • Instruction Fuzzy Hash: 23E04F61B44B1112D7107ABA9C83A5B10898B88724FA0843B79A5E72C7EDBCD94A1A7D
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042E83C), ref: 0042E8CE
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,ShutdownBlockReasonDestroy,?,00000000,0042E83C), ref: 0042E8D4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: ShutdownBlockReasonDestroy$user32.dll
                                  • API String ID: 439651959-260599015
                                  • Opcode ID: 2abcef729450efc82d79671326ca9d62cff0d5dd7e0677da4eb6e6ce1e2a4421
                                  • Instruction ID: 7c69bd6c2ee87db4326f6693fa526596aa450ba62902fbcca0c83f78b45ae659
                                  • Opcode Fuzzy Hash: 2abcef729450efc82d79671326ca9d62cff0d5dd7e0677da4eb6e6ce1e2a4421
                                  • Instruction Fuzzy Hash: 61D0C9A2752B32AA6A2075FB3CD1AEB02CC8D106B93980477F540F7242EA9DCC4565AC
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,NotifyWinEvent,0049686D), ref: 0044EC3F
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,NotifyWinEvent,0049686D), ref: 0044EC45
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: NotifyWinEvent$user32.dll
                                  • API String ID: 439651959-597752486
                                  • Opcode ID: 971d7d52e343c129525c0f9a23f8a1ecd53e328ddf718e9c00615770f922066f
                                  • Instruction ID: 1d6847f5b71cfb889fb72cb275d2bd98f16d086b2cf5a985e24d695b54fb2eec
                                  • Opcode Fuzzy Hash: 971d7d52e343c129525c0f9a23f8a1ecd53e328ddf718e9c00615770f922066f
                                  • Instruction Fuzzy Hash: E0E0ECF0E51740D9FB10BBBB6986B0D2AA4F728319F04547FB111A6292CB7C58008F1E
                                  APIs
                                  • GetModuleHandleA.KERNEL32(user32.dll,DisableProcessWindowsGhosting,004968BE,00000001,00000000,004968E2), ref: 0049663A
                                  • 6D166DE0.KERNEL32(00000000,user32.dll,DisableProcessWindowsGhosting,004968BE,00000001,00000000,004968E2), ref: 00496640
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166HandleModule
                                  • String ID: DisableProcessWindowsGhosting$user32.dll
                                  • API String ID: 439651959-834958232
                                  • Opcode ID: 69e20e3a751bef653dfab8a6a11158a94526fab5adfb5b133f0b84dae802b24a
                                  • Instruction ID: 1d36f3c6e50f4853aec038a6431439aa93ab912a32aac72bd1e084e061b821e8
                                  • Opcode Fuzzy Hash: 69e20e3a751bef653dfab8a6a11158a94526fab5adfb5b133f0b84dae802b24a
                                  • Instruction Fuzzy Hash: F3B002D1641B41549D1032F25D47E1B0C58488076575604777814B51C7DD6E9D045C6D
                                  APIs
                                    • Part of subcall function 0044AB18: LoadLibraryA.KERNEL32(uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB3F
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB57
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB69
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB7B
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB8D
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044AB9F
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll,?,0044EC35,0049686D), ref: 0044ABB1
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData,uxtheme.dll), ref: 0044ABC3
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData,00000000,OpenThemeData), ref: 0044ABD5
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground,00000000,CloseThemeData), ref: 0044ABE7
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText,00000000,DrawThemeBackground), ref: 0044ABF9
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect,00000000,DrawThemeText), ref: 0044AC0B
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect,00000000,GetThemeBackgroundContentRect), ref: 0044AC1D
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize,00000000,GetThemeBackgroundContentRect), ref: 0044AC2F
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent,00000000,GetThemePartSize), ref: 0044AC41
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics,00000000,GetThemeTextExtent), ref: 0044AC53
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion,00000000,GetThemeTextMetrics), ref: 0044AC65
                                    • Part of subcall function 0044AB18: 6D166DE0.KERNEL32(00000000,GetThemeMetric,00000000,GetThemeColor,00000000,IsThemeBackgroundPartiallyTransparent,00000000,IsThemePartDefined,00000000,DrawThemeIcon,00000000,DrawThemeEdge,00000000,HitTestThemeBackground,00000000,GetThemeBackgroundRegion), ref: 0044AC77
                                  • LoadLibraryA.KERNEL32(shell32.dll,SHPathPrepareForWriteA,00496890), ref: 0046355B
                                  • 6D166DE0.KERNEL32(00000000,shell32.dll,SHPathPrepareForWriteA,00496890), ref: 00463561
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D166$LibraryLoad
                                  • String ID: SHPathPrepareForWriteA$shell32.dll
                                  • API String ID: 3670945825-2683653824
                                  • Opcode ID: b7dcb10c1046edb4d4e126dba9a904e55d042e599e7a4bdfc6bc511a5488d8ae
                                  • Instruction ID: c0fcb66c02a8dab539d9d5e808ad8ee58df08d6502fb75decf3995d68355cc99
                                  • Opcode Fuzzy Hash: b7dcb10c1046edb4d4e126dba9a904e55d042e599e7a4bdfc6bc511a5488d8ae
                                  • Instruction Fuzzy Hash: A3B092E0B80780B48E00BFF6188790A54189550B9B720047F3046BA097EE7C42188DAF
                                  APIs
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00470D89,?,00000000,?,00000001,00000000,00470F57,?,00000000,?,00000000,?,00471112), ref: 00470D65
                                  • FindClose.KERNEL32(000000FF,00470D90,00470D89,?,00000000,?,00000001,00000000,00470F57,?,00000000,?,00000000,?,00471112,?), ref: 00470D83
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,00470EAB,?,00000000,?,00000001,00000000,00470F57,?,00000000,?,00000000,?,00471112), ref: 00470E87
                                  • FindClose.KERNEL32(000000FF,00470EB2,00470EAB,?,00000000,?,00000001,00000000,00470F57,?,00000000,?,00000000,?,00471112,?), ref: 00470EA5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileNext
                                  • String ID:
                                  • API String ID: 2066263336-0
                                  • Opcode ID: fabff4c738ed4808cfb25c096fc04527225f06d2f7b39a7e350cec414d0a5612
                                  • Instruction ID: 8155a0475b96a0e8b3dfb93bc231237a894523f3b66553093324e5ed05be0f29
                                  • Opcode Fuzzy Hash: fabff4c738ed4808cfb25c096fc04527225f06d2f7b39a7e350cec414d0a5612
                                  • Instruction Fuzzy Hash: A0B12B3490425DDFCF11DFA5C881ADEBBB9FF48304F5085AAE808A3251D739AA46CF58
                                  APIs
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0047BA44,?,?,?,?,00000000,0047BB99,?,00000000,?,00000000,?,0047BCED), ref: 0047BA20
                                  • FindClose.KERNEL32(000000FF,0047BA4B,0047BA44,?,?,?,?,00000000,0047BB99,?,00000000,?,00000000,?,0047BCED,00000000), ref: 0047BA3E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileNext
                                  • String ID:
                                  • API String ID: 2066263336-0
                                  • Opcode ID: 688660f1e4094ed34319b7c64fac86a671ffd6bff7fcc50adfd23abf8383e2d8
                                  • Instruction ID: 90f54a55b09df938123969646071422b0b6b51c39b9d231898d1c05be4ec9d6e
                                  • Opcode Fuzzy Hash: 688660f1e4094ed34319b7c64fac86a671ffd6bff7fcc50adfd23abf8383e2d8
                                  • Instruction Fuzzy Hash: 59813F7090424D9FCF11EF95CC41BDFBBB8EB49304F5080AAE918A7691D7399A46CF98
                                  APIs
                                  • FindNextFileA.KERNEL32(000000FF,?,?,?,?,00000000,0047DC65,?,00000000,00000000,?,?,0047EDF8,?,?,00000000), ref: 0047DB12
                                  • FindClose.KERNEL32(000000FF,000000FF,?,?,?,?,00000000,0047DC65,?,00000000,00000000,?,?,0047EDF8,?,?), ref: 0047DB1F
                                  • FindNextFileA.KERNEL32(000000FF,?,00000000,0047DC38,?,?,?,?,00000000,0047DC65,?,00000000,00000000,?,?,0047EDF8), ref: 0047DC14
                                  • FindClose.KERNEL32(000000FF,0047DC3F,0047DC38,?,?,?,?,00000000,0047DC65,?,00000000,00000000,?,?,0047EDF8,?), ref: 0047DC32
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileNext
                                  • String ID:
                                  • API String ID: 2066263336-0
                                  • Opcode ID: fc2bcd60a884b3481da35a047366ea4f80f60d3d463ebca9738422de1f83445a
                                  • Instruction ID: 535fa8ff41714791b16e1cb9ca038bd6a4321c611076a7b16b6e80abc644c091
                                  • Opcode Fuzzy Hash: fc2bcd60a884b3481da35a047366ea4f80f60d3d463ebca9738422de1f83445a
                                  • Instruction Fuzzy Hash: F8514D71E006489FCB21EFA5CC45ADEB7B8EF88315F5084AAA408E7351D6789F85CF54
                                  APIs
                                  • GetMenu.USER32(00000000), ref: 004212D1
                                  • SetMenu.USER32(00000000,00000000), ref: 004212EE
                                  • SetMenu.USER32(00000000,00000000), ref: 00421323
                                  • SetMenu.USER32(00000000,00000000), ref: 0042133F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Menu
                                  • String ID:
                                  • API String ID: 3711407533-0
                                  • Opcode ID: 56c2488dfc212d101127e5c7c13890798fb7bc3de671997bf903a0a3b8ff45b6
                                  • Instruction ID: 9167a1b96ed3692bf6fa46568bd71e8e44bf9b724138963d14a6a49c295ca86a
                                  • Opcode Fuzzy Hash: 56c2488dfc212d101127e5c7c13890798fb7bc3de671997bf903a0a3b8ff45b6
                                  • Instruction Fuzzy Hash: 7E41BE307002645BEB20AA7AA88579B37914F65308F4845BFFC44EF3A7CA7DCC4582AD
                                  APIs
                                  • GetDesktopWindow.USER32 ref: 00413CB6
                                  • GetDesktopWindow.USER32 ref: 00413D6E
                                    • Part of subcall function 00418E30: 6FAEC6F0.COMCTL32(?,00000000,00413F33,00000000,00414043,?,?,00499628), ref: 00418E4C
                                    • Part of subcall function 00418E30: ShowCursor.USER32(00000001,?,00000000,00413F33,00000000,00414043,?,?,00499628), ref: 00418E69
                                  • SetCursor.USER32(00000000,?,?,?,?,00413A63,00000000,00413A76), ref: 00413DAC
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CursorDesktopWindow$Show
                                  • String ID:
                                  • API String ID: 2074268717-0
                                  • Opcode ID: f93635452a3540b18525377051338fa553d5bfeb17669cb5afee2586f1b9e959
                                  • Instruction ID: 9041e376e68cac3d3f12fafa287a9a1d672feaf4b908caafcd791b624cb6b8f2
                                  • Opcode Fuzzy Hash: f93635452a3540b18525377051338fa553d5bfeb17669cb5afee2586f1b9e959
                                  • Instruction Fuzzy Hash: 97415876600151AFCB01EF2DE9C8B8777E0AB65325B1A847FE004DB365DA39AC81CF58
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00400000,?,00000100), ref: 004089DD
                                  • LoadStringA.USER32(00400000,0000FF9E,?,00000040), ref: 00408A4C
                                  • LoadStringA.USER32(00400000,0000FF9F,?,00000040), ref: 00408AE7
                                  • MessageBoxA.USER32(00000000,?,?,00002010), ref: 00408B26
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: LoadString$FileMessageModuleName
                                  • String ID:
                                  • API String ID: 704749118-0
                                  • Opcode ID: 7d5ee083bef0366bcb4814e6dcf43939bfc2141079d81ee54d2647310300da8e
                                  • Instruction ID: 1d628db87d3f10c37e3f79da841816f31d20c8eb4fd8ddf490f23963b5bf11f3
                                  • Opcode Fuzzy Hash: 7d5ee083bef0366bcb4814e6dcf43939bfc2141079d81ee54d2647310300da8e
                                  • Instruction Fuzzy Hash: 663132706083809BD330EA698945B9B77E89B8A304F40483FB6C8E72D1DB7999058767
                                  APIs
                                  • SendMessageA.USER32(00000000,000001A1,?,00000000), ref: 0044DDCD
                                    • Part of subcall function 0044C410: SendMessageA.USER32(00000000,000001A0,?,00000000), ref: 0044C442
                                  • InvalidateRect.USER32(00000000,00000000,00000001,00000000,000001A1,?,00000000), ref: 0044DE51
                                    • Part of subcall function 0042BB24: SendMessageA.USER32(00000000,0000018E,00000000,00000000), ref: 0042BB38
                                  • IsRectEmpty.USER32(?), ref: 0044DE13
                                  • ScrollWindowEx.USER32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000006), ref: 0044DE36
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: MessageSend$Rect$EmptyInvalidateScrollWindow
                                  • String ID:
                                  • API String ID: 855768636-0
                                  • Opcode ID: 507253a555fab8430786164ed62efea146418745806fc46137cfa61568251170
                                  • Instruction ID: 337b33acb9e7367f704548962b9ee544586480788f75c241c542739c8af6450f
                                  • Opcode Fuzzy Hash: 507253a555fab8430786164ed62efea146418745806fc46137cfa61568251170
                                  • Instruction Fuzzy Hash: 61114A71B0031027E210BA7E8C86B5B66899B89748F14083FB646EB382DE79EC194299
                                  APIs
                                  • OffsetRect.USER32(?,?,00000000), ref: 004935EC
                                  • OffsetRect.USER32(?,00000000,?), ref: 00493607
                                  • OffsetRect.USER32(?,?,00000000), ref: 00493621
                                  • OffsetRect.USER32(?,00000000,?), ref: 0049363C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: OffsetRect
                                  • String ID:
                                  • API String ID: 177026234-0
                                  • Opcode ID: c34a829c107c6ae086cdf1cafd4eb7a7dca89cb743bed0ec5f0ea2ad2411eb09
                                  • Instruction ID: 15cef71e731e3fee1735122eb73e290e76ed006c2447abbb7b90f461cffe9875
                                  • Opcode Fuzzy Hash: c34a829c107c6ae086cdf1cafd4eb7a7dca89cb743bed0ec5f0ea2ad2411eb09
                                  • Instruction Fuzzy Hash: 39217CB6704201ABD700DE69CC85E6BBBEEEBC8314F15CA2AF554C7349D634EE048796
                                  APIs
                                  • GetCursorPos.USER32 ref: 004171D0
                                  • SetCursor.USER32(00000000), ref: 00417213
                                  • GetLastActivePopup.USER32(?), ref: 0041723D
                                  • GetForegroundWindow.USER32(?), ref: 00417244
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Cursor$ActiveForegroundLastPopupWindow
                                  • String ID:
                                  • API String ID: 1959210111-0
                                  • Opcode ID: 70457936ae722886cc68ab85c7e1e9677c9b745f3ec84423ac9ddd6608127d37
                                  • Instruction ID: de9644f57ac26c8b09368bc5631ddcdfe556ff5052eaa30755f4c332c8ab0a02
                                  • Opcode Fuzzy Hash: 70457936ae722886cc68ab85c7e1e9677c9b745f3ec84423ac9ddd6608127d37
                                  • Instruction Fuzzy Hash: 7C2183313086018ADB20AB69D889ADB33F1AF45714F0545AFF8589B392D73DDC82CB59
                                  APIs
                                  • SendMessageA.USER32(?,?,?,?), ref: 00416AF4
                                  • SetTextColor.GDI32(?,00000000), ref: 00416B0E
                                  • SetBkColor.GDI32(?,00000000), ref: 00416B28
                                  • CallWindowProcA.USER32(?,?,?,?,?), ref: 00416B50
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Color$CallMessageProcSendTextWindow
                                  • String ID:
                                  • API String ID: 601730667-0
                                  • Opcode ID: 067d3ba40eb3a1cc822801215cfcbdeff8a461c2d0af939e65cc5a52f50c3ab8
                                  • Instruction ID: c000e8b01db0500dd6874d208778bcf8efa3d9016d5589f965051e8255cd057a
                                  • Opcode Fuzzy Hash: 067d3ba40eb3a1cc822801215cfcbdeff8a461c2d0af939e65cc5a52f50c3ab8
                                  • Instruction Fuzzy Hash: 74115EB2604604AFC710EE6ECC84E8777ECEF49710B15886BB55ADB652C638FC418B79
                                  APIs
                                  • MulDiv.KERNEL32(?,00000008,?), ref: 00493255
                                  • MulDiv.KERNEL32(?,00000008,?), ref: 00493269
                                  • MulDiv.KERNEL32(?,00000008,?), ref: 0049327D
                                  • MulDiv.KERNEL32(?,00000008,?), ref: 0049329B
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                  • Instruction ID: e512a9e758a0ad12aeaf5b5a151844cfaa890fd3a601ce0f6a8c9cc519870162
                                  • Opcode Fuzzy Hash: 6335ae3c13ddf35d91c6dca3ece5bfa36ba83b479f3d3f49975b0228b2d303f4
                                  • Instruction Fuzzy Hash: C0112E72604204ABCF40DFA9D8C4D9B7BECEF4D364B1441AAF918DB246D634ED408BA8
                                  APIs
                                  • GetClassInfoA.USER32(00400000,0041F3E0,?), ref: 0041F411
                                  • UnregisterClassA.USER32(0041F3E0,00400000), ref: 0041F43A
                                  • RegisterClassA.USER32(00497598), ref: 0041F444
                                  • SetWindowLongA.USER32(00000000,000000FC,00000000), ref: 0041F47F
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Class$InfoLongRegisterUnregisterWindow
                                  • String ID:
                                  • API String ID: 4025006896-0
                                  • Opcode ID: ead5ffb11019ba6777c9dbb947f435eb0b6670811c7fa7acfad3f7d865a438b4
                                  • Instruction ID: e46a42e6552743bf644647bcc5b156b551fdc520883961385e1d4b912d915443
                                  • Opcode Fuzzy Hash: ead5ffb11019ba6777c9dbb947f435eb0b6670811c7fa7acfad3f7d865a438b4
                                  • Instruction Fuzzy Hash: 3D0192712141047BCB60EB6CEC81EAB339CA72D314B10413BBA15E76E1C6359C154BAC
                                  APIs
                                  • WaitForInputIdle.USER32(?,00000032), ref: 0045404C
                                  • MsgWaitForMultipleObjects.USER32(00000001,?,00000000,000000FF,000000FF), ref: 0045406E
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 0045407D
                                  • CloseHandle.KERNEL32(?,004540AA,004540A3,?,?,?,00000000,?,?,0045427D,?,?,?,00000044,00000000,00000000), ref: 0045409D
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Wait$CloseCodeExitHandleIdleInputMultipleObjectsProcess
                                  • String ID:
                                  • API String ID: 4071923889-0
                                  • Opcode ID: a54fefd10c2e0f687b4aa2e3a33a8cd1bb9efb467a2b3b7473968d6a7ccf8035
                                  • Instruction ID: d785216c1c548539e19217780dfe4ba2d40096d11eba98a688fe1d4667f4d093
                                  • Opcode Fuzzy Hash: a54fefd10c2e0f687b4aa2e3a33a8cd1bb9efb467a2b3b7473968d6a7ccf8035
                                  • Instruction Fuzzy Hash: F401F970640208BEEB20979A8C06F6B7AACDF85B74F710167BA04DB2C2C5785D449668
                                  APIs
                                  • FindResourceA.KERNEL32(00400000,?,00000000), ref: 0040D187
                                  • LoadResource.KERNEL32(00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,0047ABD4,0000000A,REGDLL_EXE), ref: 0040D1A1
                                  • SizeofResource.KERNEL32(00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?,?,0047ABD4), ref: 0040D1BB
                                  • LockResource.KERNEL32(74536563,00000000,00400000,72756F73,00400000,72756F73,0040A928,00400000,00000001,00000000,?,0040D0E4,00000000,?,00000000,?), ref: 0040D1C5
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Resource$FindLoadLockSizeof
                                  • String ID:
                                  • API String ID: 3473537107-0
                                  • Opcode ID: 1fe06807482f72613b6667064fe88f51cf947b58ca2a32820fbe45912fd18073
                                  • Instruction ID: a2e4909c1946fcd89949086e6ecb513f2c22862e5b7fa6f76d970aa484769738
                                  • Opcode Fuzzy Hash: 1fe06807482f72613b6667064fe88f51cf947b58ca2a32820fbe45912fd18073
                                  • Instruction Fuzzy Hash: BEF0FF726056046F9754EE9DA881D5B76ECDE48264320416AF908EB246DE38DD118B78
                                  APIs
                                  • RtlInitializeCriticalSection.KERNEL32(00499420,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                  • RtlEnterCriticalSection.KERNEL32(00499420,00499420,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                  • LocalAlloc.KERNEL32(00000000,00000FF8,00499420,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                  • RtlLeaveCriticalSection.KERNEL32(00499420,00401A89,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CriticalSection$AllocEnterInitializeLeaveLocal
                                  • String ID:
                                  • API String ID: 730355536-0
                                  • Opcode ID: f4fe37a3204f9cf8c06f5fa04845c9c999d181734b3cfdf376519ce1c3326a47
                                  • Instruction ID: 1b289a0fd0139ecfea4ba23488efb997744b2f3c2cdf6dce9f943993a5499d4d
                                  • Opcode Fuzzy Hash: f4fe37a3204f9cf8c06f5fa04845c9c999d181734b3cfdf376519ce1c3326a47
                                  • Instruction Fuzzy Hash: 5A018B7064C2405EFB1AAB6E98027293FD4E795748F11803FF445A6AF1C67C4C42CA2E
                                  APIs
                                  • GetLastError.KERNEL32(00000000,00000000), ref: 0046E781
                                  Strings
                                  • Failed to set NTFS compression state (%d)., xrefs: 0046E792
                                  • Setting NTFS compression on directory: %s, xrefs: 0046E74F
                                  • Unsetting NTFS compression on directory: %s, xrefs: 0046E767
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on directory: %s$Unsetting NTFS compression on directory: %s
                                  • API String ID: 1452528299-1392080489
                                  • Opcode ID: 11ae83ec9d9c617c1427c98b83e746d0ffa9825848c7ae3d1a3c62776c62defd
                                  • Instruction ID: 1ad9d76730abffe208a4c5c4264c48cdeee6a445b50b34408956a707461cb1f1
                                  • Opcode Fuzzy Hash: 11ae83ec9d9c617c1427c98b83e746d0ffa9825848c7ae3d1a3c62776c62defd
                                  • Instruction Fuzzy Hash: 77018B34D0424896CF04D7AE50412DEFBE89F0D315F54C1EFA465DB382EB794909879B
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167ED0.ADVAPI32(?,00000000,00000082,00000002,00000000,?,?,00000000,0045A71A,?,?,?,?,?,00000000,0045A741), ref: 00454E74
                                  • 6D167B60.ADVAPI32(00000000,?,00000000,00000082,00000002,00000000,?,?,00000000,0045A71A,?,?,?,?,?,00000000), ref: 00454E7D
                                  • RemoveFontResourceA.GDI32(00000000), ref: 00454E8A
                                  • SendNotifyMessageA.USER32(0000FFFF,0000001D,00000000,00000000), ref: 00454E9E
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167$FontMessageNotifyRemoveResourceSend
                                  • String ID:
                                  • API String ID: 3193810409-0
                                  • Opcode ID: 242de68abadbe4cf4150fdd48716a18268a80d8283c8eef6f2b31c8c9acbf7a4
                                  • Instruction ID: 4e4cb5fa7b3d268b0fe4689e36407a1938bb3ff91da4f7d52b0471ff91aa649d
                                  • Opcode Fuzzy Hash: 242de68abadbe4cf4150fdd48716a18268a80d8283c8eef6f2b31c8c9acbf7a4
                                  • Instruction Fuzzy Hash: 53F05EB575530036EA10B6B69C8BF1B228C9F94759F10483BBA00EF2C3D97CDD04966D
                                  APIs
                                  • GetLastError.KERNEL32(?,00000000), ref: 0046F071
                                  Strings
                                  • Setting NTFS compression on file: %s, xrefs: 0046F03F
                                  • Failed to set NTFS compression state (%d)., xrefs: 0046F082
                                  • Unsetting NTFS compression on file: %s, xrefs: 0046F057
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID: Failed to set NTFS compression state (%d).$Setting NTFS compression on file: %s$Unsetting NTFS compression on file: %s
                                  • API String ID: 1452528299-3038984924
                                  • Opcode ID: 47588f84d4241e5ef74cc6b07774c25b7c2e1c7e9913edef3eb6cca03a74b933
                                  • Instruction ID: 3bcfe379fe8649a68af53553754e9ba1347c0f07075e283614f92db878f91d71
                                  • Opcode Fuzzy Hash: 47588f84d4241e5ef74cc6b07774c25b7c2e1c7e9913edef3eb6cca03a74b933
                                  • Instruction Fuzzy Hash: 08011C70D0424496CF04D7AD64412DEB7E49F0D314F54C1BFA495D7283E679490D879B
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000008,?,0047E6B1,?,?,00000001,00000000,00000002,00000000,0047EF71,?,?,?,?,?,00496961), ref: 0047659D
                                  • OpenProcessToken.ADVAPI32(00000000,00000008,?,0047E6B1,?,?,00000001,00000000,00000002,00000000,0047EF71), ref: 004765A3
                                  • GetTokenInformation.ADVAPI32(00000008,00000012(TokenIntegrityLevel),00000000,00000004,00000008,00000000,00000008,?,0047E6B1,?,?,00000001,00000000,00000002,00000000,0047EF71), ref: 004765C5
                                  • CloseHandle.KERNEL32(00000000,00000008,TokenIntegrityLevel,00000000,00000004,00000008,00000000,00000008,?,0047E6B1,?,?,00000001,00000000,00000002,00000000), ref: 004765D6
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                  • String ID:
                                  • API String ID: 215268677-0
                                  • Opcode ID: 523267de2bed6c45bf373fcc6eef02a457dcad744cb55a4ee6033627b6947a5c
                                  • Instruction ID: 4707548daa461976a567d9c5ed96e780b6f068cb4c493cd3f6b693a0b69ea1e9
                                  • Opcode Fuzzy Hash: 523267de2bed6c45bf373fcc6eef02a457dcad744cb55a4ee6033627b6947a5c
                                  • Instruction Fuzzy Hash: D5F030A16447017BD600EAB5CC82EAB77DCEB44354F04893A7E98C72C1DA78DC18AB26
                                  APIs
                                  • GetLastActivePopup.USER32(?), ref: 004241BC
                                  • IsWindowVisible.USER32(?), ref: 004241CD
                                  • IsWindowEnabled.USER32(?), ref: 004241D7
                                  • SetForegroundWindow.USER32(?), ref: 004241E1
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window$ActiveEnabledForegroundLastPopupVisible
                                  • String ID:
                                  • API String ID: 2280970139-0
                                  • Opcode ID: 9b2c73b2f118cbfdb3fd477b95624e7834d98b8dfb73253704230ee2573409e1
                                  • Instruction ID: 7a261241521d5f36110480f60a41559dbc21bd8b6604a945fb8666e4bf107b55
                                  • Opcode Fuzzy Hash: 9b2c73b2f118cbfdb3fd477b95624e7834d98b8dfb73253704230ee2573409e1
                                  • Instruction Fuzzy Hash: 0DE08699B06531139E31FA251885ABB25ACCD54B883C60127BC04F7243DF1CCFA0C1AC
                                  APIs
                                  • GlobalHandle.KERNEL32 ref: 00406287
                                  • GlobalUnlock.KERNEL32(00000000), ref: 0040628E
                                  • GlobalReAlloc.KERNEL32(00000000,00000000), ref: 00406293
                                  • GlobalLock.KERNEL32(00000000), ref: 00406299
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Global$AllocHandleLockUnlock
                                  • String ID:
                                  • API String ID: 2167344118-0
                                  • Opcode ID: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                  • Instruction ID: ad050c8fb554795a0ca7e59246f03ac17dd57b6c6051e6027a9978793207e39e
                                  • Opcode Fuzzy Hash: ccca6f24380267978f803e90f3f817f3fcf2956047d1379c6398f3f6a54b6072
                                  • Instruction Fuzzy Hash: A0B009C5814A05B9EC0833B24C0BD3F141CD88072C3808A6FB458BA1839C7C9C402A3D
                                  APIs
                                  • GetSystemMenu.USER32(00000000,00000000,0000F060,00000001), ref: 00469A03
                                  • EnableMenuItem.USER32(00000000,00000000,00000000), ref: 00469A09
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Menu$EnableItemSystem
                                  • String ID: CurPageChanged
                                  • API String ID: 3692539535-2490978513
                                  • Opcode ID: 19836a5f4fde9c47581cbd8901a54eb9bf3c7de6f89836ce848586466e8af689
                                  • Instruction ID: e26546ca6fb89f82da4547dc60bb11ab24f56930d245b11690f8a3cef2263ad0
                                  • Opcode Fuzzy Hash: 19836a5f4fde9c47581cbd8901a54eb9bf3c7de6f89836ce848586466e8af689
                                  • Instruction Fuzzy Hash: D1B14974604104DFCB11DB69D985EAA73F9FF49304F2540FAE8049B322EB78AE45DB4A
                                  APIs
                                  • 6D167B60.ADVAPI32(?,?,?,?,00000001,00000000,00000000,00479E1D,?,00000000,00000000,00000001,00000000,004788C1,?,00000000), ref: 00478885
                                  Strings
                                  • Failed to parse "reg" constant, xrefs: 0047888C
                                  • Cannot access a 64-bit key in a "reg" constant on this version of Windows, xrefs: 004786F9
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: Cannot access a 64-bit key in a "reg" constant on this version of Windows$Failed to parse "reg" constant
                                  • API String ID: 557493163-1938159461
                                  • Opcode ID: 7e30cd5ee2c5b36123dad34a1db95c680faf5a75f97db96401e384924d5dbd70
                                  • Instruction ID: 0a8968fb34543a57d7f88d193baa73527c032baa78e0536dbdff1824591fc682
                                  • Opcode Fuzzy Hash: 7e30cd5ee2c5b36123dad34a1db95c680faf5a75f97db96401e384924d5dbd70
                                  • Instruction Fuzzy Hash: 75815274E00108AFCB10EFA5D885ADEBBF9AF48354F50816AE414B7395DB389E05CB99
                                  APIs
                                    • Part of subcall function 0044FB14: SetEndOfFile.KERNEL32(?,?,0045B2AE,00000000,0045B439,?,00000000,00000002,00000002), ref: 0044FB1B
                                  • FlushFileBuffers.KERNEL32(?), ref: 0045B405
                                  Strings
                                  • EndOffset range exceeded, xrefs: 0045B339
                                  • NumRecs range exceeded, xrefs: 0045B302
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: File$BuffersFlush
                                  • String ID: EndOffset range exceeded$NumRecs range exceeded
                                  • API String ID: 3593489403-659731555
                                  • Opcode ID: a301c6dabb9704468c1e24fbdb81701ef7f79906638069347b556430a8d3a1f9
                                  • Instruction ID: a903170d8bc781d07a600957566dfe45593df76c4c3c994ec0904f2b6ceaf1c8
                                  • Opcode Fuzzy Hash: a301c6dabb9704468c1e24fbdb81701ef7f79906638069347b556430a8d3a1f9
                                  • Instruction Fuzzy Hash: 1A615434A002588BDB25DF25C891BDAB7B5EF49305F0084EAED889B352D7B49EC98F54
                                  APIs
                                  • GetCursorPos.USER32(?), ref: 004248D5
                                  • WaitMessage.USER32(00000000,004249C9,?,?,?,?), ref: 004249A9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CursorMessageWait
                                  • String ID: hI
                                  • API String ID: 4021538199-1175817223
                                  • Opcode ID: 3187036f9c3f7976241ac30da1ed3e361baa2a7407fb3d64dbd480958c6647a7
                                  • Instruction ID: a4eeb57de98a079bb1a60e4e34ee33fef4df48c0e9511a927bf7c7f4a07835e5
                                  • Opcode Fuzzy Hash: 3187036f9c3f7976241ac30da1ed3e361baa2a7407fb3d64dbd480958c6647a7
                                  • Instruction Fuzzy Hash: 0831D4B07002249BDB21EF39D48179FB7B5EFC8304F95456AEC049B385DB789D80CA99
                                  APIs
                                    • Part of subcall function 0042DC54: 6D167FA0.ADVAPI32(80000002,System\CurrentControlSet\Control\Windows,0048150B,?,00000001,?,?,0048150B,?,00000001,00000000), ref: 0042DC70
                                  • 6D167B60.ADVAPI32(?,00477236,?,?,00000001,00000000,00000000,00477251), ref: 0047721F
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion\Uninstall, xrefs: 004771AA
                                  • %s\%s_is1, xrefs: 004771C8
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167
                                  • String ID: %s\%s_is1$Software\Microsoft\Windows\CurrentVersion\Uninstall
                                  • API String ID: 557493163-1598650737
                                  • Opcode ID: b82d9d429039fa0faf41379b8944ed99386d3b6b62f75bc5821b5694637a4715
                                  • Instruction ID: 119bab7e7863558edf985db16656470cca75908ce9bc52ac2ae4daa2b26c39e4
                                  • Opcode Fuzzy Hash: b82d9d429039fa0faf41379b8944ed99386d3b6b62f75bc5821b5694637a4715
                                  • Instruction Fuzzy Hash: B8218470B082445FDB11DBAACC51A9EBBE8EB48304F9184BAF514E7382D67899018B58
                                  Strings
                                  • Failed to proceed to next wizard page; showing wizard., xrefs: 0046B577
                                  • Failed to proceed to next wizard page; aborting., xrefs: 0046B563
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Failed to proceed to next wizard page; aborting.$Failed to proceed to next wizard page; showing wizard.
                                  • API String ID: 0-1974262853
                                  • Opcode ID: ca23865455054479bece7d23809b66e5d7218befa909e75e0beb64e52a8de696
                                  • Instruction ID: 9b1edd805dbe5cd36533ceb33ecd33e3a7f8e736828b1bce32abf65b6cd9515e
                                  • Opcode Fuzzy Hash: ca23865455054479bece7d23809b66e5d7218befa909e75e0beb64e52a8de696
                                  • Instruction Fuzzy Hash: 16313E70604204AFD711EB69D985FD977E4EB05318F5540BBF404DB392D739AE80C79A
                                  APIs
                                  • SendMessageA.USER32(00000000,0000044B,00000000,?), ref: 0044F5A5
                                  • ShellExecuteA.SHELL32(00000000,open,00000000,00000000,00000000,00000001), ref: 0044F5D6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ExecuteMessageSendShell
                                  • String ID: open
                                  • API String ID: 812272486-2758837156
                                  • Opcode ID: 9b694d104bd39caec24af49046efba30af57982181ecbedc8af8d07189365068
                                  • Instruction ID: 7664e7eee34533549192780f472559fc987875beaa2e323647491b220bf9e567
                                  • Opcode Fuzzy Hash: 9b694d104bd39caec24af49046efba30af57982181ecbedc8af8d07189365068
                                  • Instruction Fuzzy Hash: 09213270E00204BFDB00DF69C881A9EB7F9EB44704F6085BAF401E7392DB78DA458B58
                                  APIs
                                  • RtlEnterCriticalSection.KERNEL32(00499420,00000000,)), ref: 004025C7
                                  • RtlLeaveCriticalSection.KERNEL32(00499420,0040263D), ref: 00402630
                                    • Part of subcall function 004019CC: RtlInitializeCriticalSection.KERNEL32(00499420,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019E2
                                    • Part of subcall function 004019CC: RtlEnterCriticalSection.KERNEL32(00499420,00499420,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 004019F5
                                    • Part of subcall function 004019CC: LocalAlloc.KERNEL32(00000000,00000FF8,00499420,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A1F
                                    • Part of subcall function 004019CC: RtlLeaveCriticalSection.KERNEL32(00499420,00401A89,00000000,00401A82,?,?,0040222E,021D0650,?,00000000,?,?,00401C49,00401C5E,00401DA2), ref: 00401A7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$AllocInitializeLocal
                                  • String ID: )
                                  • API String ID: 2227675388-1084416617
                                  • Opcode ID: e7de354507ed4e6cf5b1b8008114530547b15fe9a7101cf90e4e4e7ef665774e
                                  • Instruction ID: 12af864456fc6e18ba26838f94293088e51f0754e67fcb84d7a0ea3e08d714e4
                                  • Opcode Fuzzy Hash: e7de354507ed4e6cf5b1b8008114530547b15fe9a7101cf90e4e4e7ef665774e
                                  • Instruction Fuzzy Hash: 3A1101317082046FEB25AB7E9F1A62A6BD4D795758B24087FF404F32D2D9BD8C02826C
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000097), ref: 004947C9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Window
                                  • String ID: /INITPROCWND=$%x $@
                                  • API String ID: 2353593579-4169826103
                                  • Opcode ID: 70d042b87374c406167e323b58bdc73c48e1ddc06c1fe95fe2f1b0a262533310
                                  • Instruction ID: 735601d2fada896008fd5524511032772b9365b7e30d79631b2ce25e9676cbd4
                                  • Opcode Fuzzy Hash: 70d042b87374c406167e323b58bdc73c48e1ddc06c1fe95fe2f1b0a262533310
                                  • Instruction Fuzzy Hash: 5A11D535A042489FDB05EBA5D841FAEBFE8EB89314F10447BE404E7281D73C9905CB58
                                  APIs
                                    • Part of subcall function 00403CA4: MultiByteToWideChar.KERNEL32(00000000,00000000,00000000,00000000,?,00000400), ref: 00403CDE
                                    • Part of subcall function 00403CA4: SysAllocStringLen.OLEAUT32(?,00000000), ref: 00403CE9
                                  • SysFreeString.OLEAUT32(?), ref: 00446986
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: String$AllocByteCharFreeMultiWide
                                  • String ID: NIL Interface Exception$Unknown Method
                                  • API String ID: 3952431833-1023667238
                                  • Opcode ID: cc70ab50da529c18ec1dcc47520dde115463f7e6343c95aeb6df2dc524bb02a2
                                  • Instruction ID: c0a577e7d0886ee6857b8a23773c11734a697d9d294b04f5fc6172ffe111bf62
                                  • Opcode Fuzzy Hash: cc70ab50da529c18ec1dcc47520dde115463f7e6343c95aeb6df2dc524bb02a2
                                  • Instruction Fuzzy Hash: 7A11E970A003049FDB00DFA58C42A6EBBBCEB4A304F92407BF500E7291CA789D04CB6A
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004940C8,?,004940BC,00000000,004940A3), ref: 0049406E
                                  • CloseHandle.KERNEL32(00494A90,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000044,?,?,004940C8,?,004940BC,00000000), ref: 00494085
                                    • Part of subcall function 00493F58: GetLastError.KERNEL32(00000000,00493FF0,?,?,?,?), ref: 00493F7C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseCreateErrorHandleLastProcess
                                  • String ID: D
                                  • API String ID: 3798668922-2746444292
                                  • Opcode ID: 5e8cb24f3e8bf3d66ffbf7d2dfb5841848a81618379680ee135b38856bc67f04
                                  • Instruction ID: 996ffa81ca357fd86b8a8e6ab065e51becafb63900a730331261561be8e9fb15
                                  • Opcode Fuzzy Hash: 5e8cb24f3e8bf3d66ffbf7d2dfb5841848a81618379680ee135b38856bc67f04
                                  • Instruction Fuzzy Hash: C5015EB1604248AFDF10EB95CC42EAEBBECEF49715F51003AFA04E72D1D6785E058A69
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(?,Inno Setup: No Icons,00000000,00000000,00000000,00000000), ref: 0042DBB0
                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,Inno Setup: No Icons,00000000,00000000,00000000), ref: 0042DBF0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Value$EnumQuery
                                  • String ID: Inno Setup: No Icons
                                  • API String ID: 1576479698-2016326496
                                  • Opcode ID: 886c508a9d064cc5beab33d3e6a293d326300040bac42146d69738b9499b2323
                                  • Instruction ID: 682b92bc92faed275b53e4216f5c62fda41dfbd69c800dfaa39ca812b50ffd36
                                  • Opcode Fuzzy Hash: 886c508a9d064cc5beab33d3e6a293d326300040bac42146d69738b9499b2323
                                  • Instruction Fuzzy Hash: 93018431B8933069F73045266D41B6B558C9B45B64F65403BFA41AA3C0D6DCDC44E36A
                                  APIs
                                  • GetCurrentThreadId.KERNEL32 ref: 0041EE63
                                  • 73F85940.USER32(00000000,0041EDC4,00000000,00000000,0041EE80,?,00000000,0041EEB7,?,0042EA14,?,00000001), ref: 0041EE69
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CurrentF85940Thread
                                  • String ID: *sE
                                  • API String ID: 3526180387-3359606030
                                  • Opcode ID: 1ba73b8482d8c3e0c2ed08b216993e08e5ee7b6e87d0b77da0313bae5f1e9351
                                  • Instruction ID: 0bb20ecf203d2caaa18a69ea3b1dc52cc1b4ae2c1fbd5ea94b5f45832a100dbe
                                  • Opcode Fuzzy Hash: 1ba73b8482d8c3e0c2ed08b216993e08e5ee7b6e87d0b77da0313bae5f1e9351
                                  • Instruction Fuzzy Hash: AF015E74A18704AFD741CF66EC11996BBE8E749720B228877E804D3AA0E6385810DF18
                                  APIs
                                    • Part of subcall function 00406EB8: 6D167770.KERNEL32(00000000,00499628,004963B9,00000000,0049640E,?,?,00000005,?,00000000,00000000,00000000,Inno-Setup-RegSvr-Mutex,?,00000005,00000000), ref: 00406EC3
                                  • 6D167830.KERNEL32(00000000,00000000,00000001,0049A160,?,004745B2,?,00000000,00474647,?,00000000,00474858,?,00000000,004748B5), ref: 00473FC6
                                    • Part of subcall function 00473E18: GetLastError.KERNEL32(00000000,00473F04,?,?,?,0049A144,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00473F8B,00000001), ref: 00473E39
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: D167770D167830ErrorLast
                                  • String ID: DeleteFile$MoveFile
                                  • API String ID: 2031206815-139070271
                                  • Opcode ID: d84cc1cf191b3e9376ba6485c8f94635005e375395fb68a68016e8569e9140dd
                                  • Instruction ID: 4484f5f7e174d27cc8e42a5f2493440abee93dd7a9fbb535ddab3cf8dfb86aad
                                  • Opcode Fuzzy Hash: d84cc1cf191b3e9376ba6485c8f94635005e375395fb68a68016e8569e9140dd
                                  • Instruction Fuzzy Hash: 01F068A150415057DE10BE6985426DA63AC5F113DF710C07BF8487F382CA3D5E05A7AF
                                  APIs
                                    • Part of subcall function 0047B190: FreeLibrary.KERNEL32(00000000,0047F642), ref: 0047B1A6
                                    • Part of subcall function 0047AE64: GetTickCount.KERNEL32 ref: 0047AEAC
                                    • Part of subcall function 00455D60: SendMessageA.USER32(00000000,00000B01,00000000,00000000), ref: 00455D7F
                                  • GetCurrentProcess.KERNEL32(00000001,?,?,?,?,00496621), ref: 00495D21
                                  • TerminateProcess.KERNEL32(00000000,00000001,?,?,?,?,00496621), ref: 00495D27
                                  Strings
                                  • Detected restart. Removing temporary directory., xrefs: 00495CDB
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Process$CountCurrentFreeLibraryMessageSendTerminateTick
                                  • String ID: Detected restart. Removing temporary directory.
                                  • API String ID: 1717587489-3199836293
                                  • Opcode ID: 749cc3d33bdf3b361d0c408671b169b992bd7346cb83ac5431a27821d89323e2
                                  • Instruction ID: ac90d92dc29ac610e287cd6e67729ee47fcf9364ebb0edaa1ca8ef4f7d7e2680
                                  • Opcode Fuzzy Hash: 749cc3d33bdf3b361d0c408671b169b992bd7346cb83ac5431a27821d89323e2
                                  • Instruction Fuzzy Hash: E5E0E572208A442EDA1277B6BC1A92F7F5CD74676CB61843BF40482552C92D4C14C67D
                                  APIs
                                  • 6D1674B0.KERNEL32(00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00473CEF), ref: 00473ADD
                                  • CloseHandle.KERNEL32(00000000,00000000,C0000000,00000000,00000000,00000001,00000080,00000000,00000000,?,00473CEF), ref: 00473AF4
                                    • Part of subcall function 00452684: GetLastError.KERNEL32(00000000,004530F5,00000005,00000000,0045312A,?,?,00000000,00499628,00000004,00000000,00000000,00000000,?,0049606D,00000000), ref: 00452687
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: CloseD1674ErrorHandleLast
                                  • String ID: CreateFile
                                  • API String ID: 3698161638-823142352
                                  • Opcode ID: 284d071117862ed726ba55d7bba9de4a496fc421262f18bbaffdd2f0bcf8c2fd
                                  • Instruction ID: 1d6785e2027f3e83bcc3d2e7d006167172d97316e03d07259a24fcdec049f32e
                                  • Opcode Fuzzy Hash: 284d071117862ed726ba55d7bba9de4a496fc421262f18bbaffdd2f0bcf8c2fd
                                  • Instruction Fuzzy Hash: ADE06D307403447BEA10EA69CCC6F497788AB05728F108162FA48AF3E2C5B9EC40865C
                                  APIs
                                  • SetFocus.USER32(00000000,hI,00000000,004219E4,00000000,00000000,00418568,00000000,00000001,?,?,0046430A,00000001,00000000,00000000,00469855), ref: 00421CBB
                                  • GetFocus.USER32 ref: 00421CC9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: Focus
                                  • String ID: hI
                                  • API String ID: 2734777837-1175817223
                                  • Opcode ID: 4bf3c581c7c67873cf15edfb22c5ea133bb5f709077c4dd5f354b0e9100381d1
                                  • Instruction ID: 6a781247274b35bf802f0d5c88fcb4425cf39f3bc7fec05fcedd95d7989a6849
                                  • Opcode Fuzzy Hash: 4bf3c581c7c67873cf15edfb22c5ea133bb5f709077c4dd5f354b0e9100381d1
                                  • Instruction Fuzzy Hash: ADE09A35B002205ACB1027BA6886BAB21844B64348F58957FB501EB353DD7C8C80068C
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.1413617923.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000003.00000002.1413602051.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413679261.0000000000497000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413710937.0000000000498000.00000008.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413739647.0000000000499000.00000004.00000001.01000000.00000005.sdmpDownload File
                                  • Associated: 00000003.00000002.1413755583.00000000004A9000.00000002.00000001.01000000.00000005.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_400000_Youbak_MSN_PARTNER2036.jbxd
                                  Similarity
                                  • API ID: ErrorLastSleep
                                  • String ID:
                                  • API String ID: 1458359878-0
                                  • Opcode ID: 3b7199aa55ff79edef1708ee7c6545ac8614deac4515c5237193eebac0f59ac7
                                  • Instruction ID: e1de459c0036e349104eec2680d3566c4b7f0ee349e0778c92ca85d7709bdcd9
                                  • Opcode Fuzzy Hash: 3b7199aa55ff79edef1708ee7c6545ac8614deac4515c5237193eebac0f59ac7
                                  • Instruction Fuzzy Hash: 6EF09036A00914574E31A9AE9A8196F628DDADB36E720012BED04DF203D679CC8996AD